Difference between revisions of "Village:Threat-centric"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
|Description=A place to discuss infosec related activities... may include a dedicated talks track | |Description=A place to discuss infosec related activities... may include a dedicated talks track | ||
|Contact=timb | |Contact=timb | ||
+ | |Location=51.21226,-0.60818 | ||
}} | }} | ||
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time. | Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time. |
Revision as of 01:20, 27 July 2016
Threat-centric | |
---|---|
Description | A place to discuss infosec related activities... may include a dedicated talks track |
Contact | User:timb |
Activities | |
View all Villages |
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:
- Offensive techniques and defensive controls
- Red team
- Blue team
- Bugs and reverse engineering
- Client-side
- Mobile
- Cryptography
- Internet at large
- etc
- Embedded/hardware hacking
- "Deprecated" technologies
- Modems
- Mainframes
- Humans
- Activist opsec
- Pwning the economy
- Social engineering
Submissions:
- Title - speakers name - format - topic