Hackfest2020 2020 Nov. 20, 2020 to Nov. 21, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
You Shared What? Seriously?! | Don Mallory | This is that conversation which needs to happen between a parent and their teenage child ... | |
Behavior & Reputation based filtering reloaded | Philippe Koechlin | Did you know that, every day across the Internet, each IP address is scanned hundreds ... | |
Urban Exploration - A COVID-Friendly Hacker Hobby | Johnny Xmas | With North America famously leading the way in industrial production and technological innovation in its ... | |
Automatisation de la sécurité dans AWS | Cédric Thibault | Alors que l'infrastructure se codifie de plus en plus dans les environnements Cloud, la sécurité ... | |
Prévention et détection de fraude en Télécom | Véronique Meunier | Prévention et détection de fraude en Télécommunications: un monde qui se rapproche de plus en ... | |
Chatty documents: OSINT data from document mapping | Enrico Branca | How difficult it is to acquire actionable intelligence if no active technique could be used? ... | |
Talos: Threats and Dual-Use Tools in the Landscape | William Largent | Cisco's Talos team specializes in early-warning intelligence and threat analysis necessary for defending networks against ... | |
Fantastic Cloud Shadow Admins and where to find | Asaf Hecht | Cloud adoption is on the rise and so is the risk of having Shadow Admins. ... | |
Making a High Performing Pentest Team From Scratch | Darren Chin | Starting with a single highly motivated co-op intern, Darren has spent the past number of ... | |
XFS: The Protocol behind ATM Jackpotting | Alexandre Beaulieu | 10 years ago, Barnaby Jack famously showed the world that ATMs could be jackpotted. Has ... | |
Conférence sur les perspectives d'emploi en cybersécurité | Steve Waterhouse | Lors de cette conférence, nous discuterons des perspectives d'emploi en sécurité de l'information et nous ... | |
De la cybervictimisation à la résilience : 12 clés | Michaël Giguère | À 13 ans et alors qu'il vivait les premiers instants du World Wide Web mainstream ... | |
All Software is Open Source: An Introduction to RE | Dmitriy Beryoza | Commercial software is full of dark secrets - embedded keys and passwords, hidden backdoors, security ... | |
Trust, but Verify: Maintaining Democracy In Spite | Allie mellen | In this session, we’ll discuss how Russia has influenced worldwide elections using cyberwarfare and how ... | |
Lightspeed SQL Injections | Ruben Ventura | This presentation will focus on private and new optimized SQL injection exploitation methods.New private tools ... | |
The Spoon Problem with: Life, Hacking & InfoSec | Jayson E. Street | It's the start of a new decade (please no arguing about that let's just say ... |