Log in to bookmark your favorites and sync them to your phone or calendar.
Registration, Gathering and Networking 08:30 - 09:30
Coffee Break
Lunch 13:20 - 14:15
Opening Words 09:30 - 10:00
The Unwanted Sons - Formalizing and Demonstratin... 10:05 - 10:50
Don't Feed the Hippos! 10:55 - 11:25
Hacking The IoT (Internet of Things) - PenTestin... 11:45 - 12:30
Hacking HTTP/2 - New attacks on the Internet’s N... 12:35 - 13:20
NodeJS Security Done Right - The tips and trick... 14:15 - 15:00
Putting the 'I' in Code Review - Turning Code Re... 15:05 - 15:50
Crippling HTTPS with unholy PAC 16:05 - 16:50
Integrating Security in Agile Pr... 16:55 - 17:25
Panel: Our Appsec Careers 17:30 - 18:10
Closing Words and...
The Threat of Advanced Cross-Site Search Attacks 10:05 - 10:50
The Dark Side of Search Engines... 10:55 - 11:25
Could a few lines of code it all up! 11:45 - 12:30
Java Hurdling: Obstacles and Techniques in Java... 12:35 - 13:20
The Ways Hackers Are Taking To Win The Mobile Ma... 14:15 - 15:00
Bot Extension - Abusing Google Chrome Extensions... 15:05 - 15:50
Law and the Israeli Cybersecurity Industry 16:05 - 16:50
Signoff or Sign-Out 16:55 - 17:25
Activity: Capture...
Activity: Capture the Flag 10:20 - 17:15