- Schedule
- Venue
- Speakers
- Training
- CFP
- Volunteer
- Recreation
- Blackshield Awards
- CTF
- Sponsors
- Exhibition
- Job Fair
- CXO Track
- Goa'17
- About Schedule
SCHEDULE GOA 2017
YOUR ITINERARY FOR GOA 2017
Start | End | Training | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 17:00 | Training 1 | The Byke's Old Anchor Resort, Goa | Practical IoT Hacking | Aseem Jakhar |
9:00 | 17:00 | Training 2 | The Byke's Old Anchor Resort, Goa | Advanced Infrastructure Security Assessment Training | Abhisek Datta & Omair |
9:00 | 17:00 | Training 3 | The Byke's Old Anchor Resort, Goa | Assessing And Exploiting Industrial Control Systems | Justin Searle |
9:00 | 17:00 | Training 4 | The Byke's Old Anchor Resort, Goa | Cloud Security For Devs & Ops | Akash Mahajan & Riyaz Walikar |
Start | End | Training | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 17:00 | Training 1 | The Byke's Old Anchor Resort, Goa | Practical IoT Hacking | Aseem Jakhar |
9:00 | 17:00 | Training 2 | The Byke's Old Anchor Resort, Goa | Advanced Infrastructure Security Assessment Training | Abhisek Datta & Omair |
9:00 | 17:00 | Training 3 | The Byke's Old Anchor Resort, Goa | Assessing And Exploiting Industrial Control Systems | Justin Searle |
9:00 | 17:00 | Training 4 | The Byke's Old Anchor Resort, Goa | Cloud Security For Devs & Ops | Akash Mahajan & Riyaz Walikar |
9:00 | 17:00 | Training 5 | Holiday Inn Resort, Goa | The Web Application Hacker's Handbook, Live Edition | Marcus Pinto |
9:00 | 17:00 | Training 6 | Holiday Inn Resort, Goa | Practical RFID/NFC Hacking Training | Adam Laurie |
9:00 | 17:00 | Training 7 | Holiday Inn Resort, Goa | Low level Hardware reversing (Basic) | Javier-Vazquez Vidal & Ferdinand |
9:00 | 17:00 | Training 8 | Holiday Inn Resort, Goa | Audit +++ (OPSE Certification) | Joerg Simon |
9:00 | 17:00 | Training 9 | Holiday Inn Resort, Goa | Xtreme Android Exploitation Lab | Anant Shrivastava & Anto Joseph |
9:00 | 17:00 | Training 10 | Holiday Inn Resort, Goa | Understanding and Exploiting Cryptography & PKI Implementations |
Ajit Hatti |
9:00 | 17:00 | Training 11 | Holiday Inn Resort, Goa | Windows Kernel Exploitation | Ashfaq Ansari |
Start | End | Training | Venue | Training Name | Trainer Names |
---|---|---|---|---|---|
9:00 | 17:00 | Training 1 | The Byke's Old Anchor Resort, Goa | Practical IoT Hacking | Aseem Jakhar |
9:00 | 17:00 | Training 2 | The Byke's Old Anchor Resort, Goa | Advanced Infrastructure Security Assessment Training | Abhisek Datta & Omair |
9:00 | 17:00 | Training 3 | The Byke's Old Anchor Resort, Goa | Assessing And Exploiting Industrial Control Systems | Justin Searle |
9:00 | 17:00 | Training 4 | The Byke's Old Anchor Resort, Goa | Cloud Security For Devs & Ops | Akash Mahajan & Riyaz Walikar |
9:00 | 17:00 | Training 5 | Holiday Inn Resort, Goa | The Web Application Hacker's Handbook, Live Edition | Marcus Pinto |
9:00 | 17:00 | Training 6 | Holiday Inn Resort, Goa | Practical RFID/NFC Hacking Training | Adam Laurie |
9:00 | 17:00 | Training 7 | Holiday Inn Resort, Goa | Low level Hardware reversing (Basic) | Javier-Vazquez Vidal & Ferdinand |
9:00 | 17:00 | Training 8 | Holiday Inn Resort, Goa | Audit +++ (OPSE Certification) | Joerg Simon |
9:00 | 17:00 | Training 9 | Holiday Inn Resort, Goa | Xtreme Android Exploitation Lab | Anant Shrivastava & Anto Joseph |
9:00 | 17:00 | Training 10 | Holiday Inn Resort, Goa | Understanding and Exploiting Cryptography & PKI Implementations |
Ajit Hatti |
9:00 | 17:00 | Training 11 | Holiday Inn Resort, Goa | Windows Kernel Exploitation | Ashfaq Ansari |
Night Track
Start | End | Ballroom A | Ballroom B+C |
---|---|---|---|
17:00 | 20:30 | Registration | |
20:30 | 21:00 | Blackshield Awards | |
21:00 | 21:20 | BountyCraft | NULL Community Talk |
21:20 | 21:40 | The Mirai BotNet and where DDoS attacks are headed by Ben Herzberg | |
21:40 | 22:00 | Case Study on RFID (proximity cards) hacking by Sarwar Jahan & Ashwath Kumar | |
22:00 | 22:20 | Hackers! Do we shoot or do we hug? By Edwin Van Andel |
Start | End | Ballroom A | Ballroom B+C | Carnival | CXO Track (Exhibition Area) |
Woto |
---|---|---|---|---|---|---|
8:30 | 9:45 | Registration | ||||
9:45 | 10:00 | Opening Note | ||||
10:00 | 10:45 | Keynote By Joshua Pennel - Silicon: Security's New Layer | ||||
10:45 | 11:00 | BREAK | ||||
11:00 | 12:00 | How to be successful in the Azure bug bounty by Michael Hendrickx | Antivirus Evasion Reconstructed - Veil 3.0 by Christopher Truncer | CXO Panel "Digital warriors: India and the Future of Conflict on the Internet" | ||
12:00 | 13:00 | Increasing your impact on Facebook Bug Bounty by Jack Whitton | Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em' by Daniel Bohannon | CXO Panel "Breach Response - Time to shake up the status quo" | ||
13:00 | 14:00 | LUNCH | ||||
14:00 | 14:45 | Great Bugs in Google VRP in 2016 by Martin Straka, Karshan Sharma | Nearly generic fuzzing of XML-based formats by Nicolas Gregoire | Workshop Introduction to Logical Windows Privilege Escalation by James Forshaw |
CXO Panel "Securing Critical National Infrastructure" | ICS Village by Arun Mane |
14:45 | 15:30 | Bug Bounty Reports - How do they work by Adam Bacchus | Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov | CXO Panel "Cyber-Security Blue-Print for a Future!" | [WORKSHOP - Invite Only] Digital & Social Media Forensic by Manu Zacharia | |
15:30 | 16:00 | BREAK | ||||
16:00 | 16:45 | How to Interact with Bug Bounty Programs by Faraz | Barbarians at the Gate(way) by Dave Lewis | Workshop Adversarial Machine Learning by Anto Joseph |
CXO Panel "Hardware Security: Foundational Block of Cyber Battlefield" | [WORKSHOP - Invite Only]Digital & Social Media Forensic by Manu Zacharia |
16:45 | 17:15 | Address by Guest of Honor, Shri Alok Joshi (IPS), Chairman NTRO | ||||
17:15 | 17:45 | Hackers InSight | ||||
19:30 | 22:00 | Invite only Nullcon Networking Party |
Start | End | Ballroom A | Ballroom B+C | Carnival | CXO Track (Exhibition Area) |
---|---|---|---|---|---|
8:30 | 9:30 | Breakfast with Winja (Invite Only) |
|||
10:00 | 10:45 | Keynote by Karsten Nohl - When enough is enough: The limits of desirable security. | |||
10:45 | 11:00 | BREAK | |||
11:00 | 12:00 | Training Machines for Application Scanning in Retro Style by Bharadwaj Machiraju | Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda & Timo Kreuzer | Winja CTF | CXO Panel - Challenges in securing the cloud |
12:00 | 13:00 | Explorer's Guide to Shooting Satellite Transponders by Jay Turla | Case study of SS7/Sigtran assessment by Akib Sayyed | CXO Panel - Application Security Opportunities and Challenges in a DevOps World | |
13:00 | 14:00 | LUNCH | |||
14:00 | 14:45 | Hacking medical devices and infrastructure by Anirudh Duggal | 7 sins of ATM protection against logical attacks by Timur Yunusov | [Workshop] Security Testing of Docker Containers and Applications by Akash Mahajan |
DevOpSec: Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane |
14:45 | 15:30 | The Art of Bootloader Unlocking: Exploiting Samsung Sboot by Nitay Artenstein | Blockchain and security : bank and insurance applications by Renaud Lifchitz | Engineering Better Security at Facebook by Karen Sittig | |
15:30 | 16:00 | BREAK | |||
16:00 | 16:45 | p≡p ≡ pretty Easy privacy: making privacy the default for everyone by SVA | Injecting Security into Web apps with Runtime Patching and Context Learning by Ajin Abraham | Social Engineering Village by Neelu Tripathy | Agility with security mitigations in Windows 10 by Swamy Nagaraju |
16:45 | 17:30 | Closing Keynote by Ashish K - NextGeneration Threat detection using AI | BOF Quiz |