Version 1.1 Nov. 11, 2024
We released a new schedule version!
We have a new session: “NIS2 and CRA: From Legislation to Execution” by Jennifer Janesko, Sneha Rajguru.
We sadly had to cancel a session: “Managing Cybersecurity Incidents: A Journey Through Cause, Effect, and Response” by Denes Fodor
Version 0.4 Sept. 15, 2024
We released a new schedule version!
We sadly had to cancel a session: “Advanced .NET Exploitation” by Sina Kheirkhah (@SinSinology)
Version 0.3 Sept. 3, 2024
We released a new schedule version!
We have new sessions!
Version 0.2 Sept. 2, 2024
We released a new schedule version!
We have new sessions!
- “Real-Time Threat Intelligence with ML Feedback Loops” by Tomer Doitshman
- “/proc for Security Analysts: Unveiling Hidden Threats and Forensic Treasures” by Stephan Berger, Asger Strunk
- “Help, My Application Is Vulnerable, but How Bad Is It? - Practical Vulnerability Analysis for Development Teams” by Michael Helwig, Alvaro Martinez
- “Demystifying the First Few Minutes After Compromising a Container” by Stuart McMurray
- “Beyond Manual: Enhancing and Scaling Security with Automation” by Christian Bauer
- “From Boot to Root: Identifying and Mitigating Security Issues in Bootloaders” by Richard Weinberger
- “Let's Get Physical: Stories From Behind Your Company's Gate” by Moritz Thomas, Firat Acar
- “Becoming the Evil Maid - Hacking Android Disk Encryption for Fun and Profit” by David Gstir
- “z/OS for GenZ - Hack the Mainframe” by Jonathan Prince
- “EDR Analysis: An Introduction to Reversing Sophisticated Detection” by Daniel Feichter
- “Some Thoughts on Penetration Test Reports” by Hans-Martin Muench
- “Leaking Kakao: How I found a 1-Click Exploit in Korea's Biggest Chat App” by Dawin Schmidt
- “Reverse Engineering and Control Flow Analysis with Intel Processor Trace” by Hagen Paul Pfeifer
- “Building and Leading Advanced Red Teams” by Bjoern Trappe
- “Kobold Letters and Other Mischief - How Emails Can Deceive You” by Konstantin Weddige
- “Managing Cybersecurity Incidents: A Journey Through Cause, Effect, and Response” by Denes Fodor
- “Mystical Vulnerabilities: Exploring the Oddities in Cybersecurity” by Massimo Morello
- “Demystifying Cloud Infrastructure Attacks” by Alexander
- “Ground Control to Major Threat - Hacking the Space Link Extension Protocol” by Andrzej Olchawa
- “A Security Champion's Journey - How to Make Things a Bit More Secure than Yesterday Every Day” by Lisi Hocke
Version 0.1 Aug. 27, 2024
Releasing the first schedule for the workshops.