Village:Threat-centric: Difference between revisions

From Electromagnetic Field
Jump to navigation Jump to search
No edit summary
No edit summary
Line 10: Line 10:


* Offensive techniques and defensive controls
* Offensive techniques and defensive controls
  * Red team
* Red team
  * Blue team
* Blue team
* Bugs and reverse engineering
* Bugs and reverse engineering
  * Client side
* Client side
  * Mobile
* Mobile
  * Cryptography
* Cryptography
  * Internet at large
* Internet at large
  * etc
* etc
* Embedded/hardware hacking
* Embedded/hardware hacking
* "Deprecated" technologies
* "Deprecated" technologies
  * Modems
* Modems
  * Mainframes
* Mainframes
* Humans
* Humans
  * Activist opsec
* Activist opsec
  * Pwning the economy
* Pwning the economy
  * Social engineering
* Social engineering


Submissions:
Submissions:
* Title - speakers name - format - topic
* Title - speakers name - format - topic

Revision as of 12:21, 11 January 2016

Name::Threat-centric

Village-Threat-centric.jpeg

Description [[Description::A place to discuss infosec related activities... may include a dedicated talks track|]] A place to discuss infosec related activities... may include a dedicated talks track
Contact Contact::User:timb
Activities [[Activities::|]]
View all Villages

{{#ask:Inhabitant of::Village:Threat-centric

| mainlabel = User | ?Login#=login | ?Attendee_Name#=name |format=template |template=PictureWall |named args=yes |limit=1500 |sort=Attendee_Name }}

{{#ask:Inhabitant of::Village:Threat-centric | mainlabel = User | ?#=page | ?Attendee_Name#=name | ?Arrival#-F[D M j G:i]=arrival | ?Departure#-F[D M j G:i]=departure | ?Bringing#=bringing | ?AttendeePagename#=attendeepagename |format=template |template=InhabitantList |introtemplate=InhabitantListIntro |outrotemplate=InhabitantListOutro |named args=yes |limit=1500 |sort=Attendee_Name }}

Threat-centric is a space for infosec related activities. Technical and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.

In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:

  • Offensive techniques and defensive controls
* Red team
* Blue team
  • Bugs and reverse engineering
* Client side
* Mobile
* Cryptography
* Internet at large
* etc
  • Embedded/hardware hacking
  • "Deprecated" technologies
* Modems
* Mainframes
  • Humans
* Activist opsec
* Pwning the economy
* Social engineering

Submissions:

  • Title - speakers name - format - topic