Trainings
All trainings start at 09:00 and end at 17:00. Registration opens at 8am
Training Schedule:
- Session 1: 09:00 - 10:30
- Break
- Session 2: 11:00 - 12:30
- Lunch
- Session 3: 13:30 - 15:00
- Break
- Session 4: 15:30 - 17:00
-
Hands-On Network Automation
Ivan Pepelnjak
-
Introduction to BGP and BGP Security
Peter Hessler
-
Military Strategy and Tactics for Cyber Security
Greg Conti
-
Pentesting the Modern Application Stack
Francis Alexander Bharadwaj Machiraju
-
Docker, DevOps & Security in Enterprise Environments
Simon Lipke
-
Forensic Computing and Incident Analysis
Andreas Dewald
-
Windows and Linux Exploitation
Oliver Matula Birk Kauer
-
Get your hands dirty playing with RFID/NFC
Nahuel Grisolia Philippe Teuwen
-
TLS/SSL in the enterprise
Michael Thumann Benjamin Schwendemann
-
Insight into Windows Internals
Aleksandar Milenkoski Dominik Phillips
-
Reverse Engineering a (M)MORPG
Antonin Beaujeant
-
Hacking the USB World with FaceDancer
Kate Temkin Dominic Spill
-
Software Defined Radio
Mike Ossmann
-
Hardening Microsoft Environments
Friedwart Kuhn Heinrich Wiederkehr Florian Gattermeier
-
Hacking 101
Sven Nobis Julian Suleder
-
Jump-Starting Public Cloud Security
Christoph Klaaßen
-
Exploitation on ARM based Systems
Sascha Schirra Ralf Schaefer
-
Automation with Ansible: Radically simplify IT Operations
Kai Sparwald Jacky Hammer
NGI
-
Breaking IoT NGI Keynote
-
Coffee Break
-
Breaking IoT Is my toothbrush really smart?
-
-
Lunch
-
-
-
Coffee Break
-
-
Breaking IoT Wrap Up
-
Coffee Break
-
Building IoT IoT Security – A Joint Responsibility
-
Building IoT Things Attack: Peek into a 18 months IoT honeypot
-
Lunch
-
-
-
Coffee Break
-
-
Building IoT Wrap Up
Trainings
All trainings start at 09:00 and end at 17:00. Registration opens at 8am
Training Schedule:
- Session 1: 09:00 - 10:30
- Break
- Session 2: 11:00 - 12:30
- Lunch
- Session 3: 13:30 - 15:00
- Break
- Session 4: 15:30 - 17:00
-
Hands-On Network Automation
Ivan Pepelnjak
-
Introduction to BGP and BGP Security
Peter Hessler
-
Military Strategy and Tactics for Cyber Security
Greg Conti
-
Pentesting the Modern Application Stack
Francis Alexander Bharadwaj Machiraju
-
Docker, DevOps & Security in Enterprise Environments
Simon Lipke
-
Forensic Computing and Incident Analysis
Andreas Dewald
-
Windows and Linux Exploitation
Oliver Matula Birk Kauer
-
Get your hands dirty playing with RFID/NFC
Nahuel Grisolia Philippe Teuwen
-
TLS/SSL in the enterprise
Michael Thumann Benjamin Schwendemann
-
Insight into Windows Internals
Aleksandar Milenkoski Dominik Phillips
-
Reverse Engineering a (M)MORPG
Antonin Beaujeant
-
Hacking the USB World with FaceDancer
Kate Temkin Dominic Spill
-
Software Defined Radio
Mike Ossmann
-
Hardening Microsoft Environments
Friedwart Kuhn Heinrich Wiederkehr Florian Gattermeier
-
Hacking 101
Sven Nobis Julian Suleder
-
Jump-Starting Public Cloud Security
Christoph Klaaßen
-
Exploitation on ARM based Systems
Sascha Schirra Ralf Schaefer
-
Automation with Ansible: Radically simplify IT Operations
Kai Sparwald Jacky Hammer
NGI
-
-
Coffee Break
-
Breaking IoT Hacking Robots Before Skynet
-
Breaking IoT swimming IoT or how to hack a Yacht
-
Lunch
-
-
-
Coffee Break
-
Breaking IoT Lazy-Mode RF OSINT and Reverse Engineering
-
Breaking IoT Wrap Up
-
-
Coffee Break
-
-
-
Lunch
-
-
-
Coffee Break
-
-
IPv6 Wrap Up
Telco Security Day
Starts at 8:30
-
TSD Main Room Registration
-
TSD Main Room Welcome Note
-
-
-
Coffee Break
-
-
TSD Main Room Building a Telecom Information Sharing Platform
-
Lunch
-
TSD Main Room Attacking NextGen Roaming Networks
-
TSD Main Room Imsi-catcher catcher
-
Coffee Break
-
-
Invite only event
Main Conference - Day 1
-
Attack & Research Keynote
-
Coffee Break
-
Attack & Research How to Bring HID Attacks to the Next Level
-
Attack & Research A Stepping Stone To Car Hacking
-
Lunch
-
-
Attack & Research A short tale on protecting the long tail
-
Coffee Break
-
Attack & Research Reverse Engineering Black Box Systems with GreatFET & Facedancer
-
Attack & Research Panel Discussion: Robot (1.5h)
-
Coffee Break
-
Defense & Management From Zero to Secure Continuous Delivery in 60 Minutes
-
Defense & Management Real-Life Network and Security Automation
-
Lunch
-
Defense & Management All Your Cloud Are Belong To Us - Hunting Compromise in Azure
-
Defense & Management No royal road : advanced analysis for 'advanced' threats
-
Coffee Break
-
Defense & Management Security Appliances Internals
-
Defense & Management Weaponizing Layer 8
-
Defense & Management Verifying network IoC hits in millions of packets
-
Defense & Management Project Walrus - An Android App for RFID Card Cloning
-
Coffee Break
-
SAP Security SAP IGS : The 'vulnerable' forgotten component
-
SAP Security SAP BUGS: The Phantom Security
-
Lunch
-
SAP Security Hunting crypto secrets in SAP systems
-
-
Coffee Break
-
-
Shared Dinner
(time and location to be announced)
PacketWars™
Starts after Shared Dinner
10k Run
Starts at 7:00 – we meet at the Crowne Plaza Hotel
Main Conference - Day 2
-
Attack & Research TR18 Day 2 Keynote
-
Coffee Break
-
Attack & Research When Virtual Hell Freezes Over - Reversing C++ Code
-
Attack & Research NFC Payments: The Art of Relay & Replay Attacks
-
Lunch
-
Attack & Research Unifying RF Fuzzing Techniques under a Common API: Introducing unfAPI
-
Attack & Research The Wolf In SGX Clothing
-
Coffee Break
-
Attack & Research Ads networks are following you, follow them back
-
Attack & Research Closing Remarks
-
Coffee Break
-
Defense & Management Subverting Trust in Windows
-
Defense & Management The Language of Security - Sharing Knowledge without Spreading FUD
-
Lunch
-
Defense & Management Blue Team Sprint: Let’s fix these 3 things on Monday
-
-
Coffee Break
-
Defense & Management Mobile App Security Fails and How To Survive Them
-
Coffee Break
-
AD Security Active Directory Security: The Journey
-
-
Lunch
-
-
AD Security Defending Microsoft Environments at Scale
-
Coffee Break
-
Roundtables
Roundtable sessions start at 09:00 and end at 13:00
-
Session 1
Active Directory Security
-
Session 2
Internet of Things
-
Session 3
Cloud & DevOps Security
-
Session 4
Incident Analysis & Security Monitoring