1 |
10:00 - 10:25 |
Philipp Krenn - Visualize your threats |
2 |
10:25 - 10:30 |
5 minute break |
3 |
10:30 - 11:15 |
Josh Pyorre - The modern SOC: Adapting the Security Operations model to how we work |
4 |
11:15 - 11:25 |
10 minute break |
5 |
11:25 - 12:10 |
Rene Freingruber and Raschin Tavakoli - When your firewall turns against you |
6 |
12:10 - 12:15 |
5 minute break |
7 |
12:15 - 12:50 |
Paul Coggin - Exploiting First Hop Protocols to Own the Network |
8 |
12:50 - 14:15 |
Lunch break |
9 |
14:15 - 15:00 |
Aaron Kaplan - 0xff and how it evolved |
10 |
15:00 - 15:05 |
5 minute break |
11 |
15:05 - 15:50 |
Hanno Böck - The law of TLS breakage |
12 |
15:50 - 16:00 |
10 minute break |
13 |
16:00 - 16:45 |
Renato Marinho - The details of the investigation that resulted in the Mamba Ransomware discovery |
14 |
16:45 - 16:50 |
5 minute break |
15 |
16:50 - 17:35 |
Artemios Voyiatzis - Transport Layer Security beyond crypto – notary services and certificate pinning to the rescue? |
16 |
17:35 - 17:50 |
15 minute break |
17 |
17:50 - 18:35 |
Shpend Kurtishaj - Running a bug bounty - What you need to know |
18 |
18:35 - 18:40 |
5 minute break |
19 |
18:40 - 19:25 |
Leyrer & MacLemon - Advanced SSH |
20 |
19:25 - 19:30 |
5 minute break |
21 |
19:30 - 20:00 |
Philipp Krenn - NoSQL means no security? |
22 |
20:00 - 20:15 |
Closing |