| 1 |
10:00 - 10:25 |
Philipp Krenn - Visualize your threats |
| 2 |
10:25 - 10:30 |
5 minute break |
| 3 |
10:30 - 11:15 |
Josh Pyorre - The modern SOC: Adapting the Security Operations model to how we work |
| 4 |
11:15 - 11:25 |
10 minute break |
| 5 |
11:25 - 12:10 |
Rene Freingruber and Raschin Tavakoli - When your firewall turns against you |
| 6 |
12:10 - 12:15 |
5 minute break |
| 7 |
12:15 - 12:50 |
Paul Coggin - Exploiting First Hop Protocols to Own the Network |
| 8 |
12:50 - 14:15 |
Lunch break |
| 9 |
14:15 - 15:00 |
Aaron Kaplan - 0xff and how it evolved |
| 10 |
15:00 - 15:05 |
5 minute break |
| 11 |
15:05 - 15:50 |
Hanno Böck - The law of TLS breakage |
| 12 |
15:50 - 16:00 |
10 minute break |
| 13 |
16:00 - 16:45 |
Renato Marinho - The details of the investigation that resulted in the Mamba Ransomware discovery |
| 14 |
16:45 - 16:50 |
5 minute break |
| 15 |
16:50 - 17:35 |
Artemios Voyiatzis - Transport Layer Security beyond crypto – notary services and certificate pinning to the rescue? |
| 16 |
17:35 - 17:50 |
15 minute break |
| 17 |
17:50 - 18:35 |
Shpend Kurtishaj - Running a bug bounty - What you need to know |
| 18 |
18:35 - 18:40 |
5 minute break |
| 19 |
18:40 - 19:25 |
Leyrer & MacLemon - Advanced SSH |
| 20 |
19:25 - 19:30 |
5 minute break |
| 21 |
19:30 - 20:00 |
Philipp Krenn - NoSQL means no security? |
| 22 |
20:00 - 20:15 |
Closing |