08.00 |
Registration |
09.00 |
Keynote Address: Internet Explorer Security: Past, Present, and FutureTony Chor Group Program Manager, Microsoft Internet Explorer, Microsoft Corporation |
10:30 |
Refreshment Break |
|
TECHNICAL TRACK |
BUSINESS-TECH TRACK |
11:00 |
Assessing Server Security - State of the Art Roelof Temmingh, Founder, Sensepost |
|
12:00 |
Networking Luncheon |
|
13:00
|
STIF-ware Evolution Meder Kydyraliev and Fyodor Yarochkin, Co-Authors, X-Probe) |
Project Blinkenlights / Arcade Tim Pritlove (Chaos Computer Club) |
14:00 |
VoIPhreaking: How to make free phone calls and influence people The grugq, Independent Anti-Forensics Specialist |
How (and Why) to Build a Security Operations Center Mohammed Haron, Information Security Analyst, Intel Corporation |
15:00 |
Web Hacking Kung-Fu and Art of Defense Shreeraj Shah, Director Net-Square Solutions |
Corp vs Corp: Profiling Modern Espionage Roberto Preatoni, Founder Zone-H Defacement Mirror and Fabio Ghioni |
16:00 |
Refreshment Break |
|
16:30 |
Hacking Windows CE San, X-Focus China
|
Social Engineering Fundamentals Anthony Zboralski (Gaius), Founder Hackers Emergency Response Team (HERT) & Dave Mckay, Independent Security Consultant |
17:30 |
Hide-And-Seek: Defining the Roadmap for Malware Detection on Windows Joanna Rutkowska, Founder, Invisiblethings.org |
|
18:30 |
End of Day One |
08.00 |
Registration |
09.00 |
Keynote Address: Mobile MalwareMikko Hypponen, Director of Anti Virus Research, F-Secure Corp. |
10:30 |
Refreshment Break |
|
TECHNICAL TRACK |
BUSINESS-TECH TRACK |
11:00 |
Nematodes - Beneficial Worms Dave Aitel (Immunity Inc) |
|
12:00 |
Networking Luncheon |
|
13:00
|
Analyzing all that data: Techniques for sifting haystacks and finding needles. Dr. Jose Nazario, Senior Software Engineer Arbor Networks |
Cyber Skirmishes Zubair Khan, Independent Security Consultant
|
14:00 |
Wi-Fi Hotspot Security Jim Geovedi Information Security Consultant PT Bellua Asia Pacific. |
Phishing Attacks: A Guide to Self Assessment Aaron Higbee, Principal Consultant, Foundstone, a division of McAfee,Inc. |
15:00 |
Kernel Level Vulnerabilities Swaraj, Suresec UK |
Hacking Internet Banking Applications Fabrice Marie, Manager, FMA-RMS |
16:00 |
Refreshment Break |
|
16:30 |
Analyzing Code for Security Defects Nish Bhalla, VP Consulting Solutions, Security Compass |
x.25 (in)security in 2005: WHAT, WHY, WHEN, WHO, HOW |
17:30 |
Java & Secure Programming Marc Shoenefeld, Freelance Network Security Consultant |
Trends in Real World Attacks: A Compilation of Case Studies Rohyt Belani Director, Red Cliff Consulting |
18:30 |
End of Day Two |