DerbyCon 8 Speaker Layout
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
View only
 
 
ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
TIMETrack 1 upstairs marriott I & IITrack 2 upstairs marriott VII VIII IX XTrack 3 downstairs kentucky ETrack 4 downstairs kentucky F & GTrack orderTIMEStable Talks downstairs C & DTrack order
2
8:00 - 8:55Opening Ceremonies - DerbyCon Team
3
9:00 - 9:50 How to influence security technology in kiwi underpants - Benjamin Delpy12:00 - 12:25Red Teaming gaps and musings - Samuel Sayen1
4
10:00 - 10:50Panel Discussion: At a Glance: Information Security - Ed Skoudis, John Strand, Lesley Carhart. Moderated by Dave Kennedy12:30 -12:55A Process is No One: Hunting for Token Manipulation - Jared Atkinson, Robby Winchester2
5
1:00 -1:25Fuzz your smartphone from 4G base station side - Tso-Jen Liu3
6
11:00 - 11:50Lunch - on your own1:30 - 1:55Clippy for the Dark Web: Looks Like You’re Trying to Buy Some Dank Kush, Can I Help You With That? - Emma Zaballos4
7
12:00 - 12:50IRS, HR, Microsoft and your Grandma: What they all have in common - Christopher Hadnagy, Cat MurdockI Can Be Apple, and So Can You - Josh PittsInvoke-EmpireHound - Merging BloodHound & Empire for Enhanced Red Team Workflow - Walter LegowskiThe History of the Future of Cyber-Education - Winn Schwartau12:00 - 2:25Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework - Joe Rozner5
8
1:00 - 1:50#LOLBins - Nothing to LOL about! - Oddvar MoeFrom Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It - Sean MetcalfWhen Macs Come Under ATT&CK - Richie CyrusState of Win32k Security: Revisiting Insecure design - Vishal Chauhan22:30 - 2:55Escoteric Hashcat Attacks - Evilmog6
9
2:00 - 2:50Everything Else I Learned About Security I Learned From Hip-Hop - Paul AsadoorianMS17-010? - zerosum0x0Abusing IoT Medical Devices For Your Precious Health Records - Saurabh Harit, Nick DelewskiOffensive Browser Extension Development - Michael Weber33:00 - 3:25NOOb OSINT in 30 Minutes or less! - Greg Simo and Guest Speaker7
10
3:00 - 3:50Hackers, Hugs, & Drugs: Mental Health in Infosec - Amanda BerlinThe Unintended Risks of Trusting Active Directory - Lee Christensen, Will Schroeder, Matt NelsonDetecting WMI exploitation - Michael GoughProtect Your Payloads: Modern Keying Techniques - Leo Loobeek43:30 - 3:55RFID Luggage Tags, IATA vs Real Life - Daniel Lagos8
11
4:00 - 4:50Android App Penetration Testing 101 - Joff Thyer, Derek BanksLessons Learned by the WordPress Security Team - Aaron D. CampbellGryffindor | Pure JavaScript, Covert Exploitation - Matthew ToussainJump Into IOT Hacking with the Damn Vulnerable Habit Helper Device - Nancy Snoke, Phoenix Snoke54:00 - 4:25#LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection - Carl Alexander9
12
5:00 - 5:50Draw a Bigger Circle: InfoSec Evolves - Cheryl BiswasIronPython... omfg - Marcello SalvatiInstant Response: Making IR faster than you thought possible! - Mick Douglas, Josh JohnsonEmpty64:30 - 4:55Maintaining post-exploitation opsec in a world with EDR - Michael Roberts, Martin Roberts10
13
6:00 - 6:50Concert setupHacker jeopardy setup5:00 - 5:25Hey! I found a vulnerability – now what? - Lisa Bradley, CRob11
14
7:00 - 7:505:30 - 5:55Foxtrot C2: A Journey of Payload Delivery - Dimitry Snezhkov12
15
6:00 - 6:25Ridesharks - Kaleb Brown13
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...
Main menu