Register!

Schedule

Wednesday, July 25

Time Breaking Ground Proving Ground Underground Training Ground Poolside
0900 Registration & Coffee Sunny Vegas Fun
1000 KEYNOTE:Jack Daniel: The State of Security BSides Rick Flores: Exploit Development with Metasploit
1100 Matt Weeks: Amubush - Catching Intruders At Any Point Michael Fornal: How I Managed to Break Into the InfoSec World With Only a Tweet and an Email Matt "DCFluX" Krick: Arizona Craigslist Hookers (and other dating website shenanigans)
1200 Robert Rowley: Max Level Web App Security David Keene: Breaking Microsoft Dynamics Great Plains - An Insider's Guide Ken Westin: When Devices Rat Us Out
1300 Lunch
1400 Davi Ottenheimer: Big Data's Fourth V: Or Why We'll Never Find the Loch Ness Monster William Ghote: Lotus Notes Password Hash Redux Ian Vitek: TBA Day of Conference Rick Flores: Exploit Development with Metasploit (continued)
1500 HD Moore: Empirical Exploitation Spencer McIntyre: How I Learned to Stop Worrying and Love the Smart Meter [Breaking Ground Overflow] Dallas: Why Have We Not Fixed the ID Problem? Aaron Crawford: Beyond Social Engineering: Violating Trust Models Through Marketing
1600 Christopher Lytle: Puzzle Competitions and You Christoper Campbell: Shot With Your Own Gun - How Appliances Are Used Against You int0x80: TBA Day of Conference
1700 Parth Patel: Introducing Android Security Evaluation Framework (ASEF) Shawn Asmus & Kristov Widak: Mirror Mirror - Reflected PDF Attacks Using SQL Injection HD Moore: Global Loot
1800 Terry Gold: RFID LOL Georgia Weidman: Introducing the Smartphone Penetration Testing Framework [Breaking Ground Overflow] Ian Amit: Sexy Defense
1800 - 0600 Closed Hack Vegas

 


Thursday, July 26

Time Breaking Ground Proving Ground Underground Training Ground
0900 Registration & Coffee
1000 Raphael Mudge: Force Multipliers for Red Team Operations Phil Young: Mainframed - The Forgotten Fortress Dos Santos & Montoro: Mobile Snitch - Devices Telling the World About You Mike Murray & Joseph Sokoly: Penetration Report Writing and Analysis
1100 Andrew Hay & Matt Johansen: Applications and Cloud Hackers, Oh My! Walt Williams: Metrics That Suck Even Less TBA Day of Conference
1200 Brendan O'Connor: Reticle: Dropping an Intelligent F-BOMB Conrad Constantine: The Leverage of Language, or, How I Realized Information Theory Could Save Information Security [Breaking Ground Overflow] TBA Day of Conference
1300 Lunch
1400 Josh Sokol & Dan Cornell: The Magic of Symbiotic Security - Creating an EcoSystem of Security Systems Jason Ding: The Blooming Social Media Economics Built on Fake Identites Dave Kennedy: Secret Pentesting Techniques… Shh… … Mike Murray & Joseph Sokoly:Penetration Report Writing and Analysis (continued)
1500 James Lester & Joseph Tartaro: Occupy Burp Suite - Informing the 99% of What the 1%'ers Are Knowingly Taking Advantage Of Lightning Talks Panel: Ask the EFF
Kurt Opsahl
Trevor Timm
Mitch Stoltz
Hanni Fahoury
Marcia Hoffman
Georgia Weidman: Metasploit
1600 dc949: Stiltwalker - Round 2 Violet Blue: Sex and Breaking Bad: F$cking on the Periodic Table
1700 Gillis Jones: The Badmin Project (Na-na-nanana Na-na-nanana BADMIN) David Bryan: Router of Darkness - Techniques for Embedded Systems Hacking
1800 IPv6 Panel / Drinking Game Legion303: Making Lockpicks the Legion303 Way
2130 - Dawn Party