BSides Newcastle 2023 Programme

Page 1

BSides NCL 2023

30th September

Organizers Room Battle Bots Cyborg Implantation

Vendors

Track 1: Resting Breach

Face

Track 2

Papa Don’t Breach

Track 3: Son Of A Breach Workshops
CTF
Start Time Fin sh Time Track One Rest ng Breach Face Track Two Papa Don't Breach Track Three: Son of a Breach Workshops: Kentucky Fried F shing 830am Registrat on networking faffing etc 900am 915am BsidesNC Team We come Intros, Sing-alonga-BS desNCL (track one) 915am 945am Keynote - Lee Morton aka D34thbutch3r - "They know more than you they do t for the big compan es!" - or do they? (track one) 945am 1015am Jon Henry - Cyber Roots Talk 1 - Tom Blue - An introduction to assemb y and reverse engineer ng Ta k 2 - Akolade "Kay" Adela aShifting Smart By Bui ding Up Your Security Champ ons Marcus Tenorio - ook at me! Im the manager now Becoming a Security Engineer Manager common pitfal s, lessons and more L ghtning Speakers Workshop - James Bore 1020am 1050am Vivian Band - Tales of the Notorious BGP Talk 1 - ymit Khondhu - Why Oh Why! The confusion with SOC and IR Talk 2 - Andrew Carr - Can an o d( sh) dog learn new (cyber tr cks? Michae amb - The Th nking Ana yst Unlock ng Core SOC Ana ysis Ski ls 1050am 1115am Break - 30mins 1115am 1145am Brian Whe ton - Del ver ng the Fa l The Post Off ce T Scanda Mark Goodw n - What Your Browser Can Teach You About Secure Design Gerald Benischke - Precis on Mun tions for Denial of Serv ce L ghtning Speakers Workshop - James Bore 1150am 1220pm Tom Wise - R sk Based Response w th SOAR Me ina Phi l ps - Dude check your privi ege! - Pr v leged Account Management Solut ons and how they could either become your best e or total y ruin your day remote) 1225pm 1255pm Kat e McMi lan - Dont be a Data Dummy El za-May Austin - Horror Stories When its good its great, when its bad t F*$^%$g Stinks Jake KeastRussian Rou ette: Hacktiv sm in the M ddle East 100pm 145pm Lunch and Tinfo l hats - 45 mins Start Time Fin sh Time Track One: Rest ng Breach Face Track Two Papa Dont Breach Track Three: Son of a Breach Workshops: Kentucky Fried F shing 145pm 215pm Scrannote - Jerry Gamb in - Open Source Vulnerabi ity ntel igence A Key to Proact ve Defense (track one) L ghtning Speakers Workshop Prep / Ta king Honing 220pm 250pm L ghtn ng Workshop Speakers Maya Boeckh - "I dont know what Im doing " - A hitchh kers guide to impostor syndrome Mark Goodw n - Return of the Robots Talk) 255pm 325pm Return of the Robots - Workshop 330pm 400pm Break - 30 mins 400pm 440pm BSidesNC Alumni Pane Rosie Anderson Jerry Gamb in Ian Thornton-Trump K mberley Hendry - The Mande a Effect - Cybermythbusting Return of the Robots - Workshop L ghtning Speakers Workshop - Feedback 440pm 445pm Ben Docherty and Sam Humphr es - Ce ebrat ng the ife of Duncan McAlynn (track one) 445pm 515pm Locknote Ros e Anderson - deas ive Forever (track one) 515pm 530pm BSidesNC Team - C osing awards, and fucking off to the pub (track one) 700pm Onwards You’re in Bens hands now

keynotes

KEYNOTE

LEEMORTONAKAD34THBUTCH3R

"THEYKNOWMORETHANYOU,THEYDOITFORTHEBIG COMPANIES!"-ORDOTHEY?

9:15

LEEMORTON

OPENINGKEYNOTE

SCRANNOTE

JERRYGAMBLIN

OPENSOURCEVULNERABILITYINTELLIGENCE:AKEYTO

PROACTIVEDEFENSE(TRACKONE)

13:45

JERRYGAMBLIN

SCRANNOTE

LOCKNOTE

ROSIEANDERSONAKALADYCYBERROSIE

IDEASLIVEFOREVER

16:45

ROSIEANDERSON

LOCKNOTE

track 1

Resting Breach face

CYBERROOTS

WITHALLTHECYBER-THISANDCYBER-THAT,WHATDOESITEVENMEAN?LET’SDIVEDEEPINTOTHEORIGINOF‘CYBER’TOUNDERSTANDTHEROOTSOF THETERMWHILELOOKINGATTHEEARLYHISTORYOFCYBERNETICS.LET’STRYTOUNDERSTANDHOWWEGOTHERE,INAWORLDWHERECYBER SECURITYPRACTITIONERSAREINACONSTANTBATTLETOPRESERVETHEINTEGRITY,AUTHENTICITYANDACCESSTOINFORMATIONANDSECUREOUR LIVESANDBUSINESS.

WESTARTBYLOOKINGATTHESOURCE[NOTCODE]OFCYBERBYUNDERSTANDINGCYBERNETICS.WEWILLDIVEINTOSOMEOFTHEWORKSOFNORBERT WIENER,GUYDEBORD,ALVINTOFFLERANDWILLIAMGIBSON,ANDEVENLOOKATSOMEOFTHEORIGINALROOTSOFTHEWORD‘CYBER’INGREEKAND LATIN.INFORMATIONISTHECOREOFCYBERNETICS,ANDITISMOVEDTHROUGHTHEDYNAMICFEEDBACKMEDIUMSOFOURWORLD,GETTING PROCESSEDANDCHANGED,ANDMANIPULATED.HOWDOWEPRESERVEINFORMATIONSOTHATITISN’TCORRUPTEDASITFLOWSTHROUGHMACHINES, ORGANISMS,ANDSOCIETY?IFALLINFORMATIONCHANGESTHROUGHPROCESSING,WHATDOESCORRUPTIONEVENMEANINREGARDTOINFORMATION?

HOWDOWEVALIDATETHATAPROCESSISEVENTRUE?HOWDOWEPADDLETHROUGHTHESTREAMSOFFEEDBACKANDNOISEOFOURREALITYWITHAN UNSINKABLESHIP?

NOTMUCHHASBEENDONETOBRIDGETOGETHERCYBERNETICSANDCYBERSECURITY.WEWILLALSOEXPLORESOMEOFTHECONTEMPORARYAUTHORS

ANDPHILOSOPHERSTHATTACKLETHECYBERREALMOFPHILOSOPHY,INCLUDINGTHERECENTPAPERSBYT.VINNAKOTA.WEWILLLOOKTOFORMSOME PLAUSIBLEANALOGIESSOTHATWECANBRIDGECYBERNETICSWITHCYBERSECURITYFORPRACTICALSOLUTIONS.

THEGOALOFTHISPRESENTATIONISTOBROADENTHESCOPEOFCYBERSECURITYANDBRIDGEITWITHCYBERNETICSINORDERTOUNDERSTANDHOW INFORMATIONGOVERNSTHEINDIVIDUALANDTHEMACHINE.WITHCYBERNETICSANDCYBERSECURITYMERGING,CANWEFEELABITMORESECURE?OR

CANWEMAYBEJUSTUNDERSTANDTHATSECURITYISONLYANILLUSIONTHATISPRESENTEDTOOURADVERSARYINORDERTOMAKETHEMFEEL INSECURE!

TALESOFTHENOTORIOUSBGP

9:45-10:15

JONHENRY CYBERROOTS

ISTHEIPADDRESSYOU’RETALKINGTOREALLYAGENUINEINSTANCEOFTHATIPADDRESSORAMALICIOUSCOUNTERFEIT?

THEBORDERGATEWAYPROTOCOL(BGP)ISONEOFTHEMOSTIMPORTANTPROTOCOLSKEEPINGTHEMODERNINTERNETMOVING, BUTITSTILLRELIESONAHIGHDEGREEOFTRUSTBETWEENNETWORKOPERATORS.BGPHIJACKINGHASTHEPOTENTIALTOSEND HUGEVOLUMESOFTRAFFICTOANINCORRECTNETWORK-ACCIDENTALBGPERRORSAREOFTENQUICKLYREVERTED,BUT INTENTIONALHIJACKSCANBEUSEDTOIMPERSONATELEGITIMATENETWORKSTOPERFORMMALICIOUSACTIVITIESATSCALE.

INTHISTALKWE’LLGOTHROUGHACRASHCOURSEONHOWBENIGNBGPANNOUNCEMENTSWORK,THENWE’LLLOOKATHOWWE CANUSEOPENSOURCETOOLSTOEXAMINEUNUSUALBGPANNOUNCEMENTSANDEVALUATETHEIRSEVERITY.WE’LLALSOGO THROUGHACASESTUDYOFA‘BGPHIJACKFACTORY’,WHICHWASONEOFTHEFIRSTNETWORKOPERATORSTOBEEFFECTIVELY BANNEDFROMTHEINTERNETDUETOREPEATEDMALICIOUSBGPANNOUNCEMENTS.

10:20-10:50

VIVIANBAND

TALESOFTHENOTORIOUSBGP

DELIVERINGTHEFAIL:THEPOSTOFFICEITSCANDAL COMPUTERSNEVERLIE,SOTHEREISNOREASONTONOTBELIEVETHEIRTRANSACTIONALANDLOGOUTPUT?LEGALLYTHAT MAYWELLBETHECASE.FORNEARLY25YEARS,THELARGESTMISCARRIAGEOFJUSTICEINCIVILANDCRIMINALLEGAL HISTORYTOOKPLACELARGELYUNNOTICEDASTHEFIRST,ANDTHEOLDESTGOVERNMENTAGENCY,THEPOSTOFFICE,SOUGHT TOCOVERUPTHENUMEROUSFAILINGSOFITSITSYSTEM,HORIZON.INSTEADTHEYCHOSETOCENSURE,PROSECUTE,ANDIN SOMECASESIMPRISONHARDWORKINGINNOCENTPEOPLE,ANDDEMANDEDMANYTHOUSANDSOFPOUNDSFROM

THOUSANDSOFOTHERSTOCOVERLOSSESTHATHORIZONINCORRECTLYREPORTEDWASMISSING.LIVESHAVEBEEN DESTROYED,FAMILIESBROKENUP,HOMESLOSTANDPEOPLE’SLONGGAINEDRESPECTEDANDWELLEARNEDREPUTATIONS DESTROYED.THEPOSTOFFICEHORIZONITSCANDALISASTORYYOUWON’TBEABLETOBELIEVEWASPOSSIBLEOREVEN HAPPENED,BUTITWAS,ANDITDID,ANDALLBECAUSE‘PROFESSIONAL’PEOPLEWITHINTHEITANDLEGALCOMMUNITIESFELT THEIREMPLOYERSREPUTATIONWASMOREIMPORTANTTHENADMITTINGISSUESEXISTED.FOURSUICIDESHAVEBEEN ATTRIBUTEDTOTHISSCANDAL,ANDAFURTHER27PEOPLEHAVEDIEDWITHOUTHEARINGTHEIRNAMESCLEARED,MOREMAY DOSO.ANDIT’SNOTOVERYET…

11:15-12:20PM

BRIANWHELTON DELIVERINGTHEFAIL

DONTBEADATADUMMY:PROTECTINGYOURBITSANDBYTESWITHASECURITY

STRATEGYTOSUITYOU

WE’LLBEDIVINGINTOTHEIMPORTANCEOFHAVINGASTRONGHUMANSECURITYSTRATEGY,ANDHOWTRAININGANDEDUCATIONCANMAKEALL THEDIFFERENCE.PLUS,WE’LLBESHOWINGYOUHOWTOUSEMICROSOFTPURVIEWANDSENTINELTOADDLAYERSOFPROTECTIONAROUNDYOUR DATA,SOYOUCANRESTEASYKNOWINGYOURINFORMATIONISINGOODHANDS.•UNDERSTANDTHEBIGGESTTHREATTODATASECURITY:HUMAN ERROR•CREATINGACULTUREOFSECURITYWITHCLEARPOLICIESANDPROCEDURES•IDENTIFYINGPOTENTIALSECURITYINCIDENTSAND DETECTINGANDRESPONDINGTOINSIDERTHREATS

WE’LLBEEXPLORINGWHYPEOPLEARETHEBIGGESTTHREATTODATASECURITYANDTAKINGACLOSERLOOKATHOWBEINGTOOCHILLOR FORGETFULCANLEAVEYOURDATAWIDEOPENFORATTACKS.ANDLET’SBEREAL,NOBODYWANTSTOBETHECAUSEOFADATABREACH.

12:25-12:55

KATIEMCMILLAN DON’TBEADATADUMMY

BYTHEENDOFTHISSESSION,YOU’LLHAVEANUNDERSTANDINGOFTHEHUMANSIDEOFDATASECURITY,ANDYOU’LLBEARMEDWITHTHE KNOWLEDGEANDTOOLSTOCREATEASUPER-STRONGSECURITYSTRATEGYTHATMITIGATESTHERISKSASSOCIATEDWITHHUMANERROR.SOGET READYTOBECOMEADATASECURITYSUPERHERO!

track 2 papa don’t Breach

ANINTRODUCTIONTOASSEMBLYANDREVERSEENGINEERING

THISTALKWOULDBEANOVERVIEWOFHOWBASICASSEMBLYANDMEMORYWORKS,THESTRUCTUREOF PROGRAMSCOMPILEDINCANDHOWTOFOLLOWTHELOGICOFDISASSEMBLEDPROGRAMS.I’DALSOCOVER HOWTOUSETOOLSSUCHASGHIDRATODECOMPILECODEANDTOMAKETHEREVERSEENGINEERING PROCESSMOREEFFICIENT,ANDIFTHERE’STIMEI’DCOVERTHINGSSUCHASBUFFEROVERFLOWS,PATCHING CODEANDRETURNORIENTEDPROGRAMMING.

9:45-10

TOMBLUE

ANINTRODUCTIONTOASSEMBLY ANDREVERSEENGINEERING

SHIFTINGSMARTBYBUILDINGUPYOURSECURITYCHAMPIONS

THISTALKAIMSTOUNCOVERANEFFECTIVEMETHODFORINCREASINGTHESAFETYANDSECURITYOFANY ORGANIZATIONWHILEWORKINGWITHALIMITEDBUDGET,THROUGHTHEINNOVATIVECONCEPTOF‘SECURITY

CHAMPIONS’!DURINGTHECOURSEOFTHISINFORMATIVE,ENGAGING,ANDINSIGHTFUL15-MINUTE PRESENTATION,WEWILLREVEALTHISAMAZINGMODELWHEREORDINARYEMPLOYEESARETRANSFORMED INTOPOWERFULANDRELIABLESECURITYALLIES.

DELVEINTOTHEHIDDENTECHNIQUESUSEDTOSUCCESSFULLYRECRUIT,MOTIVATE,ANDEDUCATEYOURTEAM

10-10:15

AKOLADE "KAY"ADELAJASHIFTINGSMARTBYBUILDINGUP YOURSECURITYCHAMPIONS

MEMBERSSOTHATTHEYEVOLVEINTOVIGILANTPROTECTORSWHOCONTRIBUTETOTHEENHANCEMENTOF SAFETYTHROUGHOUTYOURENTIREWORKPLACE.WE’LLDISCUSSEVERYTHINGFROMTHEIMPORTANCEOF ACKNOWLEDGINGANDREWARDINGTHEIREFFORTSTOPROVIDINGONGOINGGUIDANCEANDMENTORSHIP.

THISPRESENTATIONISDESIGNEDTOOFFERADETAILEDROADMAPFORCREATINGAMORESECUREAND PROTECTEDENVIRONMENTFORALLEMPLOYEESANDSTAKEHOLDERSTOENJOY.

ANANALYSISANDRECOMMENDATIONFORCOMMONLYNOTICEDMISUNDERSTANDINGSISEEFROMSOC

OPERATORSNOWADAYS.THEAREASOFRESPONSIBILITYINSOC’S,ANDWHYWORKINGINASOCDOESNOT AUTOMATICALLYMAKEYOUANINCIDENTRESPONDER.

10:20-10:35

JYMITKHONDHU

WHYOHWHY!THECONFUSION

WITHSOCANDIR

CANANOLD(ISH)DOGLEARNNEW(CYBER)TRICKS?

CANA31YEAROLDNETWORKADMIN,TURNEDITMANAGER,REINVENTHIMSELFINACYBERSECURITYROLE WITHTHEHELPOFADEGREEAPPRENTICESHIP?FINDOUTWHATHEWASTAUGHTANDHOWTHATMAYBE DIFFEREDFROMWHATHELEARNT.DOSUCHAPPRENTICESHIPSWORKANDCOULDTHEYBEFORYOU?ARE THEREOTHER(BETTER?)WAYSTOLEARNTHESAMETHINGSANDCOULDTHE3YEARSHAVEBEENBETTER SPENTDOINGSOMETHINGELSE?IFYOUDOITANDGETTOTHEEND,CANYOUGETANEWJOB?SPOILER-YES

10:35- 10:50

ANDREWCARR

CANANOLD(ISH)DOGLEARNEW (CYBER)TRICKS?

WHYOHWHY!THECONFUSIONWITHSOCANDIR

WHATYOURBROWSERCANTEACHYOUABOUTSECUREDESIGN

THEBROWSERISNEARUBIQUITOUS;WEUSEITFORPRETTYMUCHEVERYTHINGANDTRUSTITWITHSOMEOF OURMOSTIMPORTANTINFORMATIONASSETS…BUTBROWSERSAREPRETTYSCARYFROMASECURITY PERSPECTIVE;THEYEXECUTEARBITRARYCODEFROMUNTRUSTEDSOURCESBYDESIGN…ANDWE’RE SUPPOSEDTOBEOKWITHTHAT?

THISTALK,BYARECOVERINGBROWSERSECURITYENGINEER,LOOKSATSOMEOFTHELESSONSWECAN LEARNFROMHOWAWEBBROWSERDOESWHATITDOES(ANDACOUPLEOFLESSONSFROMHOW BROWSERSDOTHINGSTHEYSHOULDN’T).

11:15-11:45

MARKGOODWIN

WHATYOURBROWSERCANTEACH

YOUABOUTSECUREDESIGN

RISKBASEDRESPONSEWITHSOAR

HOWCANYOUEXPEDITETRUSTINSECURITYAUTOMATIONWITHSOARTOFULLYAUTOMATED CONTAINMENTANDREMEDIATIONOFSECURITYEVENTS?WITHARISKBASEDRESPONSEFRAMEWORK THATALLOWSYOUTOBOTHCONTROL&FINELYTUNEYOURAUTOMATEDRESPONSES!CREATEYOUR OWN“SECRETSAUCE”FORYOURSPECIFICRISKAPPETITE!

11:5O- 12:20

TOMWISE

RISKBASEDRESPONSEWITHSOAR

HORRORSTORIES:WHENIT'SGOODIT'SGREAT,WHENIT'SBADITF*$^%$GSTINKS

SYNOPSIS:WHETHERITSPEN-TESTINGAFACTORYANDKNOCKINGITOFFLINE, SELLINGSIEMANDFORGETTINGTOTURNITON,ORMAYBESOMETHINGSMALLLIKE

ATTEMPTINGTOSABOTAGEACISOTHATWANTSTOCHANGEVENDOR...MANYOFUS

CANAGREECYBERSECURITYISPRETTYINTERESTING,BUTJUSTHOWMANYOFUS

HAVEPEELEDBACKTHESHEETSOFTHEVENDORMARKETANDSMELTTHEDUTCH OVEN?LET'SDISCUSS.

12:25-12:55

ELIZA-MAYAUSTIN-HORROR STORIES:WHENIT'SGOODIT'S GREAT,WHENIT'SBADITF*$^%$G STINKS

"IDON'TKNOWWHATI'MDOING!"-AHITCHHIKER'SGUIDETOIMPOSTORSYNDROME

IMPOSTORSYNDROME:YOUHAVEIT,IHAVE(ALOTOF)IT,MOSTPEOPLEINTHEINDUSTRYHAVE(SOME FORMOF)IT.

BEINGTHEIMPOSTORISAFEELINGTHATKNAWSATYOURGUTS,MAKESYOUDOUBTYOURSELFFROM WHENYOUWAKEUPUNTILWHENYOUGOTOSLEEP,ANDMAKETHEREMARKABLEDEEDSYOU’VEDONE SEEMLIKE“FLUKES”OR“HAPPYACCIDENTS”.

2:20-2:50

MAYABOECKH

"IDON'TKNOWWHATI'MDOING!"AHITCHHIKER'SGUIDETO

IMPOSTORSYNDROME

IWANTTOSHAREMYOWNEXPERIENCESWITHIMPOSTORSYNDROME(INCLUDINGSUBMITTINGATALK ONATOPICI’MINTIMATELYCONNECTEDTOBUTHAVENOEXPERTISEIN),HOWIDIDN’TDEALWITH THEM,ANDHOWIHAVEAPPARENTLYINADVERTENTLYBEENCONSTANTLYWEAPONIZINGITTO IMPROVESOMEOFMYABILITIES.

track 3 son of a Breach

LOOKATME!I'MTHEMANAGERNOW:BECOMINGASECURITYENGINEERMANAGER, COMMONPITFALLS,LESSONSANDMORE

OH,NOWYOU’REAMANAGER,BUTHOWDOESTHATCHANGEYOURLIFE?HOWWILLYOUFACETHECHALLENGES?WILL ALLTHOSEHOURSOFOFFICESPACEANDTHEOFFICEBEUSEFUL?ENTERTHEFUNWORLDOFBEINGASECURITY MANAGERWITHALLITSFUNANDRISKS.DIDISAYWE’REGOINGTOHAVEMEMES?WOWMUCHMEMES.

THISSESSIONDIVESINTOTRANSITIONINGFROMASECURITYENGINEERTOASECURITYENGINEERINGMANAGER, ADDRESSINGCOMMONPITFALLS,VALUABLELESSONS,ANDCRITICALERRORSTOAVOID.WEWILLHAVESOME INSIGHTSINTOTHECHALLENGESFACEDDURINGTHISTRANSITIONANDLEARNPRACTICALSTRATEGIESTOOVERCOME THEM.THETALKEMPHASIZESTHEIMPORTANCEOFEFFECTIVECOMMUNICATION,STAKEHOLDERMANAGEMENT,AND CULTIVATINGACOLLABORATIVETEAMCULTUREBYSHARINGREAL-WORLDEXAMPLESANDPROVIDINGGUIDANCEON NAVIGATINGPOTENTIALERRORS(THATIDID,AGAINOHDEARSOMANY)

9:45-10:15

MARCUSTENORIO

LOOKATME!I'MTHEMANAGERNOW

THE'THINKING'ANALYST:UNLOCKINGCORESOCANALYSISSKILLS

EVERASKEDWHATSEPARATESANOVICEANDSEASONEDBLUETEAMER,ANDBEENMETWITHARESPONSE NOTHINGMORETHAN“EXPERIENCE”?

THISTALKWILLGIVEYOUPRACTICALDAYTODAYEXAMPLESOFTHINKINGMODELS,BIASRECOGNITIONTIPS, COMMUNICATIONMETHODS,QUESTIONFORMATIONTIPSANDMORE.

WEWILLEXPLOREANDPROVE,REGARDLESSOFTOOLSETANDENVIRONMENT,THATACHANGEINYOUR THINKINGTOWARDSINVESTIGATIONS,YOUCANBECOMEAMORESEASONEDANALYST.

10:20-10:50

MICHAELLAMB-THE'THINKING' ANALYST:UNLOCKINGCORESOC

ANALYSISSKILLS

PRECISIONMUNITIONSFORDENIALOFSERVICE

WHYUSECARPETBOMBDDOSWHENATARGETEDSTRIKECONSISTENTAFEWWELLCRAFTEDREQUESTSCANCRIPPLE ASERVICE?

ASANADDEDBONUS,PRECISIONSTRIKESMAKEITTHATMUCHEASIERTOAVOIDWAFCOUNTERMEASURES.

ANDWHERETOFINDTHISAMAZINGCYBERWEAPON?WHYINASEEMINGLYUNIMPORTANTCVSSSCORE7.5.

11:15-11:45

GERALDBENISCHKE

PRECISIONMUNITIONSFORDENIAL OFSERVICE

DUDE,CHECKYOURPRIVILEGE!-PRIVILEGEDACCOUNTMANAGEMENTSOLUTIONSANDHOWTHEYCOULD EITHERBECOMEYOURBESTIEORTOTALLYRUINYOURDAY

ALTHOUGHPAMSOLUTIONSAREUNABLETOPROTECTANORGANIZATIONJUSTBYTHEMSELVES,THEY DEFINITELYPLAYANIMPORTANTPARTWHENITCOMESTOSECURITYCONTROLS.ADISCUSSIONOFHOWBEST PRACTICESCANPROVIDEADEFENSEINDEPTHLAYERORHANDATTACKERSTHEKEYSTOTHEKINGDOMONA SILVERPLATTER.

11:50-12:20

MELINAPHILLIPS-DUDE,CHECK YOURPRIVILEGE!

RUSSIANROULETTE:HACKTIVISMINTHEMIDDLEEAST

SINCEFEBRUARY,I’VEBEENTRACKINGSEVERALMIDDLEEASTERNTHREATGROUPSAFTERFALLINGINTOARABBIT HOLE.FROMTYGTEAMTOALITTLEGROUPKNOWNASANONYMOUSSUDAN,HACKTIVISMHASGROWN SUBSTANTIALLY.I’MCOVERINGINFIGHTING,WARSBETWEENGROUPS,ANDHACKTIVISTSTURNEDAPTS,PLUS RUSSIANINVOLVEMENT.

RETURNOFTHEROBOTS

TALK&WORKSHOP

1230-13:00

JAKEKEAST

RUSSIANROULETTE:HACKTIVISMIN

THEMIDDLEEAST

14:20-15:30

16:00-16:30

MARKGOODWIN

RETURNOFTHEROBOTS

TALK&WORKSHOP

LASTYEAR,WECOVERED“BUILDINGROBOTSFORCOMPLETEBEGINNERS”.THISYEAR,WE’LLBUILDONTHE FOUNDATION(DON’TWORRY,IT’SSTILLSUITABLEFORBEGINNERS)ANDCREATESOMETHINGABITMORE… INTERESTING.THEREWILLSTILLBEMICROCONTROLLERS.ANDLEGO.AND,POSSIBLY,SOMEACTUALREVERSE ENGINEERING.

workshops kentucky fried fishing

LIGHTNINGSPEAKERSWORKSHOPS

GIVINGATTENDEESTHEOPPORTUNITYTOSTEPIN,WRITEALIGHTNINGTALK(3-5MINUTES),ANDDELIVERIT ALLWITHINTHESAMEDAY.

ATTENDEESWILLCOMEIN(IDEALLYWITHTHOUGHTSONTOPICSALREADY),BETAKENTHROUGHOUTLINING ANDSTRUCTURINGTHEIRTALK,PRACTICALTIPSONBUILDINGSLIDES,ANDPRESENTING.THEY’LLWALKAWAY

WITHAFULLYBUILTPRESENTATIONANDTALKSTRUCTUREREADYTOBEDELIVERED,ANDEITHERATTHEEND OFTHEWORKSHOP(IFAWORKSHOP)ORATDESIGNATEDPOINTSDURINGTHEDAY(IFAVILLAGE)THEYWILL DELIVERTHEIRTALKSLIVE(PREFERABLYRECORDEDANDONASTAGE).

JAMESBORE

LIGHTNINGSPEAKERS WORKSHOPS
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.