Difference between revisions of "SPEAKERS"

From BalCCon 2k22 - Loading
Jump to: navigation, search
(Created page with " ===BalCCon2k22 SPEAKERS=== <div style="border-style: solid; color:#ffe641; font-size: 18px;"> {| border="1" cellpadding="6px" cellspacing="40px" ! style="text-align:center;"|Name ! style="text-align:center;"|Event |-- | '''Marc Nimmerrichter |style="width:200px; text-align: center;"|Kubernetes Security - Challenge and Opportunity |-- | '''Aleksandar Bakalov | align="center" | Meteo Sondes Hunting and Hacking |-- |'''Robert Simmons | align="center" | Malware Analy...")
 
 
(11 intermediate revisions by the same user not shown)
Line 4: Line 4:


<div style="border-style: solid; color:#ffe641; font-size: 18px;">
<div style="border-style: solid; color:#ffe641; font-size: 18px;">
{| border="1" cellpadding="6px" cellspacing="40px"
{| border="1" cellpadding="12px" cellspacing="40px"
! style="text-align:center;"|Name
! style="text-align:center;"|Name
! style="text-align:center;"|Event   
! style="text-align:center;"|Event   
|--
| style="width:200px; text-align: center;"|'''ZoZ
|style="width:600px; text-align: center;"|Lockpicking Intro
|--
| '''Blåhaj, Johan Aikema
|style="width:800px; text-align: center;"| ProxyHell
|--
| '''Mato
|style="width:800px; text-align: center;"| I want my RPC
|--
| '''Mirza Burhan Baig
|style="width:800px; text-align: center;"| The Great Hospital Hack !!
|--
| '''Zarko Zivanov
|style="width:800px; text-align: center;"| Reviving the TIM-011 (plus Workshop)
|--
|--
| '''Marc Nimmerrichter
| '''Marc Nimmerrichter
|style="width:200px; text-align: center;"|Kubernetes Security - Challenge and Opportunity  
|style="width:800px; text-align: center;"|Kubernetes Security - Challenge and Opportunity  
|--
| '''fladnaG
|style="width:800px; text-align: center;"|Internationalized Domain Names… and its possible bad uses
|--
|--
| '''Aleksandar Bakalov
| '''Aleksandar Bakalov
| align="center" | Meteo Sondes Hunting and Hacking  
| align="center" | Meteo Sondes Hunting and Hacking, Hunting Electronic Foxes
|--
|--
|'''Robert Simmons
|'''Robert Simmons
| align="center" | Malware Analysis Workshop  
| align="center" | Malware Analysis Workshop , Malicious Excel 4.0 Macros
|--
|--
| '''Vladan Nikolic
| '''Vladan Nikolic
Line 31: Line 49:
| '''Stevan Gostojic
| '''Stevan Gostojic
| align="center" | Masters in Information Security at Faculty of Technical Sciences  
| align="center" | Masters in Information Security at Faculty of Technical Sciences  
|--
| '''Aleksej
| align="center" | Surveillance required - Network effect of surveillance apps
|--
| '''Daisy Hilbrands
| align="center" | Decoding the patterns of bad communication 
|--
| '''MacLemon
| align="center" |  USB - How does it even work?
|--
| '''Sandra Bardón
| align="center" |  The Neverending Story… an APT real case!
|--
| '''Kost
| align="center" | Go Offensive Building Blocks
|--
| ''' Kirils Solovjovs
| align="center" | Screaming into the void: All e-signatures in the world are broken!
|--
| ''' Amelia Andersdotter, Kirils Solovjovs
| align="center" | There once was a "we" in "web"
|--
| ''' Hetti
| align="center" | The journey to becoming an IT security expert
|--
| ''' Radiona
| align="center" | TBD
|--
| ''' Jelena Cosic
| align="center" | Internet under sanctions: then and now
|--
|--
|}
|}
</div>
</div>

Latest revision as of 21:01, 10 September 2022

BalCCon2k22 SPEAKERS

Name Event
ZoZ Lockpicking Intro
Blåhaj, Johan Aikema ProxyHell
Mato I want my RPC
Mirza Burhan Baig The Great Hospital Hack !!
Zarko Zivanov Reviving the TIM-011 (plus Workshop)
Marc Nimmerrichter Kubernetes Security - Challenge and Opportunity
fladnaG Internationalized Domain Names… and its possible bad uses
Aleksandar Bakalov Meteo Sondes Hunting and Hacking, Hunting Electronic Foxes
Robert Simmons Malware Analysis Workshop , Malicious Excel 4.0 Macros
Vladan Nikolic Hardware Hacking
Vanja Svajcer Subjective and objective code similarity measures
Christina Come closer: digital connectedness and well-being in a pandemic and beyond
november From Ember to Inferno - Exchanging emails, shouldn't lead to complete disaster
Stevan Gostojic Masters in Information Security at Faculty of Technical Sciences
Aleksej Surveillance required - Network effect of surveillance apps
Daisy Hilbrands Decoding the patterns of bad communication
MacLemon USB - How does it even work?
Sandra Bardón The Neverending Story… an APT real case!
Kost Go Offensive Building Blocks
Kirils Solovjovs Screaming into the void: All e-signatures in the world are broken!
Amelia Andersdotter, Kirils Solovjovs There once was a "we" in "web"
Hetti The journey to becoming an IT security expert
Radiona TBD
Jelena Cosic Internet under sanctions: then and now