Hackfest2020 2020 Nov. 20, 2020 to Nov. 21, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
You Shared What? Seriously?! Don Mallory This is that conversation which needs to happen between a parent and their teenage child ...
Behavior & Reputation based filtering reloaded Philippe Koechlin Did you know that, every day across the Internet, each IP address is scanned hundreds ...
Urban Exploration - A COVID-Friendly Hacker Hobby Johnny Xmas With North America famously leading the way in industrial production and technological innovation in its ...
Automatisation de la sécurité dans AWS Cédric Thibault Alors que l'infrastructure se codifie de plus en plus dans les environnements Cloud, la sécurité ...
Prévention et détection de fraude en Télécom Véronique Meunier Prévention et détection de fraude en Télécommunications: un monde qui se rapproche de plus en ...
Chatty documents: OSINT data from document mapping Enrico Branca How difficult it is to acquire actionable intelligence if no active technique could be used? ...
Talos: Threats and Dual-Use Tools in the Landscape William Largent Cisco's Talos team specializes in early-warning intelligence and threat analysis necessary for defending networks against ...
Fantastic Cloud Shadow Admins and where to find Asaf Hecht Cloud adoption is on the rise and so is the risk of having Shadow Admins. ...
Making a High Performing Pentest Team From Scratch Darren Chin Starting with a single highly motivated co-op intern, Darren has spent the past number of ...
XFS: The Protocol behind ATM Jackpotting Alexandre Beaulieu 10 years ago, Barnaby Jack famously showed the world that ATMs could be jackpotted. Has ...
Conférence sur les perspectives d'emploi en cybersécurité Steve Waterhouse Lors de cette conférence, nous discuterons des perspectives d'emploi en sécurité de l'information et nous ...
De la cybervictimisation à la résilience : 12 clés Michaël Giguère À 13 ans et alors qu'il vivait les premiers instants du World Wide Web mainstream ...
All Software is Open Source: An Introduction to RE Dmitriy Beryoza Commercial software is full of dark secrets - embedded keys and passwords, hidden backdoors, security ...
Trust, but Verify: Maintaining Democracy In Spite Allie mellen In this session, we’ll discuss how Russia has influenced worldwide elections using cyberwarfare and how ...
Lightspeed SQL Injections Ruben Ventura This presentation will focus on private and new optimized SQL injection exploitation methods.New private tools ...
The Spoon Problem with: Life, Hacking & InfoSec Jayson E. Street It's the start of a new decade (please no arguing about that let's just say ...