-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
executable file
·1138 lines (1125 loc) · 77.1 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html lang="en" ng-app="app">
<head>
<meta charset="utf-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="viewport" content="initial-scale=0.7, maximum-scale=1" />
<meta name="description" content="" />
<meta name="author" content="" />
<title>Securi-Tay 2018</title>
<!-- Bootstrap Core CSS -->
<link rel="stylesheet" href="css/bootstrap.min.css" type="text/css" />
<!-- Custom Fonts -->
<link href="https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,200,400,300,600,700,800" rel="stylesheet" type="text/css" />
<link href="https://fonts.googleapis.com/css?family=Merriweather:400,300,300italic,400italic,700,700italic,900,900italic" rel="stylesheet" type="text/css" />
<link rel="stylesheet" href="font-awesome/css/font-awesome.min.css" type="text/css" />
<!-- Custom CSS -->
<link rel="stylesheet" href="./css/creative.css" type="text/css" />
<!-- Favicon code -->
<meta name="application-name" content="Securi-Tay 2018" />
<meta name="msapplication-TileColor" content="#FFFFFF" />
<!-- Coloured application bars -->
<!-- Chrome, Firefox OS and Opera -->
<meta name="theme-color" content="#682d8c" />
<!-- Windows Phone -->
<meta name="msapplication-navbutton-color" content="#682d8c" />
<!-- iOS Safari -->
<meta name="apple-mobile-web-app-status-bar-style" content="#682d8c" />
<!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body id="page-top">
<!-- ************************** --
-- Site Design by Adam Rapley --
-- www.adamrapley.com --
-- ************************** -->
<nav id="mainNav" class="navbar navbar-default navbar-fixed-top">
<div class="container-fluid">
<!-- Brand and toggle get grouped for better mobile display -->
<div class="navbar-header">
<button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#bs-example-navbar-collapse-1"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button>
<a class="navbar-brand page-scroll" href="#page-top"><img class="brandlogo" src="img/ehslogoblackbgfill.png" /></a>
</div>
<!-- Collect the nav links, forms, and other content for toggling -->
<div class="collapse navbar-collapse" id="bs-example-navbar-collapse-1">
<ul class="nav navbar-nav navbar-right pull-right">
<li> <a class="page-scroll" href="#about">About</a> </li>
<li> <a class="page-scroll" href="#sponsors">Sponsors</a> </li>
<li> <a class="page-scroll" href="#schedule">Schedule</a> </li>
<li> <a class="page-scroll" href="#tickets">Tickets</a> </li>
</ul>
</div>
<!-- /.navbar-collapse -->
</div>
<!-- /.container-fluid -->
</nav>
<header>
<div class="header-content">
<div class="header-content-inner">
<!-- Hero image used under CC BY-NC-ND 4.0
Original image by Tim Haynes 2013 and found here:
http://soc.sty.nu/2014/12/bright-light-city/ -->
<img src="img/webwhitelegit.png" class="" id="logo" />
</div>
</div>
</header>
<section class="bg-primary" id="about">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2 text-center">
<h2 class="section-heading">It's time...</h2>
<hr class="light" />
<p class="text-faded">Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University. After the sell-out success of Securi-Tay 2017, this year’s event will run on <b>Friday 18th of May and Saturday 19th of May</b>. The conference will be held in Abertay University, benefiting from the fantastic transport links to Dundee. As well as transport, Dundee benefits from affordable accommodation in the city centre, as well as a thriving technology community and the reputation for being Scotland’s sunniest city.</p>
<p class="text-faded"> The conference is aimed at anyone with an interest in Hacking and Information Security. You don’t need to be a l33t h4x0r to attend and enjoy the event: Securi-Tay promises to provide a fantastic, worthwhile experience for everyone, new to the scene and conference veteran alike. The conference will feature talks from industry professionals and students as well as some workshops. Lunch and an evening buffet will be provided in the bar across the street. </p>
</div>
</div>
</div>
</section>
<section class="bg-primary" id="sponsors">
<div class="container">
<div class="row">
<div class="col-lg-8 col-lg-offset-2 text-center">
<h2 class="section-heading">Sponsors</h2>
<hr class="light" />
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-6 col-sm-6 col-lg-offset-3 col-sm-offset-3">
<div class="portfolio-box pb1">
<a href="https://rum.supply/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
After Party Sponsor
</div>
<div class="company-name">
LizardHQ
</div>
</div>
</div>
</a>
</div>
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-5 col-sm-5">
<div class="portfolio-box pb2">
<a href="https://www.mwrinfosecurity.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
MWR
</div>
</div>
</div>
</a>
</div>
</div>
<div class="col-lg-5 col-sm-5 col-lg-offset-1 col-sm-offset-1">
<div class="portfolio-box pb3">
<a href="http://www.lloydsbankinggroup.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
Lloyds Banking Group
</div>
</div>
</div>
</a>
</div>
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-6 col-sm-6 col-lg-offset-3 col-sm-offset-3">
<div class="portfolio-box pb4">
<a href="https://www.synopsys.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
Synopsys
</div>
</div>
</div>
</a>
</div>
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-5 col-sm-5">
<div class="portfolio-box pb5">
<a href="https://ecs.co.uk/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
ECS
</div>
</div>
</div>
</a>
</div>
</div>
<div class="col-lg-5 col-sm-5 col-lg-offset-1 col-sm-offset-1">
<div class="portfolio-box pb6">
<a href="https://www.bsigroup.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Silver Sponsor
</div>
<div class="company-name">
bsi
</div>
</div>
</div>
</a>
</div>
</div>
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-6 col-sm-6 col-lg-offset-3 col-sm-offset-3">
<div class="portfolio-box pb7">
<a href="https://www.symantec.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Bronze Sponsor
</div>
<div class="company-name">
Symantec
</div>
</div>
</div>
</a>
</div>
</div>
</div>
<div class="row no-gutter">
<div class="col-lg-5 col-sm-5">
<div class="portfolio-box pb8">
<a href="https://www.isc2.org/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Bags Sponsor
</div>
<div class="company-name">
(ISC)<sup>2</sup>
</div>
</div>
</div>
</a>
</div>
</div>
<div class="col-lg-5 col-sm-5 col-lg-offset-1 col-sm-offset-1">
<div class="portfolio-box pb9">
<a href="http://www.redactedfirm.com/" target="_blank">
<div class="portfolio-box-caption">
<div class="portfolio-box-caption-content">
<div class="sponsor-title">
Lanyards Sponsor
</div>
<div class="company-name">
Redacted Firm
</div>
</div>
</div>
</a>
</div>
</div>
</div>
</div>
</section>
<section id="schedule">
<div class="container">
<div class="row">
<div class="col-lg-12 text-center">
<h2 class="section-heading">Schedule</h2>
<hr class="primary" />
<p class="text-faded">We're happy to announce the schedule for the conference is now available!</p>
<p class="text-faded">You can also find the <a href="/assets/programme.pdf">programme online</a>.
<!-- SCHEDULE TAB -->
<ul id="myTab" class="nav nav-tabs" role="tablist">
<li role="presentation" class=""><a href="#day1" id="day1-tab" role="tab" data-toggle="tab" aria-controls="day1" aria-expanded="false">Day 1</a></li>
<li role="presentation" class="active"><a href="#day2" role="tab" id="day2-tab" data-toggle="tab" aria-controls="day2" aria-expanded="true">Day 2</a></li>
</ul>
<!-- CONTENT -->
<div id="myTabContent" class="tab-content">
<!-- DAY 1 -->
<div role="tabpanel" class="tab-pane fade in" id="day1" aria-labelledby="day1-tab">
<div class="panel-group" id="accordion1" role="tablist" aria-multiselectable="true">
<!-- 9-00 TIMESTAMP -->
<div class="shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">9-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Registration" aria-expanded="true" aria-controls="Registration"> Registration </a> </h4>
</div>
</div>
</div>
<div id="Registration" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p class="speaker-name uppercase">Welcome!</p>
<p>Meet us in the foyer of Abertay University and sign in!<br />There's also free stuff!</p>
<p class="abstract">The first 350 people to arrive will get a free bacon roll! (or veggie alternative)</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Foyer</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 10-00 TIMESTAMP -->
<div class="row shed-row-item shed-dark">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">10-00</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Key1" aria-expanded="true" aria-controls="Key1"> Opening Keynote </a> </h4>
</div>
</div>
</div>
<div id="Key1" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<h4>Incident Response in Your Pyjamas</h4>
<p class="abstract">When security incidents happen, you often have to respond in a hurry to gather forensic data from the resources that were involved. You might need to grab a bunch of hard drives and physically visit the data centre to capture data from the systems. And that would mean getting dressed. When infrastructure is in the cloud, you have remote access and APIs for managing all your infrastructure, so you can respond to incidents with automation and do your forensic analysis in your bunny slippers. But is it as good as the capabilities you have in a data centre? Is getting dressed the price you have to pay for high quality forensics and incident response? In this talk Paco will explain the two major domains of cloud events (infrastructure domain and service domain) and describe the security and incident response techniques pioneered by AWS customers like Mozilla, Alfresco, and Netflix. He'll explain how to isolate resources to preserve the integrity of the data; get RAM dumps and disk image snapshots; and identify unauthorised changes to cloud resources using API tools and logs. And all of this while wearing pyjamas.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="primary" />
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About Paco Hope</h5>
<p class="small">I'm a security consultant with Amazon Web Services, helping to secure applications and data in the cloud. I've previously done a lot of penetration testing, source code review, and threat modeling. Today I help the biggest enterprises securely move their sensitive data and business critical workloads to the cloud.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 11-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">11-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#Talk1" href="#Talk1" aria-expanded="true" aria-controls="Talk1"> Internal security your developers won't hate </a> </h4>
</div>
</div>
</div>
<div id="Talk1" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Internal security systems are often cumbersome and difficult to use, leading to your developers not always following best practice. In addition, data egress and unauthorised access are difficult to spot without analysing every endpoint your business uses, including the ones normally outside your sphere of control. In this talk, we outline a new type of heuristics-driven internal security system, designed to be both developer-friendly and easily-extensible.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin" />
<h5>About Jonathan Kingsley & Jamie Hoyle</h5>
<p class="small">Jonathan Kingsley is the VP of Engineering at MirrorWeb. When he's not building backend systems, he likes to write film scripts and set swimming pools on fire.<br /><br /> Jamie Hoyle is the VP of User Experience at MirrorWeb. He's a long-suffering Bury FC fan, and accidentally became the CTO at an IoT firm for 9 months.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#Talk2" href="#Talk2" aria-expanded="true" aria-controls="Talk2"> So you have your degree- now what? </a> </h4>
</div>
</div>
</div>
<div id="Talk2" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">In this presentation Eamonn highlights the growing transition from real to virtual, from dead to live and the overarching appeal and employability of the multi-faceted security professional.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin" />
<h5>About Eamonn Keane</h5>
<p class="small">Eamonn has been prominent in the cyber security spectrum for some years with numerous roles. Working for Police Scotland he has led digital forensic and cyber investigation teams on an international, National and local level.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-00 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#lunchone" aria-expanded="true" aria-controls="LunchOne"> Lunch </a> </h4>
</div>
</div>
</div>
<div id="lunchone" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p>Hop over the road to Abertay Student Union for a bite to eat before the afternoon talks.<br /> Oh, lunch is provided as well by the way!</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">45 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Bar One</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 12-45 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-45</p>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk3" aria-expanded="true" aria-controls="Talk3"> Cloudy Cluster Catastrophe? </a> </h4>
</div>
</div>
</div>
<div id="Talk3" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">"Cloud Native" computing has been a hot topic in the last 18 months with tech. companies joining the CNCF at a rate of knots. At the same time containerization and solutions like Kubernetes have been gaining traction with a wide range of companies as a easy way to run their workloads in the cloud.<br /><br /> With any new trend in computing always comes the question "Can we Pwn it?" . This talk aims to take a look at containerization and cloud computing to see what the answer to that question is.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin" />
<h5>About Rory McCune</h5>
<p class="small">Rory has worked in the Information and IT Security arena for the last 17 years in a variety of roles, from financial services, to running a small testing company, to working for large companies as a consultant.<br /> These days he spends most of his work time on application, cloud and container security. He’s an active member of the UK InfoSec community and has been presenting at security and general IT conferences for the last 8 years.<br /> When he’s not working he can generally be found out and about enjoying the scenery in the Highlands of Scotland, when the midgies aren’t biting!</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk4" aria-expanded="true" aria-controls="Talk4"> I Wrote my Own Ransomware; did not make 1 iota of a Bitcoin </a> </h4>
</div>
</div>
</div>
<div id="Talk4" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">2016 saw a substantial rise in ransomware attacks and in some cases the return of some favourites with Cryptowall, CTB-LOCKER and TeslaCrypt being some of the most popular. The volume of attacks was in fact pretty steady for a good part of the year, with regular campaigns coming out on a weekly basis. It was interesting to see the variety in mechanisms used for the ransomware which not only included self-contained binaries but went all the way to the use of scripts. As part of the research I conduct last year, I wanted to understand why such a drive and lure for ransomware outside of the victims will pay as well as have some way of properly testing "anti-ransomware" solutions with an unknown variant. So to do that, I went ahead and built my own ransomware and drew some conclusions on why it became so popular.<br /><br /> The intent of this talk is to demonstrate why ransomware has become a tool of choice for attackers beyond the notion of victims will pay. By analysing and investigating existing ransomware and delivery methods, I outlined a framework to easily build my own version of a ransomware. </p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin" />
<h5>About Thomas V Fischer</h5>
<p class="small">As a global security advocate and threat researcher, Thomas spends his time advising companies on managing their data protection activities against malicious parties not just external threats but also compliance instigated. Thomas' 25+ years background in IT includes varying roles from incident responder to security architect at fortune 500 company, vendors and consulting organizations. Thomas is also an active participant in the InfoSec community not only as a member but also as director of Security BSides London, and ISSA UK chapter board member.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 13-45 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">13-45</p>
</div>
<!-- T1 Snowden -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk5" aria-expanded="true" aria-controls="Talk5"> An Introduction To Binary Application Assessments </a> </h4>
</div>
</div>
</div>
<div id="Talk5" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Assessing binary applications (i.e. anything with an EXE, DLL, JAR, etc.) can be a challenging space to get started in due to the large number of languages, platforms, network protocols, and other supporting technologies. This talk will cover a range of common security vulnerabilities that I find in my day-to-day work, how I generally find them, how you can exploit them, and what remediation you can suggest to clients.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin" />
<h5>About Graham Sutherland</h5>
<p class="small">Graham has been working as a penetration tester for the last 5 years, and currently heads up the binary application assessment service at Cisco Advanced Services. His main areas of focus are Windows applications and drivers, cryptography, and hardware.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk6" aria-expanded="true" aria-controls="Talk6"> Spear Phishing: from LinkedIn to logged in </a> </h4>
</div>
</div>
</div>
<div id="Talk6" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Spear phishing is on the rise, and the more our lives are displayed online, the more information a hacker has to target us. This talk will describe our journey for a spear phishing attack, detailing how to pick and research vulnerable targets via social media, and then how to construct emails based on the information discovered. Finally, we will demonstrate a typical spear phishing attack and the access a hacker could expect to obtain following a successful campaign.<br /><br /> We will use real-life case studies from social engineering engagements, supported with statistics from the attacks and the resulting real-world consequences.<br /> After this talk attendees will understand:<br /> </p>
<ul>
<li>The effectiveness of social media in planning spear phishing attacks</li>
<li>How to recognise common spear phishing attack vectors</li>
<li>How to protect themselves and their organisation against spear phishing</li>
</ul>
<p></p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin" />
<h5>About Alex Archondakis</h5>
<p class="small">Alex Archondakis is a self-taught ethical hacker, with a background in programming and a particular interest in human psychology and social engineering. Alex specialises in web application and external infrastructure testing and recently co-presented a two-day workshop at ISACA CSX Europe on Red versus Blue teaming.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">14-45</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#breakone" aria-expanded="true" aria-controls="LunchOne"> Break </a> </h4>
</div>
</div>
</div>
<div id="breakone" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p><a href="https://www.youtube.com/watch?v=PHdU5sHigYQ" target="_blank">Take five!</a> ... or fifteen.</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">15 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Wherever you want!</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 15-00 TIMESTAMP -->
<div class="shed-dark shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">15-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk7" aria-expanded="true" aria-controls="Talk7"> Probe-Req Sniffing on the Wemos IoT Platform </a> </h4>
</div>
</div>
</div>
<div id="Talk7" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Mobile Wifi devices routinely emit probe-req packets giving details of the BSSIDs they have been associated with in the past - the Pineapple device exploits this very feature. Some devices now emit spoofed MAC addresses as part of their tracking preventing. But what if there existed a scalable WiFi scanning monitoring network? Would this enable devices even with obfuscated MACs to be tracked. This presentation describes work-in-progress to built cheap (disposable!) Wifi tracking devices and the infrastructure to support the capture,data-mining, analysis and visualisation of probe-req packet information with a view
to understanding the potential threat to privacy it represents.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin" />
<h5>About Dr Ian Ferguson</h5>
<p class="small">Senior Lecturer, Abertay University.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel shed-dark panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk8" aria-expanded="true" aria-controls="Talk8"> Diversity In InfoSec (not that sort!) </a> </h4>
</div>
</div>
</div>
<div id="Talk8" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">A talk in 2 parts.<br /><br />In Part 1 I'll use the OSI 7 Layer Model as a talking point about the diversity of areas of work/research/areas of concern across the infosec spectrum.<br /><br /><br />In Part 2, Rockstars vs Plumbers; I'll talk about the work that enterprise security people do across layers, how this relates to "rockstar" researchers, and security versus compliance.<br /><br />The aim of the talk is help bridge the gap between various infosec "tribes" and educate attendees on the breadth of topics and how they relate to one another. e.g. for those working at the application layer the issues at other areas of the stack; and why "plumber" work/doing the basics is still important work, how compliance activities can aide security; and why research work is important and helps day-to-day enterprise security admins.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin" />
<h5>About Victoria Walberg</h5>
<p class="small">Over 15 years enterprise IT/infosec experience, currently working in a freelance/interim capacity, coming from sys admin/network engineer background. Worked for a with a mix of orgs: media, public sector/NFP, engineering, FMCG, SaaS/online, finance. PgDip in Software and Systems Security, CISSP.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DOUBLETRACK -->
<!-- 16-00 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">16-00</p>
</div>
<!-- T1 Snowden -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk9" aria-expanded="true" aria-controls="Talk9"> Analysing the Privacy of VPN's on iOS </a> </h4>
</div>
</div>
</div>
<div id="Talk9" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Snowden Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Due to the increasing number of recommendations for people to use VPN’s for privacy reasons, more app developers are creating VPN apps and publishing them on the Apple App Store and Google Play Store. In this ’gold rush’, apps are being developed quickly and, in turn, not being developed with security fully in mind. This talk outlines some of the research undertaken as part of my final year dissertation into the security and privacy of VPN apps on Apple's iOS platform, gives an insight into the general state of security on an ecosystem that is generally known to be secure and discusses methods to build secure VPN clients.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="thin" />
<h5>About Jack Wilson</h5>
<p class="small">I'm a fourth year student at Abertay University, studying BSc (Hons) Ethical Hacking. My interests include offensive & defensive security and privacy.</p>
</div>
</div>
</div>
</div>
</div>
<!-- T2 Cash Only -->
<div class="panel panel-default col-lg-5 col-md-5 col-sm-5">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Talk10" aria-expanded="true" aria-controls="VRHeadset"> I Thought I Saw a |-|4><0.- </a> </h4>
</div>
</div>
</div>
<div id="Talk10" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-12 col-md-12 col-sm-12">
<p class="abstract">Threat Hunting refers to proactively and iteratively searching through networks or datasets to detect and respond to advanced threats that evade traditional rule- or signature-based security solutions. But what does that really mean? And what real impact does it have on the security team?<br /><br />Threat hunting looks at a mountain of security data already being produced daily by the traditional monitoring solutions such as netflow data, firewall events and logs. Now include end point data and the events to review explode exponentially. The claim, from various vendors, is that the additional data provides greater visibility but for whom. Traditional incident detection doesn't necessarily take into consideration the endpoint events. Building a threat hunting activity scoped to start with end point data can significantly change the game.<br /><br />This talk is a journey of how to dive into threat hunting and will cover the principals of threat hunting as a foundation while examining the challenges of working with large datasets that can be generated by end point data and analyse some of the tools claiming to ease this burden including machine learning.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 2 (2517)</span></p>
<hr class="thin" />
<h5>About Thomas V Fischer</h5>
<p class="small">As a global security advocate and threat researcher, Thomas spends his time advising companies on managing their data protection activities against malicious parties not just external threats but also compliance instigated. Thomas' 25+ years background in IT includes varying roles from incident responder to security architect at fortune 500 company, vendors and consulting organizations. Thomas is also an active participant in the InfoSec community not only as a member but also as director of Security BSides London, and ISSA UK chapter board member.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-00 TIMESTAMP -->
<div class="row shed-dark shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">17-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="shed-dark panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#breaktwo" aria-expanded="true" aria-controls="breaktwo"> Break </a> </h4>
</div>
</div>
</div>
<div id="breaktwo" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p><a href="https://www.youtube.com/watch?v=PHdU5sHigYQ" target="_blank">Take five!</a> ... or fifteen.</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">15 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Wherever you want!</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 17-00 TIMESTAMP -->
<div class="shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">17-15</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Key2" aria-expanded="true" aria-controls="Key2"> LizardHQ Keynote </a> </h4>
</div>
</div>
</div>
<div id="Key2" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<h4>Advancing Cyber</h4>
<p class="abstract">This talk will discuss how we can leverage current/emerging techniques in infosec to advance our capabilities to hack shit/do research/write more secure code. Basically a "here is the awesome stuff we have now and massively underuse". Kinda broken into 3 bits - advanced exploitation techniques/RE techniques (SAT/SMT solvers, program synthesis), stuff we have now that makes writing secure code possibly easier (langsec, rust, mitigations), and stuff testers can leverage to get the job done better (data driven test cycles, collaborative testing, etc). The objective of this talk is to point out stuff people can go try out / use / look into for advancing the field a bit</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">60 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
<hr class="primary" />
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About Darren Martyn.</h5>
<p class="small">Darren is a member of LizardHQ, a community of security researchers and activists, and infosec research think tank.</p>
<span class="about-speaker"><i class="fa fa-lg fa-globe"></i> <a class="small" href="https://rum.supply/" target="_blank">rum.supply</a></span>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 18-00 TIMESTAMP -->
<div class="shed-dark row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">18-15</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#remarks" aria-expanded="true" aria-controls="LunchOne"> Closing Remarks </a> </h4>
</div>
</div>
</div>
<div id="remarks" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p>Just a couple of words before the...</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">15 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Lecture Theatre 1 (2516)</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 18-30 TIMESTAMP -->
<div class="shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1 timeitem">
<p class="date">18-30</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a class="shed-title" data-toggle="collapse" data-parent="#accordion" href="#afterparty" aria-expanded="true" aria-controls="LunchOne"> Afterparty </a> </h4>
</div>
</div>
</div>
<div id="afterparty" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p>Sponsored by LizardHQ, join us in the union for a few(?) drinks and lots of awesome chat!</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">???</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Abertay Student Union</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- DAY 2 -->
<div role="tabpanel" class="tab-pane active fade in" id="day2" aria-labelledby="day2-tab">
<div class="panel-group" id="accordion1" role="tablist" aria-multiselectable="true">
<!-- 11-00 TIMESTAMP -->
<div class="shed-row-item row shed-dark">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">11-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#Breakfast" aria-expanded="true" aria-controls="Breakfast"> Breakfast </a> </h4>
</div>
</div>
</div>
<div id="Breakfast" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p class="speaker-name uppercase">Good Morning!</p>
<p>Meet us in Bar One for a breakfast buffet a chill atmosphere.</p>
<p class="abstract">Pancakes, refreshments, and more!</p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">75 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Abertay Student Union</span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-15 TIMESTAMP -->
<div class="row shed-row-item">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-15</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#D2Talk1" aria-expanded="true" aria-controls="D2Talk1"> Storing Secrets in DNS </a> </h4>
</div>
</div>
</div>
<div id="D2Talk1" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<h4>Storing Secrets in DNS</h4>
<p class="abstract">DNS is great. DNS TXT records are greater. A quick run through of how I manage my VPN tokens using DNS and some bash hackery.</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">15 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Abertay Student Union</span></p>
<hr class="primary" />
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About Oliver Leaver-Smith.</h5>
<p class="small">Greasing wheels, chasing 9s, polishing LAMPs, and doing devops at Sky Betting and Gaming</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-15 TIMESTAMP -->
<div class="row shed-row-item shed-dark">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">12-30</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#D2Talk3" aria-expanded="true" aria-controls="D2Talk3"> Engineered Chaos: Breaking Prod and Getting Away With It </a> </h4>
</div>
</div>
</div>
<div id="D2Talk3" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<h4>Engineered Chaos: Breaking Prod and Getting Away With It</h4>
<p class="abstract">A talk around disaster recovery testing, chaos engineering, etc. and how we do this at Sky Betting and Gaming</p>
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">30 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Abertay Student Union</span></p>
<hr class="primary" />
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About Oliver Leaver-Smith.</h5>
<p class="small">Dad, husband, computer-man. Greasing wheels, chasing 9s, polishing LAMPs, and doing devops at Sky Betting and Gaming</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 11-00 TIMESTAMP -->
<div class="shed-row-item row">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">13-00</p>
</div>
<!-- T1/2 REGISTRATION -->
<div class="panel panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#D2Talk4" aria-expanded="true" aria-controls="D2Talk4"> Profiling the attacker </a> </h4>
</div>
</div>
</div>
<div id="D2Talk4" class="panel-collapse collapse" role="tabpanel" aria-labelledby="heading1">
<!-- Registration Content -->
<div class="panel-body">
<div class="row">
<div class="col-lg-7 col-md-7 col-sm-11 col-lg-offset-2 col-md-offset-2">
<p class="speaker-name uppercase">Profiling the attacker</p>
<p class="abstract">It was once said "Intrusion analysis is as much about TCPdump as astronomy is about telescopes. Understnading who is attacking a network and why is just as important as analysing the packets on the line.<br /><br />
This slot will focus on a technical offender profiling framework that can be used to build a knowledge base on malicious actors. This talk will take a deep dive into the following areas:<br /><br />
<ul>
<li>Building an information classification for your assets</li>
<li>Attack significance plotting</li>
<li>Discerning motive</li>
<li>Attacker kill chain analysis</li>
<li>Malicious actor profile checklist and naming conventions</li>
</ul></p>
<div class="iconcontainer">
<p class="itemIcon"><i class="fa fa-lg fa-clock-o"></i> <span class="small">30 mins</span></p>
<p class="itemIcon"><i class="fa fa-lg fa-map-marker"></i> <span class="small">Abertay Student Union</span></p>
<hr class="primary" />
</div>
</div>
<div class="col-lg-3 col-md-3 col-sm-11">
<h5>About James Stevenson.</h5>
<p class="small">I am a computer security consultant that has worked in a variety of security roles, from SOC work to sec dev ops. I have a BSc in Computer Security as well as certifications in other areas, including Prince2. I have also written for several websites in the past and began speaking at security conferences in 2017.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<!-- 12-15 TIMESTAMP -->
<div class="row shed-row-item shed-dark">
<div class="col-lg-1 col-md-1 col-sm-1">
<p class="date">13-30</p>
</div>
<!-- T1/2 NCC Keynote -->
<div class="panel shed-dark panel-default col-lg-11 col-md-11 col-sm-11">
<!-- Program Heading -->
<div class="shed-dark panel-heading" role="tab" id="heading1">
<div class="row">
<div class="col-lg-11 col-md-11 col-sm-11">
<h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#D2Talk5" aria-expanded="true" aria-controls="D2Talk5"> Vulnerability Anti-Pattern </a> </h4>