Events by track

Conference

  title track speakers
Anatomy of ICS Disruptive Attacks
ICS attacks are increasingly in the spotlight, yet significant misconceptions...
Conference
An Inconvenient Truth
The ransomware protection in Windows 10 is useless
Conference
Avoiding default passwords and secrets breaches using open source
This talk covers the fundamental problem of handling secrets (e.g.,...
Conference
Bug Bounty Hunting on Steroids
Bug bounty programs are a hot topic these days. More and more companies are...
Conference
Closing Remarks
Conference
Dinner Break
Conference
Dinner Break
Conference
Dissection of WebAssembly module
WebAssembly (WASM) is a new binary format currently developed by all major...
Conference
Electron Harmony
A good schematic should flow like a well written manuscript or a piece of...
Conference
Finding secrets in source code with TruffleHog
Developers frequently commit secrets to source code, and sometimes push...
Conference
Following a Trail of Confusion
Modern malware uses a wide variety of code obfuscation techniques to hide...
Conference
Fooling ML Image Classifiers
Conference
From Chaos to Bliss: How We Solved Security in Just 20 Years
20 years ago Win95 was dominant, security meant AV and firewalls, cDc...
Conference
From FAR and NEAR: Exploiting Overflows on Windows 3.x
This talk covers finding a buffer overflow vulnerability in some old Windows...
Conference
Goldilocks and the three ATM attacks
Automated Teller Machines (ATM) attacks are more sophisticated than ever...
Conference
Hacker Jeopardy
The First Qualifying Round for the 25th Annual Hacker Jeopardy
Conference
Hacker Mental Health Project
Conference
Hiring Security
Nothing impacts your security program as much as who you hire into it. Using...
Conference
If You Give a Container a Capability: A Tale of Container Exploitation
This talk walks through mechanisms used by container solutions to create an...
Conference
Infecting the Embedded Supply Chain
With a surge in the production of internet of things (IoT) devices, embedded...
Conference
Integrated security testing
Having a scalable suite of continuously run security tests seems out of reach...
Conference
Introducing InfoconDB.org - IMDB For Hacker Cons
This talk will introduce https://InfoconDB.org - a site that aims to catalog...
Conference
IoT Botnets : The Crux of "Internet of Things" Chaos !
IoT botnets are deployed heavily to perform nefarious activities by...
Conference
It will kill or harm you and it's in you or your home
Exploding light bulbs? Yup. How safe is IOT? Can your speakers make you go...
Conference
KEYNOTE: The Enemy Within
Conference
Lost and Found Certificates: dealing with residual certificates for pre-owned domains
When purchasing a new domain name you would expect that you are the only one...
Conference
Lunch Break
Conference
Lunch Break
Conference
My Little AWS IR Sandbox
A well-tuned security awareness program will fill up your team’s inbox with...
Conference
Opening Remarks
Conference
Ransomware versus Cryptojacking: Latest Trends in Modern Malware
Ransomware and cryptojacking have been recognized as the top malware threats...
Conference
Registration
Conference
Registration & Reception
Conference
Reversing Ethereum Smart Contracts
Ethereum is currently the reference of smart contract platform due to the...
Conference
Ridiculous Router
OpenWRT is stable on many cheap platforms. It does so many things. The...
Conference
Saturday Night Party
Conference
Shining a light on a black box: Reverse engineering proprietary protocols in Embedded devices
IoT devices often present unique and unexpected challenges for hackers to...
Conference
Smart Contract Honeypots for Profit (and probably Fun)
Ethereum smart contracts have bugs: a lot of them. So many, in fact, that...
Conference
Symbolic Computing, Moving On Up.
This talk presents real world application of solvers for checking code, as...
Conference
ToorCon After Party
Conference
UEFI is Scary
UEFI is borked. This is nothing new. But the tools are making it easier to...
Conference
Unikernel Apocalypse
"Unikernels" are specialized, single-address-space machine images that run...
Conference
Yet Another IoT Hack
Security and the Internet of Things (IoT) are commonly discussed, though...
Conference
You’re Not Alone in Your Hotel Room
Staying in a hotel can bring numerous privacy concerns. Shared WiFI,...
Conference

Seminars

  title track speakers
Cheating at AppSec
DevSecOps is becoming the rule not the exception. Right? Applying the...
Seminars
Digital Forensics is not just for incident response anymore
Experienced InfoSec professionals are familiar with leveraging digital...
Seminars
Dinner Break
Seminars
Hacking and Hardening Kubernetes
In this talk, we will demonstrate attacks on Kubernetes clusters, discuss...
Seminars
Lunch Break
Seminars
Registration & Breakfast
Seminars
Shooting Puny Phish in a Barrel
With millions of phishing Emails caught be spam filters and users properly...
Seminars
Threat Hunting with Network Forensics
This presentation looks at TCP/UDP network traffic and protocols to identify...
Seminars