• Goa'19
  • Schedule

Schedule Goa 2019

YOUR ITINERARY FOR Goa 2019

Type Dates Start End Training Name Venue
3 Days Training 26th Feb - 28th Feb 9.00 AM 5.30 PM Black Belt in Reverse Engineering Novotel Goa Dona Sylvia Resort Hotel
9.00 AM 5.30 PM Windows Kernel Exploitation Advanced
9.00 AM 5.30 PM Offensive HTML, SVG, CSS and other Browser-Evil Holiday Inn Resort Goa
9.00 AM 5.30 PM Pentesting the Modern Application Stack The Byke Old Anchor Beach Resort - South Goa
9.00 AM 5.30 PM Breaking and Owning Applications and Servers on AWS and Azure
9.00 AM 5.30 PM Advanced Infrastructure Security Assessment
9.00 AM 5.30 PM Practical IoT Hacking
2 Days Training 27th Feb - 28th Feb 9.00 AM 5.30 PM Practical DevSecOps - Continuous Security in the age of cloud Holiday Inn Resort Goa
9.00 AM 5.30 PM Secure Code Development Boot Camp
9.00 AM 5.30 PM Practical 3G / 4G Security and Attacks
9.00 AM 5.30 PM Audit +++
9.00 AM 5.30 PM Practical RFID / NFC Hacking
9.00 AM 5.30 PM Building An Attack Monitoring Solution & Hardening Infrastructure Services
9.00 AM 5.30 PM Mobile Application Hacking - Master Class Novotel Goa Dona Sylvia Resort Hotel
9.00 AM 5.30 PM Practical Side-channel Attacks Radisson Blu
28th Feb 2019
Ballroom A Ballroom B+C
19:30 to 20:30 Registration
20:30 to 21:00 A Hacker Walks into a Co-Working Space by Rahul Binjve Speaker Cocktail (Invite Only)
21:00 to 21:30 Andromeda - GUI based Dynamic Instrumentation Toolkit powered by Frida by Shivang Desai
21:30 to 22:00

1st March 2019
Ballroom A Ballroom B+C Carnival Woto Activity Room CTF Arena
8:00 to 9:30 Registration
9:40 to 10:00 Welcome Note
10:00 to 10:45 Keynote by Adam Laurie
10:45 to 11:00 BREAK
11:00 to 12:00 The sate of Malware from the Eye of the Tiger by Martijn Grooten BountyCraft Track: Bug hunters methodology v3.0 by Jason Haddix Flashback Track: Cybersecurity and Privacy from the Global Lens by Eva Galperin Hardware , SCADA & Battle Underground CTFs
12:00 to 13:00 Boardroom Discussion: "Clash of the Titans ; who will survive ? " PEW PEW PEW: Designing Secure Boot Securely by Niek Timmers & Albert Spruyt Flashback Track: Pentesting without Pentesters - Automating Security Testing with Functional Testing Test Cases by Lavakumar Kuppan & Ankita Gupta
13:00 to 14:00 Lunch
14:00 to 14:45 Boardroom Discussion: "Breached ? – Here is how I responded ! " Introducing the ASVS 4.0 by Andrew van der Stock BountyCraft Track: How to use Bug Bounty to Start a Career in Silicon Valley by Adam Ruddermann Flashback Track: The Windows Sandbox Paradox by James Forshaw Workshop: Using Containers, Kubernetes and Serverless to automate appsec and OSINT workflows by Akash Mahajan & Abhisek Datta Hardware , SCADA & Battle Underground CTFs
14:45 to 15:30 Boardroom Discussion: "Clear and Present Danger: Cyber Wars will Target Critical Infrastructure" Another Place, another Time - GPS threats and countermeasures by Stephan Gerling BountyCraft Track: Getting to $10,000 – the variables at play in determining bounty awards by Jarek Stanley Flashback Track: Building an intelligence analysis systems using open source tools By Fyodor Yarochkin
15:30 to 16:00 BREAK
16:00 to 16:45 Boardroom Discussion: "Cybersecurity: Is Machine Learning the Answer?" Unlocking iPhones on the Cheap by Josheph Cox BountyCraft Track: Best of Google VRP 2018 by Daniel Stelter-Gliese Flashback Track: Hardware Backdooring is Practical by Jonathan Brossard Workshop: Rise of the Machinez by Anto Joseph Hardware , SCADA & Battle Underground CTFs
16:45 to 17:30 Hackers Horror Stories A Monitoring Platform for Kubernetes Cluster Security by Vincent & Valentine BountyCraft - The Panel Flashback Track: Dirty use of USSD Codes BY Ravi Borgaonkar
19:00 to 22:00 Invite only Nullcon Networking Party
2nd March 2019
Ballroom A Ballroom B+C Carnival Woto Activity Room CTF Arena
8:00 to 9:30
10:00 to 10:45 Keynote Panel - "Hacking Elections for Fun & Profit: Disinformation & Cognitive Cyber Offence "
10:45 to 11:00 BREAK
11:00 to 12:00 Boardroom Discussion: "Navigating Risk in the Changing Business and Technology Landscape" Early Detection of Malicious Patterns in Event-Straming Data by Hyrum Anderson Security alarm system — feeling of security or cause for alarm? By Kirils Solovjovs Flashback Track: Everything is Quantum by Jaya Baloo WINJA CTF Hardware , SCADA & Battle Underground CTFs
12:00 to 13:00 Boardroom Discussion: "The Myth of Sisyphus Secure Product Development " Introduction to STIX/TAXII 2 Standards by Allan Thomson Fuzzing embedded (trusted) operating systems using AFL by Martijn Bogaard Desi Jugaad
13:00 to 14:00 Lunch
14:00 to 14:45 Boardroom Discussion: "Actionable Intelligence and Cyber Security " How to build your own Infosec Company - An ode to the boutique, not the Behemoth by Dr. Mario Heiderich Building Hardenend IoT Implementations with LangSec by Prashant Anantharaman Flashback Track: Automatic Automotive Hacking by Craig Smith WINJA - Quizzarena! SCADA Workshop
14:45 to 15:30 Boardroom Discussion: "OT & IoT Risk management Strategy for CISOs" Unlocking secrets of the Proxmark3 RDV4.0 by Kevin Barker EDR Internals and Bypasses by Christopher Vella Resume Clinic WINJA - Resume Clinic
15:30 to 16:00 BREAK
16:00 to 16:45 Legal & Policy Session by Access Now Attacking & Securing HealthCare Standards & hospital secured systems by Ajay Pratap Singh StartVille Resume Clinic Cyber Range Workshop
16:45 to 17:30 Closing Keynote by Dhillon Kannabhiran
17:30 to 18:00 Prize Distribution

Copyright © 2023 | Nullcon India | International Security Conference | All Rights Reserved