• Goa'15
  • About Schedule

SCHEDULE GOA 2015

YOUR ITINERARY FOR GOA 2015

Start End Day 1 Venue Training Name Trainer Names
9:00 18:00 Training 1 Coral 1 Xtreme Web Hacking Akash & Riyaz
9:00 18:00 Training 2 Coral 2 Audit +++ Joerg Simon
9:00 18:00 Training 3 Coral 3 Offensive HTML, SVG, CSS and other Browser-Evil Mario Heiderich
9:00 18:00 Training 4 Aqua Penetration Testing SmartGrid and SCADA Justin Searle
9:00 18:00 Training 5 HQ 1 - The HQ Hotel Xtreme Android Exploitation Lab Anant & Aditya
9:00 18:00 Training 6 HQ 2 - The HQ Hotel Xtreme Exploitation Omair
9:00 18:00 Training 7 HQ 3 - The HQ Hotel Reverse Engineering and Malware Analysis Abhishek Datta
9:00 18:00 Training 8 Meteora Attack Monitoring using Elasticsearch, Logstash, Kibana Himanshu & prajal
9:00 18:00 Training 9 The Queeny Hotel Xtreme Browser Fuzzing Amol & Anil
Start End Day 2 Venue Training Name Trainer Names
9:00 18:00 Training 1 Coral 1 Xtreme Web Hacking Akash & Riyaz
9:00 18:00 Training 2 Coral 2 Audit +++ Joerg Simon
9:00 18:00 Training 3 Coral 3 Offensive HTML, SVG, CSS and other Browser-Evil Mario Heiderich
9:00 18:00 Training 4 Aqua Penetration Testing SmartGrid and SCADA Justin Searle
9:00 18:00 Training 5 HQ 1 - The HQ Hotel Xtreme Android Exploitation Lab Anant & Aditya
9:00 18:00 Training 6 HQ 2 - The HQ Hotel Xtreme Exploitation Omair
9:00 18:00 Training 7 HQ 3 - The HQ Hotel Reverse Engineering and Malware Analysis Abhishek Datta
9:00 18:00 Training 9 The Queeny Hotel Xtreme Browser Fuzzing Amol & Anil
Start End Meteora Hall (Talks)
20:00 20:30 Keynote null
20:30 21:00 Blackshield Award
21:00 21:30 Privacy - by Pranesh Prakash
21:30 22:00 Clusterfuzz: Analyzing Chrome crash reports at scale - by Abhishek Arya
22:00 22:30 Toliman, a Hadoop Pentesting Tool - by Jitendra Chauhan
22:30 22:50 Halcyon - Building custom scans for real world enterprise network - by Sanoop Thomas
Start End Meteora Hall (Talks) Coral 1 Hall (CXO Track) Coral 2 Hall (Workshops) Coral 3 Hall (CTFs) Aqua Lounge (Villages/CTFs)
8:00 9:30 Registration        
9:30 10:00 Inaugural Note by Honourable Shri Janardhana Swamy        
10:00 10:30 Keynote by Dr. Keshav Dattatreya Nayak        
10:30 11:00 Keynote by Jennifer Steffens        
11:00 11:20 Tea Break Tea Break Tea Break
11:20 12:10 The Windows Sandbox Paradox – by James Forshaw CXO Opening note - by Roland Cloutier followed by
CXO Panel - "Why CISO should promote more of such technical events - pros and cons, benefits etc"
Moderator - Burgess Cooper, CTSO - Vodafone
  EMC Defenders League
(Top 30 winners of nullcon HackIM (Powered by EMC) Battle their way to the top for First Prize - INR 500000/-
 
12:10 13:00 ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heidrich    
13:00 14:00 Lunch Lunch Lunch
14:00 15:00 Anatomy of a credit card stealing POS malware – by Amol Sarwate CXO Panel - "2015: The Global Threat Defense Landscape - A discussion on the challenges faced by enterprises in engaging the bad guys"
"Moderator - Shomiron Gupta, Founder, CEO - NETMONASTERY"
Cuckoo Sandbox 102: State-of-the-art malware analysis - by Jurriaan Bremer EMC Defenders League Physical Lock Security - by Amey and Swapnil
15:00 15:45 ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC - by Hans Höfken Defender's Diary: Who's attacking? What are my options?
Moderator - Sastry Tumuluri, CISO - Govt. of Haryana
 
15:45 16:00 Tea Break Tea Break Tea Break
16:00 16:45 Drone Attacks: How I hijacked a drone - by Rahul Sasi CXO Panel - "Building security and compliance into the software delivery process"
Moderator - Joanne Molesky, Principal Associate at ThoughtWorks
Hardware Reverse Engineering: From Boot to Root - by Yashin Mehaboobe    
16:45 17:30 FinSpy - Inside Spying - by Attila Marosi        
17:30 18:15 Closing note        
20:00 23:30 Invite only Nullcon Networking Party        
Start End Meteora Hall (Talks) Coral 1 Hall (Talks) Coral 2 Hall (Workshops) Coral 3 Hall (CTFs) Aqua Lounge (Villages/CTFs)
10:00 Hrs 10:30 Hrs Keynote by Paul Vixie        
10:30 Hrs 11:00 Hrs Keynote by Katie Moussouris        
11:00 Hrs 11:20 Hrs Tea Break Tea Break Tea Break
11:20 Hrs 12:10 Hrs Mobile Self-Defence - by Karsten Nohl Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan When the Sky is Falling: High-Volume Reflection/Amplification Attacks by Manish Sinha   Physical Lock Security - by Amey and Swapnil
12:10 Hrs 13:00 Hrs Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba Attack and Defence in Radio and Communication Warfare - by Akib Sayyed  
13:00 Hrs 14:00 Hrs Lunch Lunch Lunch
14:00 Hrs 15:00 Hrs The NSA Playset: RF Retroreflectors - by Michael Ossman Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A NDIS Disassembly for Hackers: Reversing Network Drivers at the Lowest Layer - by Nitay Artenstein BugBash by Bugcrowd Winja (CTF by women for women)
15:00 Hrs 15:45 Hrs Hacking Tizen: The OS of Everything - By Ajin Abraham Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal
15:45 Hrs 16:00 Hrs Tea Break Tea Break Tea Break
16:00 Hrs 16:45 Hrs Pentesting a website with million lines of Javascript - by Lavakumar Kuppan & Nafeez Ahmed Parkomagic: a few words about the security of parking terminals – by Denis Makrushin Hackonomics and the emergence of Digital Age Heroes followed by
Breach - A cyber crime thriller. Book signing and talk - by Author Amrita Chowdhury
BugBash by Bugcrowd Winja (CTF by women for women)
16:45 Hrs 17:30 Hrs Startup Panel - "Make in India"
Moderator - Aseem Jakhar, Director - Research, Payatu Technologies
   
17:30 Hrs 18:00 Hrs Closing note    
20:00 Hrs 22:00 Hrs Live Performance by JapaTheBand        

Copyright © 2017-18 | Nullcon India | International Security Conference | All Rights Reserved