Schedule
Trainings
Find the schedule for the trainings on the page for the training you’ll attend:
- Introduction to Reverse Engineering
- Network Forensics for Incident Response
- Hacking Enterprises – 2023 Red Edition
Community Event
This event requires no registration and is open for non-ticket holders as well.
| 2023-09-13 | |
|---|---|
| 
            12:00
            
         | Doors open | 
| 
            13:00
            
            – 13:15
            
         | Welcome talk | 
| 
            13:15
            
            – 13:45
            
         | Jesper Larsson 
                RCE and the Full Cluster Breach: Don’t Let Your Security Be the Punchline of a Joke
             | 
| 
            14:05
            
            – 14:35
            
         | Matthew Lucas 
                Methods of Lateral Movement using Windows OpenSSH
             | 
| 
            14:55
            
            – 15:25
            
         | Ilan Sokol & Eran Ayalon 
                Essential principles in container internals
             | 
| 
            15:45
            
            – 16:15
            
         | Joris 
                Bikini bottom file encryption
             | 
| 
            16:35
            
            – 17:05
            
         | Erik Alm & Erik Eklund 
                Domain Admin through breaking and entering
             | 
SEC-T day 1
| 2023-09-14 | |
|---|---|
| 
            08:30
            
            – 09:00
            
         | Registration & breakfast 
                Please be early and have your QR code ready, there will likely be a line.
             | 
| 
            09:00
            
            – 09:30
            
         | Welcome talk | 
| 
            09:30
            
            – 10:30
            
         | Edwin van Andel 
                Compliancy vs security. Pentesting is dead
             | 
| 
            10:30
            
            – 11:00
            
         | Coffee break | 
| 
            11:00
            
            – 12:00
            
         | Igor Andriushchenko 
                3TAI – Autonomous Offensive AI Threat Modeling and Exploitation Framework
             | 
| 
            12:00
            
            – 13:00
            
         | Lunch | 
| 
            13:00
            
            – 14:00
            
         | Julia Zdunczyk 
                How to Break into Organizations with Style: Hacking Access Control Systems
             | 
| 
            14:05
            
            – 14:35
            
         | Mikael Simovits 
                Flipper Zero – Zero Trust or Beware of Geeks bearing gifts
             | 
| 
            14:35
            
            – 15:05
            
         | Coffee break | 
| 
            15:05
            
            – 15:35
            
         | Fredrik Sandström 
                Take all my money – penetrating ATMs
             | 
| 
            15:40
            
            – 16:20
            
         | Will Hunt 
                Pwning for plaintext: A hashcat 2.0 adventure
             | 
| 
            16:20
            
            – 16:50
            
         | Coffee break | 
| 
            16:50
            
            – 17:30
            
         | STÖK 
                Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare
             | 
| 
            17:30
            
            – 18:00
            
         | Short break | 
| 
            18:00
            
            – 19:00
            
         | Lightning talks 
                Interested in speaking? More information
             | 
| 
            18:00
            
            – 20:00
            
         | Dinner 
                Have some dinner wraps with the lightning talks.
             | 
| 
            19:30
            
            – 01:00
            
         | Club SEC-T 
                Our annual party is free and open for non-ticket holders as well so invite your friends! More information
             | 
SEC-T day 2
| 2023-09-15 | |
|---|---|
| 
            09:00
            
            – 10:00
            
         | Amit Dori 
                Threat Modeling Big Systems
             | 
| 
            10:05
            
            – 11:05
            
         | Rami McCarthy 
                Beyond the Baseline - Horizons for Cloud Security Programs
             | 
| 
            11:05
            
            – 11:30
            
         | Short break | 
| 
            11:30
            
            – 12:00
            
         | Lindsay Kaye 
                Started from the Bottom, Now We’re Here: The Evolution of ESXi Ransomware
             | 
| 
            12:00
            
            – 13:00
            
         | Lunch | 
| 
            13:00
            
            – 14:00
            
         | Fredrik Heiding 
                Devising and Detecting Phishing: Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails)
             | 
| 
            14:00
            
            – 14:15
            
         | Short break | 
| 
            14:15
            
            – 15:15
            
         | Nicholas Dubois 
                Input Output + Syslog (iO+S): Obtaining data from locked iOS devices via live monitoring
             | 
| 
            15:15
            
            – 15:45
            
         | Coffee break | 
| 
            15:45
            
            – 16:15
            
         | Vesa Virta 
                More Crypto from the FRA
             | 
| 
            16:15
            
            – 17:00
            
         | Wrap up talk 
                Credits all around, prices for the deserving.
             | 
All times and talk order is subject to sudden and radical change for any reason. Keep up to date by watching this page or listening to announcements during the conference. 😉
Coffee is available on a continuous basis.