| Friday, October 14, 2016 | ||
|---|---|---|
| Talk Track | Workshop Track | |
| 8:45 | Registration Opens | |
| 9:15 | Opening Remarks | |
| 9:30 | Track 1: It’s Always Cloudy in Portland, Moderated by Esteban Gutierrez
* Hardening AWS Environments and Automating Incident Response for AWS Compromises, Andrew Krug * Margarita Shotgun - Automating Memory Capture, Joel Ferrier * Automating Attacks Against Office365, Karl Fosaaen |
none |
| 11:00 | Security BSides Portland Welcome | |
| 11:30 | Keynote Speaker: Senator Ron Wyden | |
| Noon | Lunch Sponsored by Cylance Up N' Smoke BBQ food card across the street from noon to 1:30. Please do not bring food into the convention center. |
VIP lunch by invitation in F152 |
| 12:30 | Track 2: Can you Count on your Crypto? Moderated by Saikat Chakrabarti * Cryptowarez: a survey of Open and Closed Hardware Crypto Devices, Josh Datko * TPM: trojan horse or boat anchor?, Vim * High Assurance Cryptography, Joey Dodds |
|
| 1:00 | Elk All The Things: Security Analytics for the Masses Travis Smith |
|
| 1:30 | ||
| 2:00 | Track 3: Threaty McThreatMap, Moderated by Dylan McNamee * DDoS Defense for a Community of Peers, Jem Berkes * Latest evasion techniques in fileless malware, Virginia Robbins * Blacklisting Badguys With IPTables, Gary Smith |
|
| 2:30 | ||
| 3:00 | Exploring the IoT for fun, Bob Lohil |
|
| 3:30 | Track 4: Rootkits, Backdoors, and Implants, Moderated by Rodrigo Branco * HORSEPILL: a New Kind of Linux Rootkit, Michael Leibowitz * NumChecker: A System Approach for Kernel Rootkit Detection and Identification, Xiaofei (Rex) Guo and Xueyang Wang * The Tao of Hardware, The Te of Implants, Joe FitzPatrick * Experiments with Optical Covert Channels, Joe Grand |
|
| 4:00 | ||
| 4:30 | ||
| 5:00 | Break | |
| 6:00 | Quiz Show | |
| Saturday, October 14, 2016 | ||
|---|---|---|
| Talk Track | Workshop Track | |
| 8:30 | Registration Opens | |
| 9:00 | Track 5: Security & Usability for *Ops, Moderated by Marie VanCleave * Using LangSec in Penetration Testing, Falcon Darkstar Momot * Mad Data Science: Threat Hunting with Machine Learning, Ken Westin * Firmware Tools for Security Researchers, Lee Fisher |
The Modern SOC: Adapting the Security Operations Model to How We Work, Josh Pyorre |
| 9:30 | ||
| 10:00 | ||
| 10:30 | Track 6: Security & Usability for End Users, Moderated by Rebekah Brown * Secret BFFs: Security and Usability, Morgan Miller * Selling the Brooklyn Bridge: Can historic scams, cons and flimflam teach us ways to stop social engineering and educate end-users on cybercrime?, Kevin Haley * Securing the End User - Patching the End User, Isaac Robinson |
|
| 11:00 | Hands-on embedded programming with Black Magic and the lights on, Piotr Esden-Tempski |
|
| 11:30 | ||
| 12:00 | Lunch Sponsored by Symantec Ramy's Lamb Shack food cart across the street from 11:30 to 1:30 Please do not bring food into the convention center. |
|
| 12:30 | Track 7: Security & Education, Moderated by Topher Timzen * Sending the Elevator Back Down: * Getting Youth Interested in Security, Travis Smith * Privacy, Security and Crayons - Security Concepts for Kids, Tiberius Hefflin * A "Divergent"-themed CTF and Urban Race for Introducing Security and Cryptography, Wu-chang Feng |
|
| 1:00 | ||
| 1:30 | ||
| 2:00 | Track 8: War Stories and Lessons Learned, Moderated by TBA * So, you want to build an application security practice?, Ian Melven * 101 ways to brick your hardware in 10100 minutes, Joe & Joe * Securing the Software Engineering Process, Jeff Costlow |
|
| 2:30 | ||
| 3:00 | ||
| 3:30 | Track 9: Hardware is the new Software, Moderated by Jesse Michael * Why I hate the Raspberry Pi, Travis Paakki * Vulnerability Hunting in Access Control Systems, Bobby Kuzma * Making embedded programming fun with Black Magic, Piotr Esden-Tempski |
|
| 4:00 | ||
| 4:30 | ||
| 5:00 | Closing Remarks | |