Sched.com Conference Mobile Apps
44CON 2019 has ended
Create Your Own Event
44CON 2019
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Search
or browse by date + venue
1st Floor Restaurant
Mental Health
Movie
Networking
Track 1 Talk
Track 2 Talk
Workshop
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Search
Popular Events
#1
44CON 2019 Opening
#2
Matt Summers - 4G to 5G - Cellular Security Myths and the Reality (not filmed)
#3
Aaron Adams, Cedric Halbronn & James Fisher - EternalGlue - Rewriting NotPetya for corporate use
#4
Nicolas Joly - Hunting for bugs, catching dragons
#5
44CON 2019 Community Evening Opening
#6
Registration opens
#7
44CON 2019 Day 2 Opening
#8
Tony Gee & Vangelis Stykas - The billion dollar IoT attack no one knows about
#9
Closing ceremony
#10
Lunch
#11
Lunch
#12
Gin o'clock
#13
Kyle Tobener & Alessandro Lapucci - Throw Open The Gates: Trading Control for Visibility
#14
Breaking Badge - Tim Wilkes and Phyushin
#15
Pizza with Detectify
#16
Phillip Roskosch & Stephan Huber - Dial V for Vulnerable: Attacking VoIP Phones
#17
Many Hats Club Intro
#18
Kashish Mittal - One Person Army - Playbook on how to be the first Security Engineer at a company
#19
Daniel Romero & Mario Rivas - Mundane office equipment: The front door to persistence on enterprise networks
#20
Matt Wixey - “I’m unique, just like you: Human side-channels and their implications for security and privacy”
#21
Ian Tabor - Car Hacking Village - CAN bus basics with hands on fuzzing
#22
Klaus Schmeh - Cold War Cryptography
#23
Break
#24
Guy Barnhart-Magen - Security Research Teams - How to manage, grow and retain them
#25
Chrissy Morgan - RFID Hacking Tools Workshop
#26
Chris Wade - Making something out of something
#27
Registration opens
#28
Break
#29
Max Kamper - Introduction to GLIBC heap exploitation
#30
From fuzzing to free reign - Finding zero days with Tenable Research
#31
Rebalance Every 10,000 Kilometers
#32
Scout Suite – A Multi-Cloud Security Auditing Tool
#33
Continuous Integration / Continuous Bounties: Attacking development pipelines for actual profit
#34
NCSC and Duncan Atkin - Logging Made Easy Workshop
#35
Marcello Salvati - BYOI (Bring Your Own Interpreter) payloads: Fusing the powah of .NET with a scripting language of your choosing
#36
Here be dragons… the AWS S3 logging minefields
#37
Neil Kettle - IBM/Trusteer Rapport: Does IBM (I)ntentionally (B)ackdoor (M)achines?
#38
Matt Lorentzen - Automating user interaction with Sheepl: Soup to Nuts
#39
Blade Runner 2049
#40
Katharina Sommer - Outsourcing global cyber norms?
#41
The CISO's Dilemma
#42
Owning The Cloud Through SSRF
#43
Blade Runner Final Cut
#44
Doors open for Day 2
#45
Jordan Santarsieri - Spyware, Ransomware and Worms. How to prevent the next SAP tragedy
#46
Careers Morning
#47
Morning Yoga Session
#48
Scammerz Live Scambaiting hosted by Stu [NSFW]
#49
Johanna Ydergård - How to have a broader impact as an ethical hacker
#50
Live Many Hats Club Podcast Session
Popular by Type
All Types
1st Floor Restaurant
Mental Health
Movie
Networking
Track 1 Talk
Track 2 Talk
Workshop
Popular by Day
All days
Wednesday, Sep 11
Thursday, Sep 12
Friday, Sep 13
Recently Active Attendees
Stefan Pauly
S4
Sched 44CON
TH
Tim Haynes
Jonathan Sartin
Guy Barnhart-Magen
Emil Tan
Brian Whelton
Yestin
More →