Note:
*Session title, timings, presenters and/or sequence may change without prior notice.
spacer
 
spacer
 




Day 1: October 25, 2011

Track >
Keynotes
Schedule
Topic
Speaker



8:45 AM - 9:00 AM
Conference Opening & Welcome Address
Leonard Chin | Conference Director



9:00 AM - 9:40 AM
KN1 - Defending the Frontier 3.0
Jay Bavisi



9:40AM - 10:30AM
KN2 - Cyber-War and the Future of Cyber Conflict
Bruce Schneier



10:30AM - 11:20AM
KN3 - Have We Lost The War on Security?
George Kurtz




11:20 AM - 11:40 AM


BREAK



11:40 AM - 12:30 PM
KN4 - Battery Firmware Hacking
Charlie Miller



12:30 PM - 1:10 PM
KN5 - 4 Years and 4 Thousand Websites: What Have We Learned about Website Security?
Jeremiah Grossman




1:10 PM - 2:00 PM


LUNCH



2:00 PM - 2:50 PM
KN6 - SECRET
Barnaby Jack



2:50 PM - 3:40 PM
KN7 - Apple iOS 4 Security Evaluation
Dino Dai Zovi




3:40 PM - 4:00 PM


BREAK




4:00 PM - 4:50 PM
KN8 - SSL And The Future Of Authenticity
Moxie Marlinspike



4:40 PM - 5:30 PM
KN9 - APTs: Misunderstood and Overhyped –What We Should Do to Protect Ourselves
Wolfgang Kandek



5:30 PM - 6:15 PM
KN10: Panel Discussion - Is Your Security Strategy Working? PROVE IT!
Tim Wilson(Editor-Dark Reading)



6:15 PM - 6:30 PM
DAY 1: CLOSING ADDRESS & RAFFLE DRAW



8:00 PM
TILL LATE

HACKER HALTED SIGNATURE PARTY - Hackers Casino Royale in Miami

spacer
 

Day 2: October 26, 2011

Where >
Conference Hall 1
Conference Hall 2
Conference Hall 3 
Conference Hall 4
Track >
What's Hot
Cut the Crap Show Me the Hack
Up in the Clouds
Securing SCADA & Critical Infrastructures
Schedule
Topic
Speaker
Topic
Speaker
Topic
Speaker
Topic
Speaker









9:30 AM - 10:15 AM Cyber Espionage - Runningthe Table with the Cyber Intelligence Cycle
Jeffrey Bardin
Hacking Google ChromeOS
Matt Johansen
Cloudy With The Chance of a Hack
John Weinschenk
New SCADA Attacks - APT,
Night Dragon,
and Stuxnet – everybody is kung fu fighting

Jonathan Pollet









10:15 AM - 11:00 AM
Whitelisting vs. Blacklisting – The Good, the Bad, and the Ugly
Harry Sverdlove
PHP: Lesser Known Exploits
Sean Arries
Building Your Own Virtual Attack Lab (aka My Laptop is My Datacenter)
Edward Haletky
SCADA and PLC Vulnerabilities in Correctional Facilities
Prof. Tiffany Rad / Teague Newman / John Strauchs










11:00 AM - 11:15 AM


BREAK










11:15 AM - 12:00 PM
The Law of Carrying and Capturing Packets: What You Should Know About Open WiFi Networks and Tor Relays
Marcia Hoffman / Kevin Bankston
Mobile App Moolah: Profit Taking with Mobile Malware
Jimmy Shah
Next Generation Cloud API's: Security Embedded
Richard Tychansky
SCADA Dismal, or Bang-Bang SCADA
Yaniv Miron









12:00 PM - 12:45 PM
Secrets to Hacking: The Challenges, Risks and Rewards
Haja Mohideen
Transparent Smartphone Spying
Georgia Weidman
PCI Compliances in the Cloud: Why or Why Not?
Martin McKaey / Mike Dahn
Control System Cybersecurity Training Kit Live Demonstration
Matthew Luallen










12:45 PM - 1:45 PM


LUNCH










1:45 PM - 2:30 PM
The new Frontier for Zeus & SpyEye
Ryan Sherstobitoff
Follow my Botnet on Twitter
Christopher Elisan
Cloud Service Provider Security Update
Robert Rounsavall
SCADA Security: Why is it so hard?
Amol Sarwate









2:30 PM - 3:15 PM
PCI Data Security Standard (DSS) Update
Hemma Prafullchandra
TCP Stack Exhaustion and Staying Power
Anna Claiborne
PenTesting the Cloud
Tim Pierson
New Cyber Warfare Targets: SCADA Systems
Robert Lee









3:15 PM - 4:00 PM
Six Key Application Security Metrics - Appsec Risk Management in 2012
Arian Evans
Turbo Unpacking: A Journey into Malicious Packers
Nicolas Brulez
Do they deliver? Practical Security and Load Testing of the Cloud
Matthias Luft
Legal and Technical Analysis of PLC and SCADA Vulnerabilities
Prof. Tiffany Rad / Teague Newman










4:00 PM - 4:15 PM


BREAK










4:15 PM - 5:00 PM
SSD: Solid State Drives & How They Work For Data Recovery and Forensics Scott Moulton
Spy Jackers - Countering Persistent Threats
Sean Bodmer
Practical Cloud Forensics Wayne Burke DIY SCADA Security - Learn how to build your own SCADA Defense Solutions
Jonathan Pollet









5:00 PM - 5:45 PM
No Session No Session No Death By Powerpoint  - Just Live Hacking

Joe McCray
The Emerging Standard for Preserving Electronic Data on Social Networks and the Cloud.
Erik Laykin
Panel Discussion: SCADA hacking: the proliferation of weapons for the next world war
Shaun Waterman / Jonathan Pollet / Prof Tiffany Rad / Matthew Luallen









5:45 PM - 6:30 PM

SPECIAL KEYNOTE SESSION - Throwdown on the Digital Mat (with a smiling operator)

PS: You wouldn't want to miss this for sure!









6:30 PM - 6:45 PM
DAY 2: CLOSING ADDRESS & RAFFLE DRAW
spacer
 

Day 3: October 27, 2011

Where >
Conference Hall 1
Conference Hall 2
Conference Hall 3:
Schedule
Topic
Speaker
Topic
Speaker
Topic
Speaker







9:30 AM - 10:15 AM
Insight into the Russian Black Market
Alan Kakareka
Cut the Crap; Let’s Create a Phishing / Trojan Attack in 45 minutes or less!
Dave Chronister
The Myth of the Advanced Persistent Threat
Dave Marcus







10:15 AM - 11:00 AM
Collecting Eyeballs: Measuring And Analyzing Malicious Activity On Twitter And Facebook
Daniel Peck
А crushing blow at the heart of SAP J2EE Engine
Alexander Polyakov
And You Will Know Us By The Trail Of Our Logs: Malware research and analysis using log data
Zachary Wolff








11:00 AM - 11:15 AM



BREAK








11:15 AM - 12:00 PM
Achieve Significant Cost Savings Using Anti-Malware Automation Tools
Darin Andersen
Retrieving Internet Chat History with the Same Ease as a Squirrel Cracks Nuts
Yuri Gubanov
Software (In)security - Defending against evil software
Shakeel Tufail







12:00 PM - 12:45 PM
Pulp Google Hacking:The Next Generation Search Engine Hacking Arsenal

Francis Brown
Jack Of All Formats
Daniel Crowley
Blackberry WatchDog – Because You Need Prevention
Radu
Stanescu









12:45 PM - 1:45 PM



LUNCH








1:45 PM - 2:30 PM
Everything you need to know about wireless security...
Domonkos P. Tomcsanyi
Collecting Shellz By The C-Side
Rob KrausJose Hernandez The Good Hacker - Hunting Web Malware Aditya K Sood







2:30 PM - 3:15 PM Risk Assessment Based On Vulnerability Analysis Ari Takanen Exploiting the Top 10 Database Vulnerabilities and Misconfigurations Josh Shaul
Deploying Solid Defense Strategies
Kevin Cardwell







3:15 PM - 4:00 PM APT in the enterprise - Finding an evil in a haystack
Pascal Longpre
Attacking and Mitigating Unbound Media Brad Smith Root Cause Of Cybercrime, Cyberwar And Malware Exploitation: CVEs Gary Miliefsky







4:00 PM - 4:45 PM
The Social Solution To Social Engineering
Randy Abrams
How to gain access to laptops and virtual machines through the physical memory
Csaba Barta
Malware retooled: Moving away from purpose built platforms to general tools to target specific industries.
Omar Aldahir







5:00 PM - 5:30 PM
GLOBAL CYBERLYMPICS AWARDS CEREMONY, CONFERENCE CLOSING ADDRESS & FINAL RAFFLE DRAW


spacer
dummy