Jun, 22
09:30 Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises for a living!)with Jayson E. Street
10:15 VentriLock: Exploring voice-based authentication systems with Chaouki Kasmi and José Lopes Esteves
11:30 Internet of Compromised Things: methodology and tools
12:15 The forgotten interface: Windows named pipes
14:00 Beyond OWASP Top 10 with Aaron Hnatiw
14:45 Dissecting A Ransomware-infected MBR with Raul Alvarez
16:00 The Internet of Vulnerabilities with Deral Heiland
16:45 DEBATE – “Hackers, the Media, Truth, Trust and Alternative Facts” with Winn Schwartau, Deral Heiland and Annie Machon
Jun, 23
09:00 KEYNOTE : How to Measure Your Security: Holding Security Vendors Accountable with Winn Schwartau
09:45 Social Engineering setting people into debug mode with Dominique C. Brack
11:00 Are you watching TV now? Is it real?: Hacking of smart TV with 0-day with Lee JongHo and Kim MinGeun
11:45 802.1x Network Access Control and Bypass Techniques with Valérian Legrand
13:30 Hackers! Do we shoot or do we hug? with Edwin Van Andel
14:15 Popping a shell on a mainframe, is that even possible? with Ayoub Elaassal
15:30 Injecting Security into Web apps with Runtime Patching and Context Learning with Ajin Abraham
16:15 25 Techniques to Gather Threat Intel and Track Actors with Wayne Huang and Sun Huang
Jun, 19
Corelan “Advanced”with Peter Van Eeckhoutte
Offensive Mobile Application Exploitation – iOS & Androidwith Prateek Gianchandani
Practical Internet Of Things (IoT) Hackingwith Aseem Jakhar
Jun, 20
Developing Burp Suite Extensions – From manual testing to security automationwith Luca Carettoni
Pentesting the Modern Application Stack
Practical SAP Netweaver ABAP Pentestwith Yvan Genuer
Smart lockpicking – hands-on exploiting IoT devices based on access control systems