Programm - subject to change, times are approximate within a few minutes

All times are CEST (German summer time). The slot length includes Q&A. All presentations are pre-recorded with the speaker available for questions after the talk and in the Slack chat.

Schedules

Day Date Schedule
0 Sunday, 2021-06-20, 09:00 CEST Workshop day
1 Monday, 2021-06-21, 13:00 CEST Conference day 1
2 Tuesday, 2021-06-22, 13:00 CEST Conference day 2

Workshops

Date: 2021-06-20

Workshop registration was done with pretix. Workshops are now fully booked and participants have been contacted by email.

Time Length Title Authors
9:00 4h The Sorcery of Malware Reverse Engineering Ashwathi Sasi
9:00 3h Fuzzing and finding vulnerabilities on Linux Hardik Shah
10:00 4h Finding and exploiting basic buffer overflows Christian Gross and Sarah Mader
10:00 4h OSINT for Cyber Defenders Mario Rojas
13:00 4h OpenSourced Threat Hunting with Graylog + MISP + Sysmon Bruno Diniz
14:00 4h CTF: BHealth21-Secure Healthcare Services Fujitsu - Markus Endter

Conference day 1

Date: 2021-06-21

Time Title Speaker(s)
13:00 Opening  
13:10 Elbsides Keynote - Practical DevSecOps and Beyond Thomas Fricke
13:45 Vulnerable as a Service Morton Swimmer
14:05 Demystifying the state of kubernetes cluster security - the cloud native way Vasant Chinnipilli and Pralhad Chaskar
14:40 Break  
15:00 Abracadabra - A researcher’s reversing spell! Sreenidhi Ramadurgam
15:25 On the edge with access control devices Vincenzo Ciancaglini, Joey Costoya, et al
15:45 How to build better more secure KVM with off-the shelf hardware. Tim Panton
16:15 Break  
16:35 Rise of the Cyber Jedi – Building a security community of practice Gustav Lundsgård
17:10 “If Only They Would Take Us Seriously” : The Behavioral Science Influencing Your Cybersecurity Culture Christina Lekati
17:45 Closing Day 1  

Conference day 2

Date: 2021-06-22

Time Title Speaker(s)
13:00 Opening Day 2  
13:05 BSidesMunich Keynote - InfoSec’s Dirty Little Secrets Jenn Janesko
13:40 No Distribute Scanners: A Perfect Testing Ground for Malware Developers Florian Murschetz and Mathieu Gaucheler
14:00 AI in a Minefield: Learning from Poisoned Data Itsik Mantin
14:35 Break  
14:45 CrimeOps of the KashmirBlack Botnet Sarit Yerushalmi and Ofir Shaty
15:15 Modern Adversary Tradecraft Sajal Thomas
15:45 Break  
16:10 Padding Oracle Attacks - The critical bug in your home-brewed crypto protocol Henning Kopp
16:45 The Care and Feeding of Meerkats Sascha Steinbiss and Andreas Herz
17:15 Log Management Keeps Your Network Secure – Real-World Examples Jeff Darrington
17:35 Closing Notes and Virtual Prosit with organizers  

Note: We take no responsibility for the content of the talks, and the views expressed by the speakers do not necessarily reflect those of Elbsides or its organizers. We are committed to providing a platform for diverse perspectives and encourage open dialogue on all topics related to computer security. The content of the slides are also the responsibility of the speakers and all content in them is wholly the responsibility of the speakers and their affiliations. We do not endorse any specific products, services, or viewpoints expressed in the talks or slides. They are provided as a convenience for the attendees only. Any complaints about the content of the talks or slides should be directed to the speakers and their affiliations, not to Elbsides or its organizers.