____ _____ _     __         __________     ___  ____ _____ __
   / __ ) ___/(_)___/ /__  ______  __/ __ \   |__ \/ __ <  / // /
  / __  \__ \/ / __  / _ \/ ___// / / / / /   __/ / / / / / // /_
 / /_/ /__/ / / /_/ /  __(__  )/ / / /_/ /   / __/ /_/ / /__  __/
/_____/____/_/\__,_/\___/____//_/  \____/   /____\____/_/  /_/   

Downgraded your user experience to mobile-mode
See out ultra-modern HTML experience here.

Schedule

Time Speaker Talk
09:00-09:30 --- Welcome and Registration
09:30-10:00 Kellman Meghu A Hitchhikers Guide to Information Security
10:00-10:30 Richo Healey Debugging with, and Haxing on Voltron
10:30-11:00 Saurabh Harit and Stephen Hall Gone in 60 seconds - Practical approaches to hacking with Yasuo
11:00-11:30 Katie Kleemola Communities at Risk
11:30-12:00 Lee Brotherston Corporation in the Middle
12:00-13:00 --- Lunch
13:00-13:30 Ben Hughes Handmade, artisan, probably knitted security at Etsy
13:30-14:00 Mark Baseggio Shut the Front Door
14:00-14:30 Eric Evenchick Hopping on the CAN Bus
14:30-15:00 Greg Wiseman Introducing Recog
15:00-15:30 Dan Frisch BlackHat Python
15:30-16:00 --- Break
16:00-16:30 Jeremy Richards Firmware Hacking
16:30-17:00 Jason Kendall Elasticsearch/Logstash/Kibana: Not plain ol syslog
17:00-17:30 Augusto Barros Security and Behavioral Economics
17:30-18:00 Michael Perklin Standardizing Security in the Cryptocurrency Industry
18:00-18:30 Allan Stojanovic Logs and Tactical Defence
18:30-19:00 Roy Firestein Honeydocs and Offensive Countermeasures
19:00-Close Seth Hardy Powerpoint Karaoke

Gold Sponsors

Silver Sponsors

Friends

Other