t2 2017 Oct. 26, 2017 to Oct. 27, 2017, helsinki,finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote David Aitel It's a Keynote!
Social engineering - Hacking your mind Pete Poskiparta Why social engineering is possible? How it works, why it works and what is the ...
T vs T or Why my offensive punch beats your forensics stance Hugo Teso Last year, right after 2016 edition of t2 infosec, a challenge was placed, and accepted. ...
Exploring enterprise Wi-Fi security with Aruba Christoffer Jerkeby Gaining keys to the castle through enterprise Wi-Fi. Access points designed to add mobility to ...
Lua code: security overview, practical approaches to static analysis, MSL tool Andrei Costin Abstract—Lua is an interpreted, cross-platform, embeddable, performant and low-footprint language. Lua's popularity is on the ...
Black Hat Locksmithing (with added Abloy) Matt Smith When locksmiths go bad. Black hat lockpicking has been around forever but it is very ...
Red Teaming Probably Isn't For You Toby Kohlenberg This talk will be an overview of what red teaming actually is; where it came ...
Amazon Web Services Security Tips Dave Walker In addition to discussing various AWS authorisation tips and tweaks to ensure API and asset ...
Breaking Tizen Amihai Neiderman Tizen​ ​is​ ​samsung's​ ​newest​ ​OS​ ​for​ ​it's​ ​devices​ ​and​ ​considered​ ​by​ ​them​ ​as​ ​the​ ​operation ...
Offensive Malware Analysis Patrick Wardle In this talk, we'll focus on the 'B' variant of FruitFly that even now, is ...
A little review of security challenges in Silicon Photonics integrated circuits. Alexander Bolshev Silicon photonics is the study and application of photonic systems which use silicon as an ...