Programm - subject to change, times are approximate within a few minutes
All times are CEST (German summer time). The slot length includes Q&A. All presentations are pre-recorded with the speaker available for questions after the talk and in the Slack chat.
Schedules
Day | Date | Schedule |
---|---|---|
0 | Sunday, 2021-06-20, 09:00 CEST | Workshop day |
1 | Monday, 2021-06-21, 13:00 CEST | Conference day 1 |
2 | Tuesday, 2021-06-22, 13:00 CEST | Conference day 2 |
Workshops
Date: 2021-06-20
Workshop registration was done with pretix. Workshops are now fully booked and participants have been contacted by email.
Time | Length | Title | Authors |
---|---|---|---|
9:00 | 4h | The Sorcery of Malware Reverse Engineering | Ashwathi Sasi |
9:00 | 3h | Fuzzing and finding vulnerabilities on Linux | Hardik Shah |
10:00 | 4h | Finding and exploiting basic buffer overflows | Christian Gross and Sarah Mader |
10:00 | 4h | OSINT for Cyber Defenders | Mario Rojas |
13:00 | 4h | OpenSourced Threat Hunting with Graylog + MISP + Sysmon | Bruno Diniz |
14:00 | 4h | CTF: BHealth21-Secure Healthcare Services | Fujitsu - Markus Endter |
Conference day 1
Date: 2021-06-21
Time | Title | Speaker(s) |
---|---|---|
13:00 | Opening | |
13:10 | Elbsides Keynote - Practical DevSecOps and Beyond | Thomas Fricke |
13:45 | Vulnerable as a Service | Morton Swimmer |
14:05 | Demystifying the state of kubernetes cluster security - the cloud native way | Vasant Chinnipilli and Pralhad Chaskar |
14:40 | Break | |
15:00 | Abracadabra - A researcher’s reversing spell! | Sreenidhi Ramadurgam |
15:25 | On the edge with access control devices | Vincenzo Ciancaglini, Joey Costoya, et al |
15:45 | How to build better more secure KVM with off-the shelf hardware. | Tim Panton |
16:15 | Break | |
16:35 | Rise of the Cyber Jedi – Building a security community of practice | Gustav Lundsgård |
17:10 | “If Only They Would Take Us Seriously” : The Behavioral Science Influencing Your Cybersecurity Culture | Christina Lekati |
17:45 | Closing Day 1 |
Conference day 2
Date: 2021-06-22
Time | Title | Speaker(s) |
---|---|---|
13:00 | Opening Day 2 | |
13:05 | BSidesMunich Keynote - InfoSec’s Dirty Little Secrets | Jenn Janesko |
13:40 | No Distribute Scanners: A Perfect Testing Ground for Malware Developers | Florian Murschetz and Mathieu Gaucheler |
14:00 | AI in a Minefield: Learning from Poisoned Data | Itsik Mantin |
14:35 | Break | |
14:45 | CrimeOps of the KashmirBlack Botnet | Sarit Yerushalmi and Ofir Shaty |
15:15 | Modern Adversary Tradecraft | Sajal Thomas |
15:45 | Break | |
16:10 | Padding Oracle Attacks - The critical bug in your home-brewed crypto protocol | Henning Kopp |
16:45 | The Care and Feeding of Meerkats | Sascha Steinbiss and Andreas Herz |
17:15 | Log Management Keeps Your Network Secure – Real-World Examples | Jeff Darrington |
17:35 | Closing Notes and Virtual Prosit with organizers |