All presentations will be in English.
08:30 - 09:00 | Breakfast & Networking |
09:00 - 09:15 | Shared Welcome - Track 1 Stage |
09:15 - 10:00 | Through the lens of a threat hunter Avester Fahimipour |
10:00 - 10:15 | Break |
10:15 - 11:00 | From promises to performance: A critical review of (mostly cloud) WAF solutions Knud Højgaard |
11:00 - 11:15 | Break |
11:15 - 12:00 | AuraCast: A Multisensory Proof-of-Concept.to Combat Alert Fatigue in Cybersecurity Francine Solheim |
12:00 - 13:15 | Lunch |
13:15 - 14:00 | System Partitioning into Zones, To Do or.Not to Do? Realistic Trade-Offs in Segregating Systems in ... Andrei Mungiu |
14:00 - 14:15 | Break |
14:15 - 15:00 | Wanna play with OT and Cyber Security? Play with Labshock, then Michael Weng |
15:00 - 16:30 | Networking Session |
16:30 - 00:00 | Afterparty - Bar opens |
All presentations will be in English.
8:30 - 09:00 | Breakfast & Networking |
09:00 - 09:15 | Shared Welcome - Track 1 Stage |
09:15 - 10:00 | Bending the Big Iron: An Introduction to Mainframe Hacking Jack Fitzsimons |
10:00 - 10:15 | Break |
10:15 - 11:00 | From secure phone to insecure personalities Bella Nielsen |
11:00 - 11:15 | Break |
11:15 - 12:00 | Go-ing Under the Hood: Practical Malware Reversing for Threat Intel Martin Clausen |
12:00 - 13:15 | Lunch |
13:15 - 14:00 | Dungeons & Dragons: The security tool you didnt know you needed Klaus Agnoletti |
14:00 - 14:15 | Break |
14:15 - 15:00 | Creating Your Own Command Control Framework Mark Steenberg |
15:00 - 16:30 | Networking Session |
16:30 - 00:00 | Afterparty - beers |