{"id":850,"date":"2013-05-27T09:13:00","date_gmt":"2013-05-27T09:13:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2013\/05\/27\/announcing-the-brucon-2013-schedule\/"},"modified":"2013-05-27T09:13:00","modified_gmt":"2013-05-27T09:13:00","slug":"announcing-the-brucon-2013-schedule","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2013\/05\/27\/announcing-the-brucon-2013-schedule\/","title":{"rendered":"Announcing the BruCON 2013 Schedule"},"content":{"rendered":"<p>You can&#8217;t hide your secrets forever and as we grow excited about the BruCON 2013 content, we can share with pride the current selection for our 5th annual conference.&nbsp;<\/p>\n<div><\/div>\n<div>Once again we offer you a mix of technical and less technical information security topics covered by speakers that live and breathe information security every day.&nbsp;<\/div>\n<div><\/div>\n<div>We and the volunteer team are working hard to make this event a worthwhile celebration of our 5th anniversary and have therefor extended the early bird conditions to June 15th.&nbsp;<\/div>\n<div><\/div>\n<div>\n<div><b><u>Keynotes<\/u><\/b><\/div>\n<div>Justine Aitel &#8211; (TBD)<\/div>\n<div>Dan Guido &#8211; (TBD)<\/div>\n<div><\/div>\n<div><b><u>Speakers<\/u><\/b><\/div>\n<div>Aloria &#8211; .NET: The Framework, the Myth, the Legend<\/div>\n<div>Tiago Balgan Henriques &#8211; Realtime analysis and visualization of internet status : from malware to compromised machines.<\/div>\n<div>Robert Graham &#8211; Data-plane networking<\/div>\n<div>Jake Valletta &#8211; CobraDroid<\/div>\n<div>David Perez\/Jose Pico &#8211; Geolocation of GSM mobile devices, even if they do not want to be found.<\/div>\n<div>Russ Gideon &#8211; Paint by Numbers vs. Monet<\/div>\n<div>Arron Finnon &#8211; NIDS\/NIPS : What is the OSNIF project?<\/div>\n<div>Erin Jacobs &#8211; Taking the BDSM out of PCI-DSS through open-source solutions<\/div>\n<div>Gene Kim, Alex Hutton, David Mortman, Kris Buytaert, Patrick Debois &#8211; A panel on DevOPS and Security<\/div>\n<div>Stephane Chenette &#8211; Firedrill : offensive defense to better protect your network.<\/div>\n<div>Vaagu Toukharian &#8211; HTTP Time Bandit<\/div>\n<div><\/div>\n<div><b><u>Workshops<\/u><\/b><\/div>\n<div>Ioannis Koniaris &#8211; Analyzing Internet Attacks with Honeypots<\/div>\n<div>Christopher Lytle &#8211; Crypto by example &#8211; A hands-on cryptography workshop<\/div>\n<div>Carlos G. Prado &#8211; Automating RE with Python<\/div>\n<div>Sandor Pereiro de Melo &#8211; Kudo : Post Mortem Forensic Analysis with FLOSS tools 2.0<\/div>\n<div>Willi Ballenthin\/Michael Sikorski &#8211; Winter Cluster: Builiding a malware &#8216;agglomerator&#8217;<\/div>\n<div>Didier Stevens &#8211; Advanced Excel Hacking<\/div>\n<div><\/div>\n<div>(more workshops to be confirmed !!)<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>You can&#8217;t hide your secrets forever and as we grow excited about the BruCON 2013 content, we can share with pride the current selection for our 5th annual conference.&nbsp; Once again we offer you a mix of technical and less technical information security topics covered by speakers that live and breathe information security every day.&nbsp; We and the volunteer team are working hard to make this event a worthwhile celebration of our 5th anniversary and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-850","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=850"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/850\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}