Difference between revisions of "SPEAKERS"
From BalCCon 2k22 - Loading
(2 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
|-- | |-- | ||
| style="width:200px; text-align: center;"|'''ZoZ | | style="width:200px; text-align: center;"|'''ZoZ | ||
|style="width:600px; text-align: center;"| | |style="width:600px; text-align: center;"|Lockpicking Intro | ||
|-- | |-- | ||
| '''Blåhaj, Johan Aikema | | '''Blåhaj, Johan Aikema | ||
|style="width:800px; text-align: center;"| ProxyHell | |style="width:800px; text-align: center;"| ProxyHell | ||
|-- | |-- | ||
| ''' | | '''Mato | ||
|style="width:800px; text-align: center;"| I want my RPC | |style="width:800px; text-align: center;"| I want my RPC | ||
|-- | |-- | ||
| ''' | | '''Mirza Burhan Baig | ||
|style="width:800px; text-align: center;"| The Great Hospital Hack !! | |style="width:800px; text-align: center;"| The Great Hospital Hack !! | ||
|-- | |-- | ||
Line 76: | Line 76: | ||
| ''' Radiona | | ''' Radiona | ||
| align="center" | TBD | | align="center" | TBD | ||
|-- | |||
| ''' Jelena Cosic | |||
| align="center" | Internet under sanctions: then and now | |||
|-- | |-- | ||
|} | |} | ||
</div> | </div> |
Latest revision as of 21:01, 10 September 2022
BalCCon2k22 SPEAKERS
Name | Event |
---|---|
ZoZ | Lockpicking Intro |
Blåhaj, Johan Aikema | ProxyHell |
Mato | I want my RPC |
Mirza Burhan Baig | The Great Hospital Hack !! |
Zarko Zivanov | Reviving the TIM-011 (plus Workshop) |
Marc Nimmerrichter | Kubernetes Security - Challenge and Opportunity |
fladnaG | Internationalized Domain Names… and its possible bad uses |
Aleksandar Bakalov | Meteo Sondes Hunting and Hacking, Hunting Electronic Foxes |
Robert Simmons | Malware Analysis Workshop , Malicious Excel 4.0 Macros |
Vladan Nikolic | Hardware Hacking |
Vanja Svajcer | Subjective and objective code similarity measures |
Christina | Come closer: digital connectedness and well-being in a pandemic and beyond |
november | From Ember to Inferno - Exchanging emails, shouldn't lead to complete disaster |
Stevan Gostojic | Masters in Information Security at Faculty of Technical Sciences |
Aleksej | Surveillance required - Network effect of surveillance apps |
Daisy Hilbrands | Decoding the patterns of bad communication |
MacLemon | USB - How does it even work? |
Sandra Bardón | The Neverending Story… an APT real case! |
Kost | Go Offensive Building Blocks |
Kirils Solovjovs | Screaming into the void: All e-signatures in the world are broken! |
Amelia Andersdotter, Kirils Solovjovs | There once was a "we" in "web" |
Hetti | The journey to becoming an IT security expert |
Radiona | TBD |
Jelena Cosic | Internet under sanctions: then and now |