Announcement

Collapse
No announcement yet.

List o Speakers attending theSummit this year

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • List o Speakers attending theSummit this year

    Here is the confirmed list of Speakers who will be at theSummit this year! Thank you all for coming and being available to all guest who attend!

    NOTE: This is the first run of confirmed guest, more to follow soon!

    Zoz Exploitable Assumptions Workshop ; Pwned By The Owner: What Happens When You Steal A Hacker's Computer
    Garret Picchioni The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
    Unlocked Exploitable Assumptions Workshop
    Tyler Krpata Like a Boss: Attacking JBoss
    Tony Flick Getting Social with the Smart Grid
    Decius Exploiting Internet Surveillance Systems
    Scott Wolchok Crawling BitTorrent DHTs for Fun and Profit
    Sid Hacking Oracle From Web Apps
    Blake Self SMART Project: Applying Reliability Metrics to Security Vulnerabilities; Hacking Docsis for Fun and Profit
    Shawn Merdinger We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
    Ed Schaller Exploiting WebSphere Application Server's JSP Engine
    Samy Kamkar How I Met Your Girlfriend
    Matt Ryanczak Implementing IPv6 at ARIN
    Richard Thieme Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
    Rich Smith pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
    Righter Kunkel Air Traffic Control Insecurity 2.0
    Patrick Thomas Web Application Fingerprinting with Static Files
    Patrick Mullen Open Source Framework for Advanced Intrusion Detection Solutions
    Oren Isacson Exploiting Digital Cameras.
    Nicholas Percoco This is not the droid you're looking for...; Malware Freak Show 2: The Client-Side Boogaloo
    Moxie Marlinspike Changing Threats To Privacy: From TIA To Googl
    Mike Metzger Letting the Air Out of Tire Pressure Monitoring Systems
    Marco Bonetti Mobile Privacy: Tor on the iPhone and Other Unusual Devices
    metr0 Securing MMOs: A Security Professional's View From the Inside
    Justin Morehouse Getting Social with the Smart Grid
    Joshua Marpet Facial Recognition: Facts, Fiction, and Fsck-ups
    Josh Pyorre Build Your Own Security Operations Center for Little or No Money.
    John McNabb Cyberterrorism and the Security of the National Drinking Water Infrastructure
    Kingpin Making the DEFCON 18 Badge
    James Shewmaker Browser Based Defenses
    Jibran Llyas Malware Freak Show 2: The Client-Side Boogaloo
    Jennifer Granick Law of Laptop search & Seizure; Meet the EFF; Legal Developments in Hardware Hacking
    Jeff Bryner Google Toolbar: The NARC Within; Cloud Computing, a weapon of mass destruction?; The keys to running a successful DEF CON Group by DC612
    Jayson E. Street Stratagem 1 - Deceiving the Heavens to Cross the Sea
    Zuk Exploitation on ARM - Technique and Bypassing Defense Mechanism
    Adrian Crenshaw Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device
    Iftach Ian Amit Cyber[Crime|War] Charting Dangerous Waters
    HONEY Ripping Media Off Of the Wire
    Craig Heffner How to Hack Millions of Routers
    Gmark Tales from the Crypto
    Bruce Potter This Needs To Be Fixed" and Other Jokes In Commit Statements
    Garry Pejski My Life As A Spyware Developer
    Fyodor Mastering the Nmap Scripting Engine
    Ferdinand Schober Gaming in the Glass Safe - Games, DRM & Privacy
    theNURSE Weaponizing Lady GaGa, Psychosonic Attacks
    Deviant Ollan The Search for Perfect Handcuffs... and the Perfect Handcuff Key
    Dennis Brown Resilient Botnet Command and Control with Tor
    Jack Daniel PCI, Comp.Controls & Comp. Security
    DC Flux DCFluX in: Moon-bouncer
    David Fifield Mastering the Nmap Scripting Engine
    David King Hardware Hacking for Software Guys
    David Shackleford PCI, Comp.Controls & Comp. Security; Internet Wars
    Caleb Sima Drivesploit: Circumventing Both Automated AND Manual Drive-by-Download Detection
    Daniel Burroughs Open Public Sensors and Trend Monitoring
    Big Poppa ReverShell Sniper Forensics - One Shot, One Kill
    Christian Papathanasiou This is not the droid you're looking for..."
    Charlie Miller Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
    Chris Paget Practical Cellphone Spying; Extreme-range RFID Tracking
    Cesar Cerrudo Token Kidnapping's Revenge
    BarrettWeisshaar The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
    Rain Build a lie detector/beat a lie detector
    Nguyen Anh Quynh Operating System Fingerprinting for Virtual Machines
    Adam Pridgen Toolsmithing an IDA Bridge, Case Study For Building a Reverse Engineering Tool
    Jon McCoy Attacking .Net Programs at Runtime
    Chad Houck Decoding reCAPTCHA
    "Never Underestimate the Power of Stupid People in Large Groups"

  • #2
    Re: List o Speakers attending theSummit this year

    Heh, depending on the size of the venue the number of speakers threatens to outnumber attendees. Reminiscent of the last ska concert I went to

    I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me

    Comment


    • #3
      Re: List o Speakers attending theSummit this year

      Originally posted by noid View Post
      Heh, depending on the size of the venue the number of speakers threatens to outnumber attendees. Reminiscent of the last ska concert I went to
      Yeah, I count ~60.

      Comment


      • #4
        Re: List o Speakers attending theSummit this year

        We have expended the space to accommodate 450 people Plus Stage for DualCore, MiniBosses and DJ Jackalope.

        There should be LOTS of room for everyone!
        "Never Underestimate the Power of Stupid People in Large Groups"

        Comment


        • #5
          Re: List o Speakers attending theSummit this year

          Wow, that is one heck of a party!

          Comment

          Working...
          X