Trainings
All trainings start at 09:00 and end at 17:00. Registration opens at 8am
Training Schedule:
- Session 1: 09:00 - 10:30
 - Break
 - Session 2: 11:00 - 12:30
 - Lunch
 - Session 3: 13:30 - 15:00
 - Break
 - Session 4: 15:30 - 17:00
 
- 
      
        Hands-On Network Automation
      
      
Ivan Pepelnjak
 - 
      
        Introduction to BGP and BGP Security
      
      
Peter Hessler
 - 
      
        Military Strategy and Tactics for Cyber Security
      
      
Greg Conti
 - 
      
        Pentesting the Modern Application Stack
      
      
Francis Alexander Bharadwaj Machiraju
 - 
      
        Docker, DevOps & Security in Enterprise Environments
      
      
Simon Lipke
 - 
      
        Forensic Computing and Incident Analysis
      
      
Andreas Dewald
 - 
      
        Windows and Linux Exploitation
      
      
Oliver Matula Birk Kauer
 - 
      
        Get your hands dirty playing with RFID/NFC
      
      
Nahuel Grisolia Philippe Teuwen
 - 
      
        TLS/SSL in the enterprise
      
      
Michael Thumann Benjamin Schwendemann
 - 
      
        Insight into Windows Internals
      
      
Aleksandar Milenkoski Dominik Phillips
 - 
      
        Reverse Engineering a (M)MORPG
      
      
Antonin Beaujeant
 - 
      
        Hacking the USB World with FaceDancer
      
      
Kate Temkin Dominic Spill
 - 
      
        Software Defined Radio
      
      
Mike Ossmann
 - 
      
        Hardening Microsoft Environments
      
      
Friedwart Kuhn Heinrich Wiederkehr Florian Gattermeier
 - 
      
        Hacking 101
      
      
Sven Nobis Julian Suleder
 - 
      
        Jump-Starting Public Cloud Security
      
      
Christoph Klaaßen
 - 
      
        Exploitation on ARM based Systems
      
      
Sascha Schirra Ralf Schaefer
 - 
      
        Automation with Ansible: Radically simplify IT Operations
      
      
Kai Sparwald Jacky Hammer
 
NGI
- 
  Breaking IoT NGI Keynote
 - 
  Coffee Break
 - 
  Breaking IoT Is my toothbrush really smart?
 - 
  
 - 
  Lunch
 - 
  
 - 
  
 - 
  Coffee Break
 - 
  
 - 
  Breaking IoT Wrap Up
 
- 
  Coffee Break
 - 
  Building IoT IoT Security – A Joint Responsibility
 - 
  Building IoT Things Attack: Peek into a 18 months IoT honeypot
 - 
  Lunch
 - 
  
 - 
  
 - 
  Coffee Break
 - 
  
 - 
  Building IoT Wrap Up
 
Trainings
All trainings start at 09:00 and end at 17:00. Registration opens at 8am
Training Schedule:
- Session 1: 09:00 - 10:30
 - Break
 - Session 2: 11:00 - 12:30
 - Lunch
 - Session 3: 13:30 - 15:00
 - Break
 - Session 4: 15:30 - 17:00
 
- 
      
        Hands-On Network Automation
      
      
Ivan Pepelnjak
 - 
      
        Introduction to BGP and BGP Security
      
      
Peter Hessler
 - 
      
        Military Strategy and Tactics for Cyber Security
      
      
Greg Conti
 - 
      
        Pentesting the Modern Application Stack
      
      
Francis Alexander Bharadwaj Machiraju
 - 
      
        Docker, DevOps & Security in Enterprise Environments
      
      
Simon Lipke
 - 
      
        Forensic Computing and Incident Analysis
      
      
Andreas Dewald
 - 
      
        Windows and Linux Exploitation
      
      
Oliver Matula Birk Kauer
 - 
      
        Get your hands dirty playing with RFID/NFC
      
      
Nahuel Grisolia Philippe Teuwen
 - 
      
        TLS/SSL in the enterprise
      
      
Michael Thumann Benjamin Schwendemann
 - 
      
        Insight into Windows Internals
      
      
Aleksandar Milenkoski Dominik Phillips
 - 
      
        Reverse Engineering a (M)MORPG
      
      
Antonin Beaujeant
 - 
      
        Hacking the USB World with FaceDancer
      
      
Kate Temkin Dominic Spill
 - 
      
        Software Defined Radio
      
      
Mike Ossmann
 - 
      
        Hardening Microsoft Environments
      
      
Friedwart Kuhn Heinrich Wiederkehr Florian Gattermeier
 - 
      
        Hacking 101
      
      
Sven Nobis Julian Suleder
 - 
      
        Jump-Starting Public Cloud Security
      
      
Christoph Klaaßen
 - 
      
        Exploitation on ARM based Systems
      
      
Sascha Schirra Ralf Schaefer
 - 
      
        Automation with Ansible: Radically simplify IT Operations
      
      
Kai Sparwald Jacky Hammer
 
NGI
- 
  
 - 
  Coffee Break
 - 
  Breaking IoT Hacking Robots Before Skynet
 - 
  Breaking IoT swimming IoT or how to hack a Yacht
 - 
  Lunch
 - 
  
 - 
  
 - 
  Coffee Break
 - 
  Breaking IoT Lazy-Mode RF OSINT and Reverse Engineering
 - 
  Breaking IoT Wrap Up
 
- 
  
 - 
  Coffee Break
 - 
  
 - 
  
 - 
  Lunch
 - 
  
 - 
  
 - 
  Coffee Break
 - 
  
 - 
  IPv6 Wrap Up
 
Telco Security Day
Starts at 8:30
- 
  TSD Main Room Registration
 - 
  TSD Main Room Welcome Note
 - 
  
 - 
  
 - 
  Coffee Break
 - 
  
 - 
  TSD Main Room Building a Telecom Information Sharing Platform
 - 
  Lunch
 - 
  TSD Main Room Attacking NextGen Roaming Networks
 - 
  TSD Main Room Imsi-catcher catcher
 - 
  Coffee Break
 - 
  
 - 
  
 
Invite only event
Main Conference - Day 1
- 
  Attack & Research Keynote
 - 
  Coffee Break
 - 
  Attack & Research How to Bring HID Attacks to the Next Level
 - 
  Attack & Research A Stepping Stone To Car Hacking
 - 
  Lunch
 - 
  
 - 
  Attack & Research A short tale on protecting the long tail
 - 
  Coffee Break
 - 
  Attack & Research Reverse Engineering Black Box Systems with GreatFET & Facedancer
 - 
  Attack & Research Panel Discussion: Robot (1.5h)
 
- 
  Coffee Break
 - 
  Defense & Management From Zero to Secure Continuous Delivery in 60 Minutes
 - 
  Defense & Management Real-Life Network and Security Automation
 - 
  Lunch
 - 
  Defense & Management All Your Cloud Are Belong To Us - Hunting Compromise in Azure
 - 
  Defense & Management No royal road : advanced analysis for 'advanced' threats
 - 
  Coffee Break
 - 
  Defense & Management Security Appliances Internals
 - 
  Defense & Management Weaponizing Layer 8
 - 
  Defense & Management Verifying network IoC hits in millions of packets
 - 
  Defense & Management Project Walrus - An Android App for RFID Card Cloning
 
- 
  Coffee Break
 - 
  SAP Security SAP IGS : The 'vulnerable' forgotten component
 - 
  SAP Security SAP BUGS: The Phantom Security
 - 
  Lunch
 - 
  SAP Security Hunting crypto secrets in SAP systems
 - 
  
 - 
  Coffee Break
 - 
  
 - 
  
 
Shared Dinner
(time and location to be announced)
PacketWars™
Starts after Shared Dinner
10k Run
Starts at 7:00 – we meet at the Crowne Plaza Hotel
Main Conference - Day 2
- 
  Attack & Research TR18 Day 2 Keynote
 - 
  Coffee Break
 - 
  Attack & Research When Virtual Hell Freezes Over - Reversing C++ Code
 - 
  Attack & Research NFC Payments: The Art of Relay & Replay Attacks
 - 
  Lunch
 - 
  Attack & Research Unifying RF Fuzzing Techniques under a Common API: Introducing unfAPI
 - 
  Attack & Research The Wolf In SGX Clothing
 - 
  Coffee Break
 - 
  Attack & Research Ads networks are following you, follow them back
 - 
  Attack & Research Closing Remarks
 
- 
  Coffee Break
 - 
  Defense & Management Subverting Trust in Windows
 - 
  Defense & Management The Language of Security - Sharing Knowledge without Spreading FUD
 - 
  Lunch
 - 
  Defense & Management Blue Team Sprint: Let’s fix these 3 things on Monday
 - 
  
 - 
  Coffee Break
 - 
  Defense & Management Mobile App Security Fails and How To Survive Them
 
- 
  Coffee Break
 - 
  AD Security Active Directory Security: The Journey
 - 
  
 - 
  Lunch
 - 
  
 - 
  AD Security Defending Microsoft Environments at Scale
 - 
  Coffee Break
 - 
  
 
Roundtables
Roundtable sessions start at 09:00 and end at 13:00
- 
            Session 1
            
Active Directory Security
 - 
            Session 2
            
Internet of Things
 - 
            Session 3
            
Cloud & DevOps Security
 - 
            Session 4
            
Incident Analysis & Security Monitoring