NordicSecCon 2013 Aug. 26, 2013 to Aug. 30, 2013, Reykjavik, Iceland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Words Hanna Birna Kristjánsdóttir N/A
KEYNOTE: The InfoSec Evolution Will Be Televised – and You’re the Stars. Katie Moussouris N/A
Eight Conflicts That Changed Cyberspace. Jason Healey N/A
Operating * By the Numbers. Allison Miller N/A
Do As I Say, Not As I Do: The Law Only Has Two Sides When You Get Caught Stephen Watt N/A
Penny, Brain, and Inspector Gadget Don Andrew Bailey N/A
Attack-Driven defense Zane Lackey N/A
Polishing Chrome for Fun and Profit Nils , Jonathan Butler N/A
Plaso – reinventing the super timeline Kristinn Guðjónsson N/A
Taint Nobody Got Time for Crash Analysis II Richard Johnson N/A
Context Clues: How Today’s Security Leaders Leverage Event Metadata, Frequency & Relationships to Identify Malicious Activity Faster and Make Better Decisions Richard Johnson N/A
GoPro or GTFO: A Tale of Reversing an Embedded System Zach Lanier , Todd Manning N/A
From the Trenches: Real-World Agile SDLC Chris Eng , Ryan O’boyle N/A
F**k 0-days, We Will Pwn U with Hardware Mofos Yaniv Miron , Mc N/A
Threats in a virtual world Charlie Eriksen N/A
KEYNOTE: Ten Years Gone: A Decade of Hackf00 and the Road Ahead. Dhillon Kannabhiran N/A
How great companies fight, survive, and thrive in the era of targeted and advanced persistent threats. Jeff Stutzman N/A
h4x0r Inc? Doug Britton N/A
NSA & the end of privacy Birgitta Jónsdóttir N/A
Cloud Computing and virtual computers – Challenges in ISO/IEC standards Guðjón Viðar Valdimarsson N/A
Who goes there? The importance of authentication of identity. Arnaldur Axfjörð N/A
Upping the game: How to play advanced games with couture rootkits Josh m0nk Thomas N/A
Data Driven Web Application Security Mike Arpaia , Kyle Barry N/A
.NET: The Framework, The Myth, The Legend David Litchfield / Dissection of a database security breach. Kelly Lum N/A
The Mathematics of Wonton Burrito Meals Snare N/A
An Examination of String Allocations: IE-9 Edition Chris Valasek N/A
How to hack a country for fun and profit. David Jacoby N/A
Hacking Like in the Movies: Visualizing Page Tables for Local Exploitation Georg Wicherski , Alex Radocea N/A