Difference between revisions of "Village:Threat-centric"

From Electromagnetic Field
Jump to navigation Jump to search
(Created page with "{{Village |Description=A place to discuss infosec related activities... may include a dedicated talks track |Contact=timb }}")
 
Line 3: Line 3:
 
|Contact=timb
 
|Contact=timb
 
}}
 
}}
 +
Threat-centric is a space for infosec related activities. Technical and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
 +
 +
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
 +
 +
In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:
 +
 +
* Offensive techniques and defensive controls
 +
  * Red team
 +
  * Blue team
 +
* Bugs and reverse engineering
 +
  * Client side
 +
  * Mobile
 +
  * Cryptography
 +
  * Internet at large
 +
  * etc
 +
* Embedded/hardware hacking
 +
* "Deprecated" technologies
 +
  * Modems
 +
  * Mainframes
 +
* Humans
 +
  * Activist opsec
 +
  * Pwning the economy
 +
  * Social engineering
 +
 +
Submissions:
 +
* Title - speakers name - format - topic

Revision as of 12:20, 11 January 2016

Threat-centric

Village-Threat-centric.jpeg

Description A place to discuss infosec related activities... may include a dedicated talks track
Contact User:timb
Activities
View all Villages

Threat-centric is a space for infosec related activities. Technical and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.

In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:

  • Offensive techniques and defensive controls
 * Red team
 * Blue team
  • Bugs and reverse engineering
 * Client side
 * Mobile
 * Cryptography
 * Internet at large
 * etc
  • Embedded/hardware hacking
  • "Deprecated" technologies
 * Modems
 * Mainframes
  • Humans
 * Activist opsec
 * Pwning the economy
 * Social engineering

Submissions:

  • Title - speakers name - format - topic