Difference between revisions of "Village:Threat-centric"

From Electromagnetic Field
Jump to navigation Jump to search
Line 2: Line 2:
 
|Description=A place to discuss infosec related activities... may include a dedicated talks track
 
|Description=A place to discuss infosec related activities... may include a dedicated talks track
 
|Contact=timb
 
|Contact=timb
 +
|Location=51.21226,-0.60818
 
}}
 
}}
 
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
 
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

Revision as of 01:20, 27 July 2016

Threat-centric

Village-Threat-centric.jpeg

Description A place to discuss infosec related activities... may include a dedicated talks track
Contact User:timb
Activities
Loading map...
View all Villages

Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.

In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:

  • Offensive techniques and defensive controls
    • Red team
    • Blue team
  • Bugs and reverse engineering
    • Client-side
    • Mobile
    • Cryptography
    • Internet at large
    • etc
  • Embedded/hardware hacking
  • "Deprecated" technologies
    • Modems
    • Mainframes
  • Humans
    • Activist opsec
    • Pwning the economy
    • Social engineering

Submissions:

  • Title - speakers name - format - topic