Lightning talks
Did you think that the thrill of sharing your ideas in front of audience at BSides Ljubljana was something you’d never do? Do you work on a cool project and want to get the word out? Was your talk one of the hundreds that got rejected? Did you come up with an awesome hack that you need to share? Well, you’re in luck because there will be Lightning Talks at BSides Ljubljana.
Taking place as last slot in main track in our agenda – these fast paced sessions are perfect for pitching new software or hardware projects, exploits, creative pranks or strange ideas you need to get out to a global audience. Even if you don’t have an awesome idea or project to share, a Lightning Talk is perfect for pitching ..
- You can submit you talk via URL: http://goo.gl/forms/jLP0YhrvDv
- You can submit any time from now and yes also during BSides Ljubljana on the day of the event
- We assign timeslots on a first-come, first-served basis
- You get max. 10min for your talk (no Q&A or reserve time in your 10min slot also for Q&A, switching laptops and preparing slides)
Title | Description | Speaker |
---|---|---|
Qubes for Noobs | Quick introduction to some of the features of Qubes OS - a security focused Operating System based on Xen hypervisor | gor_zilla |
Back to (Visual) Basics | Malware creation: I thought the issue would be avoiding detection, not getting detected. I show what VB malware can do without AV noticing. | @AlanHendo7 |
@RIPE_Atlas probes | There will be some @RIPE_Atlas probes at BSidesLjubljana | @alescasar |
Attack the nameservers | We will discuss the usefulness of DNS attack vector and where it still comes in handy. | @Kondi_Si |
Do risk assessment WISER! | Presentation of cyberwiser-light tool and the tech behind it for easy cybersec risk assessment. | @alescernivec |
fbiOS | On the recent Apple Vs FBI case over the assistance the FBI is requesting from Apple helping unlock one of the San Bernardino shooters. | @mikeyjck |
Live Memory Analysis | An extremely brief look at using Volatility's little brother, Rekall, to look at the memory of a live machine without taking static dumps, and the advantages/disadvantages of this approach | @generalbrae |
Nitro Zeus | A quick look at code name Nitro Zeus and its role in the cyber attacks against Iran | @NiallWats0n |
Nope.js | Node.js is awesome. People's code is not. Here's a couple of authentication bypasses on crappy code & vulnerable libraries. | @admrply |
@AbertayHackers | A short talk on who we are and what we do. | @foxsmichael |
Slovenian IT excellence | ActorDB, Biocoded, CeBIT | @gregorspagnolo |