• Goa'16
  • About Schedule

SCHEDULE GOA 2016

YOUR ITINERARY FOR GOA 2016

Start End Day 1 Venue Training Name Trainer Names
9:00 18:00 Training 1 Coral 1 - Bogmallo Beach Resort Xtreme Web Hacking Akash & Riyaz
9:00 18:00 Training 2 Coral 2 - Bogmallo Beach Resort Offensive HTML, SVG, CSS and other Browser-Evil Mario Heiderich
9:00 18:00 Training 3 Coral 3 - Bogmallo Beach Resort Penetration Testing SmartGrid and SCADA Justin Searle
9:00 18:00 Training 4 Aqua - Bogmallo Beach Resort Audit +++ Joerg Simon
9:00 18:00 Training 5 HQ 1 - The HQ Hotel Attack Monitoring using Elasticsearch, Logstash, Kibana Himanshu, Prajal & Shubham
9:00 18:00 Training 6 HQ 2 - The HQ Hotel Windows Kernel Exploitation Ashfaq Ansari
9:00 18:00 Training 7 HQ 3 - The HQ Hotel Xtreme Android Exploitation Lab Anant & Anto
9:00 18:00 Training 8 Elite 1 - Hotel La Paz Garden Reverse Engineering and Malware Analysis Abhishek Datta
9:00 18:00 Training 9 Elite 2 - Hotel La Paz Garden Xtreme Exploitation Omair
9:00 18:00 Training 10 The Queeny Hotel Understanding and exploiting cryptography & PKI Implementations Ajit Hatti
Start End Day 1 Venue Training Name Trainer Names
9:00 18:00 Training 1 Coral 1 - Bogmallo Beach Resort Xtreme Web Hacking Akash & Riyaz
9:00 18:00 Training 2 Coral 2 - Bogmallo Beach Resort Offensive HTML, SVG, CSS and other Browser-Evil Mario Heiderich
9:00 18:00 Training 3 Coral 3 - Bogmallo Beach Resort Penetration Testing SmartGrid and SCADA Justin Searle
9:00 18:00 Training 4 Aqua - Bogmallo Beach Resort Audit +++ Joerg Simon
9:00 18:00 Training 5 HQ 1 - The HQ Hotel Attack Monitoring using Elasticsearch, Logstash, Kibana Himanshu, Prajal & Shubham
9:00 18:00 Training 6 HQ 2 - The HQ Hotel Windows Kernel Exploitation Ashfaq Ansari
9:00 18:00 Training 7 HQ 3 - The HQ Hotel Xtreme Android Exploitation Lab Anant & Anto
9:00 18:00 Training 8 Elite 1 - Hotel La Paz Garden Reverse Engineering and Malware Analysis Abhishek Datta
9:00 18:00 Training 9 Elite 2 - Hotel La Paz Garden Xtreme Exploitation Omair
9:00 18:00 Training 10 The Queeny Hotel Understanding and exploiting cryptography & PKI Implementations Ajit Hatti
Start End Meteora Hall (Talks) Coral I Coral II
19:00 20:00 Registration
20:00 20:30 Keynote null
20:30 21:00 Blackshield Award
21:00 21:30 How to build Big Brother: Critical Vulnerabilities in 3G/4G Modems by Yunusov Timur CXO Networking (Invite Only) Bounty Craft, Finding Bugs and Profiting
21:30 22:00 Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day attacks by Vipul Sawant & Pallav Jakhotiya
22:00 22:30 Sandbox detection: Abuse, test, leak by Zoltan Balazs Speaker Party (Invite Only)
22:30 23:00
Start End Meteora Hall (Talks) Coral 1 Hall (CXO Track) Coral 2 Hall (Workshops) Coral 3 Hall La Palmira
8:00 9:30 Registration        
9:45 10:00 Opening Note        
10:00 10:45 Keynote by Jaya Baloo        
10:45 11:00 Break Break Break Break Break
11:00 12:00 Automatic Automotive Hacking by Craig Smith       Bounty Craft, Finding Bugs and Profiting
12:00 13:00 Travis Goodspeed CXO Panel 1 - Hacking Community <-> CISO Community tête-à-tête    
13:00 14:00 Lunch Lunch Lunch Lunch Lunch
14:00 14:45 What Google knows about you and your devices, and how to get it by Vladimir Katalov CXO Panel 2 - Framework for Government/Industry, Cooperation & Information Exchange in the age of IT savvy Crime Social Engineering Man & the Machine or Social Engineering Village by Neelu Tripathy   Bounty Craft, Finding Bugs and Profiting
14:45 15:30 Abusing Software Defined Networks (Part Two): Using the SDN-Toolkit to Test Your Software Defined Network by Gregory Pickett CXO Panel 3 - Future of security
15:30 16:00 Break Break Break Break Break
16:00 16:45 Million Dollar Baby: Towards ANGRly conquering DARPA CGC by Aravind Machiry Physical Lock Security by Amey Gat & Swapnil Wadwalkar Application Security Workshop by Amit Ashbel BugBash by BugCrowd Bounty Craft, Finding Bugs and Profiting
16:45 17:30 Closing Note + Prize Distribution Global null meet
17:30 18:00        
19:30 22:30 Nullcon Networking Party (Invite only)        
Start End Meteora Hall (Talks) Coral 1 Hall (Talks) Coral 2 Hall (Workshops) Coral 3 Hall La Palmira
8:30 9:00         Winja Breakfast Session
10:00 10:45 Keynote by Roland Cloutier        
10:45 11:00 Break Break Break Break Break
11:00 12:00 An Abusive Relationship with AngularJS – About the Security Adventures with the 'Super-Hero' Framework by Mario Heiderich Show Me the Data: Analyzing Security Trends Across 100 Companies by Clint Gibler Cyber WarGame    
12:00 12:45 Let's Play Doctor: Practical OS X Malware Detection & Analysis by Patrick Wardle Making Machines think about security for fun and profit by Rahul Sasi Cybersecurity – A Global Talent Perspective Physical Lock Security by Amey Gat & Swapnil Wadwalkar
12:45 14:00 Lunch Lunch Lunch Lunch Lunch
14:00 15:00 Attacking and defending healthcare - EMR solutions by Anirudh Duggal Hardsploit project : All-In-One Tool for Hardware Security Audit by Julien Moinard The Age of Cyber Threats by Anudeep Kumar & Ajitest Roy Chowdhury Winja - CTF  
15:00 15:45 Privacy leaks on 4G-LTE networks by Altaf Shaik Hitchhiker's guide to hacking Industrial Control systems by Arun Mane  
15:45 16:00 Break Break Break Break Break
16:00 16:45 Automated Mobile Application Security Assessment with MobSF by Ajin Abraham Attacking Radio:
A hands on workshop by Yashin Mehaboobe
Train like you fight : Develop Cyber Warriors by Brendan Leitch    
16:45 17:30    

Copyright © 2017-18 | Nullcon India | International Security Conference | All Rights Reserved