Difference between revisions of "Village:Threat-centric"

From Electromagnetic Field
Jump to navigation Jump to search
Line 3: Line 3:
 
|Contact=timb
 
|Contact=timb
 
}}
 
}}
Threat-centric is a space for infosec related activities. Technical and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
+
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
  
 
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
 
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
Line 13: Line 13:
 
** Blue team
 
** Blue team
 
* Bugs and reverse engineering
 
* Bugs and reverse engineering
** Client side
+
** Client-side
 
** Mobile
 
** Mobile
 
** Cryptography
 
** Cryptography

Revision as of 12:32, 11 January 2016

Threat-centric

Village-Threat-centric.jpeg

Description A place to discuss infosec related activities... may include a dedicated talks track
Contact User:timb
Activities
View all Villages

Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.

In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:

  • Offensive techniques and defensive controls
    • Red team
    • Blue team
  • Bugs and reverse engineering
    • Client-side
    • Mobile
    • Cryptography
    • Internet at large
    • etc
  • Embedded/hardware hacking
  • "Deprecated" technologies
    • Modems
    • Mainframes
  • Humans
    • Activist opsec
    • Pwning the economy
    • Social engineering

Submissions:

  • Title - speakers name - format - topic