{"id":892,"date":"2011-06-03T09:37:00","date_gmt":"2011-06-03T09:37:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2011\/06\/03\/confirmed-speakers-brucon-2011\/"},"modified":"2011-06-03T09:37:00","modified_gmt":"2011-06-03T09:37:00","slug":"confirmed-speakers-brucon-2011","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2022\/2011\/06\/03\/confirmed-speakers-brucon-2011\/","title":{"rendered":"Confirmed Speakers Brucon 2011"},"content":{"rendered":"<p>Without further delay, here is the final list of selected (and confirmed) speakers :<\/p>\n<div>update June 15th :<\/div>\n<div><\/div>\n<div>\n<ul>\n<li>Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems by Craig Balding<\/li>\n<\/ul>\n<\/div>\n<div>update June 13th :<\/div>\n<div>\n<ul>\n<li>Myth-busting Risk by Jack Jones<\/li>\n<li>Step-by-Step for Software Security (that anyone can follow) by Pravir Chandra<\/li>\n<\/ul>\n<div><\/div>\n<ul>\n<li>Botnets and Browsers &#8211; Brothers in a Ghost Shell by Aditja K. Sood<\/li>\n<li>The 99\u00a2 heart surgeon dilemma, How to fix penetration testing by Stefan Friedli<\/li>\n<li>iOS Data Protection Internals by Andrey Belenko<\/li>\n<li>Pushing in, leaving a present, and pulling out without anybody noticing, Data Exfiltration in highly secure environments by Ian Amit <\/li>\n<li>Social Engineering Like In The Movies \u2013 The reality of awareness and manipulation by Dale Pearson <\/li>\n<li>Botnet Identification and remediation, Cleaning up in your own back yard by Barry Irwin <\/li>\n<li>Attacking SAP&#8217;s J2EE Engine by Alexander Polyakov and Dmitriy Chastuhin<\/li>\n<li>Abusing Locality in Shared Web Hosting by Nick Nikiforakis <\/li>\n<li>Smart Phones \u2013 The Weak Link in the Security Chain, Hacking a network through an Android device by Nick Walker and Werner Nel<\/li>\n<\/ul>\n<div>We&#8217;re continuing selections as we speak.<\/div>\n<div><\/div>\n<div>Cheers,<\/div>\n<div>The Brucon Team<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Without further delay, here is the final list of selected (and confirmed) speakers : update June 15th : Ripping Out Code: Practical Attack Surface Reduction for Open Source Systems by Craig Balding update June 13th : Myth-busting Risk by Jack Jones Step-by-Step for Software Security (that anyone can follow) by Pravir Chandra Botnets and Browsers &#8211; Brothers in a Ghost Shell by Aditja K. Sood The 99\u00a2 heart surgeon dilemma, How to fix penetration testing&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-892","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts\/892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/comments?post=892"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts\/892\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/media?parent=892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/categories?post=892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/tags?post=892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}