Programm - subject to change, times are approximate within a few minutes
All times are CEST (German summer time). The slot length includes Q&A. All presentations are pre-recorded with the speaker available for questions after the talk and in the Slack chat.
Schedules
| Day | Date | Schedule |
|---|---|---|
| 0 | Sunday, 2021-06-20, 09:00 CEST | Workshop day |
| 1 | Monday, 2021-06-21, 13:00 CEST | Conference day 1 |
| 2 | Tuesday, 2021-06-22, 13:00 CEST | Conference day 2 |
Workshops
Date: 2021-06-20
Workshop registration was done with pretix. Workshops are now fully booked and participants have been contacted by email.
| Time | Length | Title | Authors |
|---|---|---|---|
| 9:00 | 4h | The Sorcery of Malware Reverse Engineering | Ashwathi Sasi |
| 9:00 | 3h | Fuzzing and finding vulnerabilities on Linux | Hardik Shah |
| 10:00 | 4h | Finding and exploiting basic buffer overflows | Christian Gross and Sarah Mader |
| 10:00 | 4h | OSINT for Cyber Defenders | Mario Rojas |
| 13:00 | 4h | OpenSourced Threat Hunting with Graylog + MISP + Sysmon | Bruno Diniz |
| 14:00 | 4h | CTF: BHealth21-Secure Healthcare Services | Fujitsu - Markus Endter |
Conference day 1
Date: 2021-06-21
| Time | Title | Speaker(s) |
|---|---|---|
| 13:00 | Opening | |
| 13:10 | Elbsides Keynote - Practical DevSecOps and Beyond | Thomas Fricke |
| 13:45 | Vulnerable as a Service | Morton Swimmer |
| 14:05 | Demystifying the state of kubernetes cluster security - the cloud native way | Vasant Chinnipilli and Pralhad Chaskar |
| 14:40 | Break | |
| 15:00 | Abracadabra - A researcher’s reversing spell! | Sreenidhi Ramadurgam |
| 15:25 | On the edge with access control devices | Vincenzo Ciancaglini, Joey Costoya, et al |
| 15:45 | How to build better more secure KVM with off-the shelf hardware. | Tim Panton |
| 16:15 | Break | |
| 16:35 | Rise of the Cyber Jedi – Building a security community of practice | Gustav Lundsgård |
| 17:10 | “If Only They Would Take Us Seriously” : The Behavioral Science Influencing Your Cybersecurity Culture | Christina Lekati |
| 17:45 | Closing Day 1 |
Conference day 2
Date: 2021-06-22
| Time | Title | Speaker(s) |
|---|---|---|
| 13:00 | Opening Day 2 | |
| 13:05 | BSidesMunich Keynote - InfoSec’s Dirty Little Secrets | Jenn Janesko |
| 13:40 | No Distribute Scanners: A Perfect Testing Ground for Malware Developers | Florian Murschetz and Mathieu Gaucheler |
| 14:00 | AI in a Minefield: Learning from Poisoned Data | Itsik Mantin |
| 14:35 | Break | |
| 14:45 | CrimeOps of the KashmirBlack Botnet | Sarit Yerushalmi and Ofir Shaty |
| 15:15 | Modern Adversary Tradecraft | Sajal Thomas |
| 15:45 | Break | |
| 16:10 | Padding Oracle Attacks - The critical bug in your home-brewed crypto protocol | Henning Kopp |
| 16:45 | The Care and Feeding of Meerkats | Sascha Steinbiss and Andreas Herz |
| 17:15 | Log Management Keeps Your Network Secure – Real-World Examples | Jeff Darrington |
| 17:35 | Closing Notes and Virtual Prosit with organizers |
Note: We take no responsibility for the content of the talks, and the views expressed by the speakers do not necessarily reflect those of Elbsides or its organizers. We are committed to providing a platform for diverse perspectives and encourage open dialogue on all topics related to computer security. The content of the slides are also the responsibility of the speakers and all content in them is wholly the responsibility of the speakers and their affiliations. We do not endorse any specific products, services, or viewpoints expressed in the talks or slides. They are provided as a convenience for the attendees only. Any complaints about the content of the talks or slides should be directed to the speakers and their affiliations, not to Elbsides or its organizers.