Registration, Gathering and Networking 09:00 - 09:45
Coffee Break
Lunch Break 12:30 - 13:30
Break
Opening Words 09:45 - 10:15
KEYNOTE: The Rebellious Teenage Years: 15 years... 10:15 - 11:00
Internet of Things (IOT) Insecurity 11:15 - 12:00
The Node.js Highway: Attacks are... 12:00 - 12:30
Security Automation in the Agile SDLC - Real Wor... 13:30 - 14:15
The Spy in the Sandbox: Practical Cache Attacks... 14:15 - 15:00
Man in the Cloud Attack 15:15 - 16:00
One Class to Rule Them All: Dese... 16:00 - 16:30
Game of Hacks: Play, Hack & Track 16:40 - 17:25
Closing Words
0x3E9 Ways to DIE 11:15 - 12:00
From zero to secure in 1 minute 12:00 - 12:30
Why Are Hackers Winning the Mobile Malware Battl... 13:30 - 14:15
Too Big to Fail - Breaking WordPress Core 14:15 - 15:00
Cross-Site Search Attacks 15:15 - 16:00
Theories of Agile, Fails of Secu... 16:00 - 16:30
Certifi-gate - Front Door Access to Pwning hundr... 16:40 - 17:25