Village:Threat-centric: Difference between revisions

From Electromagnetic Field
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:
|Description=A place to discuss infosec related activities... may include a dedicated talks track
|Description=A place to discuss infosec related activities... may include a dedicated talks track
|Contact=timb
|Contact=timb
|WebAddress=https://labs.portcullis.co.uk/
|Location=51.21226,-0.60818
|Location=51.21226,-0.60818
}}
}}
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
Threat-centric is a space for infosec related activities. It is hosted by the Portcullis Labs crowd who've attended both of the last 2 UK camps and who can regularly be found elsewhere on the infosec circuit.


Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.


In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:
In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:
Line 27: Line 28:
** Pwning the economy
** Pwning the economy
** Social engineering
** Social engineering
We will also be hosting a hacker jeopardy style CTF and associated treasure hunt and giving away torches and USB wristbands. Come visit us.


Submissions:
Submissions:
* Title - speakers name - format - topic
 
* Software security for hardware peeps - [[User:timb]] - Workshop - Secure development in an IoT world, a course developed for ICS engineers.


[[Category:Schedule]] <!-- added by [[User:Ms7821]] so I remember to add this to the schedule -->
[[Category:Schedule]] <!-- added by [[User:Ms7821]] so I remember to add this to the schedule -->

Revision as of 02:02, 27 July 2016

[[Location::51.21226,-0.60818|]][[MapFix::51.21226,-0.60818~Threat-centric~A place to discuss infosec related activities... may include a dedicated talks track~Village-Threat-centric.jpeg|]]
Name::Threat-centric

Village-Threat-centric.jpeg

Description [[Description::A place to discuss infosec related activities... may include a dedicated talks track|]] A place to discuss infosec related activities... may include a dedicated talks track
Contact Contact::User:timb
Web Site https://labs.portcullis.co.uk/
Activities [[Activities::|]]
Loading map...
View all Villages

{{#ask:Inhabitant of::Village:Threat-centric

| mainlabel = User | ?Login#=login | ?Attendee_Name#=name |format=template |template=PictureWall |named args=yes |limit=1500 |sort=Attendee_Name }}

{{#ask:Inhabitant of::Village:Threat-centric | mainlabel = User | ?#=page | ?Attendee_Name#=name | ?Arrival#-F[D M j G:i]=arrival | ?Departure#-F[D M j G:i]=departure | ?Bringing#=bringing | ?AttendeePagename#=attendeepagename |format=template |template=InhabitantList |introtemplate=InhabitantListIntro |outrotemplate=InhabitantListOutro |named args=yes |limit=1500 |sort=Attendee_Name }}

Threat-centric is a space for infosec related activities. It is hosted by the Portcullis Labs crowd who've attended both of the last 2 UK camps and who can regularly be found elsewhere on the infosec circuit.

Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.

In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:

  • Offensive techniques and defensive controls
    • Red team
    • Blue team
  • Bugs and reverse engineering
    • Client-side
    • Mobile
    • Cryptography
    • Internet at large
    • etc
  • Embedded/hardware hacking
  • "Deprecated" technologies
    • Modems
    • Mainframes
  • Humans
    • Activist opsec
    • Pwning the economy
    • Social engineering

We will also be hosting a hacker jeopardy style CTF and associated treasure hunt and giving away torches and USB wristbands. Come visit us.

Submissions:

  • Software security for hardware peeps - User:timb - Workshop - Secure development in an IoT world, a course developed for ICS engineers.