Village:Threat-centric: Difference between revisions
No edit summary |
No edit summary |
||
| Line 3: | Line 3: | ||
|Contact=timb | |Contact=timb | ||
}} | }} | ||
Threat-centric is a space for infosec related activities. Technical and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time. | Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time. | ||
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015. | Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015. | ||
| Line 13: | Line 13: | ||
** Blue team | ** Blue team | ||
* Bugs and reverse engineering | * Bugs and reverse engineering | ||
** Client side | ** Client-side | ||
** Mobile | ** Mobile | ||
** Cryptography | ** Cryptography | ||
Revision as of 12:32, 11 January 2016
| Name::Threat-centric | |
|---|---|
| Description | [[Description::A place to discuss infosec related activities... may include a dedicated talks track|]] A place to discuss infosec related activities... may include a dedicated talks track |
| Contact | Contact::User:timb |
| Activities | [[Activities::|]] |
| View all Villages | |
{{#ask:Inhabitant of::Village:Threat-centric
| mainlabel = User | ?Login#=login | ?Attendee_Name#=name |format=template |template=PictureWall |named args=yes |limit=1500 |sort=Attendee_Name }}
{{#ask:Inhabitant of::Village:Threat-centric | mainlabel = User | ?#=page | ?Attendee_Name#=name | ?Arrival#-F[D M j G:i]=arrival | ?Departure#-F[D M j G:i]=departure | ?Bringing#=bringing | ?AttendeePagename#=attendeepagename |format=template |template=InhabitantList |introtemplate=InhabitantListIntro |outrotemplate=InhabitantListOutro |named args=yes |limit=1500 |sort=Attendee_Name }}
Threat-centric is a space for infosec related activities. Technical, activist and infosec professional presentations & workshops will be accepted. Presentations ideally need to be 45 minutes long with 5 minutes for Q&A. Workshops can be either 60 or 120 minutes in length including setup/breakdown time.
Submissions must be submitted on this site (just add them below), submissions will be accepted from the beginning of March 2015.
In particular, we are looking for presentations & workshops in the following (but not exclusive) areas:
- Offensive techniques and defensive controls
- Red team
- Blue team
- Bugs and reverse engineering
- Client-side
- Mobile
- Cryptography
- Internet at large
- etc
- Embedded/hardware hacking
- "Deprecated" technologies
- Modems
- Mainframes
- Humans
- Activist opsec
- Pwning the economy
- Social engineering
Submissions:
- Title - speakers name - format - topic