CanSecWest 2010 Agenda

/, Security Conferences/CanSecWest 2010 Agenda

Canada’s premier conference is starting tomorrow, March 24! CanSecWest is the most comprehensive and advanced applied digital security event in North America. With cutting-edge speakers delving into a host of highly-informative and highly-technical sessions, this is one security conference you would not want to miss.

Unlike most events, CanSecWest features a single track of presentations, distilling all the latest, emergent infosec knowledge and techniques into a single focused series of talks. Here is the schedule for this event:

Wednesday March 24
10:30 – 13:00 Registration
13:00 – 14:00 Internet Nails – Marcus Ranum, Tenable
14:00 – 15:00 Under the Kimono of Office Security Engineering – Tom Gallagher & David Conger, Microsoft
15:00 – 15:30 Break
15:30 – 16:30 Automated SQL Ownage Techniques – Fernando Federico Russ, Core
16:30 – 17:30 Can you still trust your network card? – Yves-Alexis Perez & Loïc Duflot
Thursday March 25
08:30 – 09:00 Registration & Breakfast
09:00 – 10:00 SEH overwrite and its exploitability – Shuichiro Suzuki, Fourteenforty
10:00 – 10:30 Second Breakfast
10:30 – 11:30 There’s a party at ring0, and you’re invited. – Julien Tinnes & Tavis Ormandy, Google
11:30 – 12:30 Babysitting an army of monkeys: an analysis of fuzzing 4 products with 5 lines of Python – Charlie Miller, Independent Security Evaluators
12:30 – 13:30 Lunch
13:30 – 14:30 ShareREing is Caring – Halvar Flake and Sebastian Porst, zynamics GmbH
14:30 – 15:30 Cisco IOS Exploitation with IODIDE – Andy Davis, KPMG
15:30 – 16:00 Break
16:00 – 17:00 Random tales from a mobile phone hacker – Collin Mulliner
17:00 – 18:00 Legal Perspectives of Hardware Hacking – Jennifer Granick, EFF
18:00 – 19:00 Lightning Talks – Various
20:00 – 1:00 Party – Venue TBA
Friday March 26
08:30 – 09:00 Breakfast
09:00 – 10:00 Stuff we don’t want on our Phones: On mobile spyware and PUPs – Jimmy Shah, McAfee, Inc
10:00 – 10:30 Second Breakfast
10:30 – 11:30 Practical Exploitation of Modern Wireless Devices – Thorsten Schroeder and (contributing) Max Moser, Dreamlab Technologies
11:30 – 12:30 RFID Hacking at Home – Dr. Melanie Rieback, Vrije Universiteit Amsterdam
12:30 – 13:30 Lunch
13:30 – 14:30 Advanced Mac OS X Physical Memory Analysis – Matthieu Suiche
14:30 – 15:30 Full Process Analysis and Reconstitution of a Virtual Machine from the Native Host – James Butler, MANDIANT
15:30 – 16:00 Break
16:00 – 17:00 Through the Looking Glass: An Investigation of Malware Trends and Response Activity – Jeff Williams, Microsoft
17:00 – 18:00 The Jedi Packet Trick takes over the Deathstar: taking NIC backdoors to the next level – Arrigo Triulzi, Independent Security and Networking Consultant
18:00 – 19:00 C8H10N4O2 and C2H6O (and teardown)
We’re sure a lot of you are waiting for a few of these session and what they have in store. If you’re going to the conference and want to meetup, leave a comment below.
2017-03-12T17:40:13-07:00 March 23rd, 2010|Parties, Security Conferences|1 Comment

One Comment

  1. Anup March 24, 2010 at 9:13 am

    Cool site. Liked it 🙂

Leave A Comment