The First Day, 15 May, 2009

9:30-9:45 Opening Ceremony
9:45-10:50 Bruce Schneier - keynote “Reconceptualizing Security”
10:50-11:55 Joanna Rutkowska – keynote “Thoughts about Trusted Computing”
11:55-12:30 Eddie Schwartz “Understanding Social Networking Threats Using Live Threat Intelligence”
12:30-13:30 Lunch Break
  Network & OS - R&D Web & Database - R&D Hands-on
13:30-14:30 Adrian Pastor “A Pentester’s Guide to Credit Card Theft Techniques” Shreeraj Shah “Application Injections - Exploiting SQL, XSS & XPATH” Machtelt Garrels “SSH tips & tricks”
14:30-15:30 Łukasz Bromirski “Security by Duct Type. Because Failure is Always an Option” Alexander Kornbrust “Oracle SQL Injection in Webapps”
15:30-15:45 Coffee Break
15:45-16:45 Alberto Revelli, Nico Leidecker “Introducing Heyoka: DNS Tunneling 2.0″ Marc Schoenefeld “Reconstructing Dalvik source code” Lighting talks
16:45-17:45 Walter Belgers “Lockpicking 101″ Mario Heiderich “I thought you were my friend Malicious markup, browser issues and other obscurities”
17:45-18:45 Michał Sajdak “Remote Rootshell on a SOHO Router” Pavol Luptak “Public transport SMS ticket hacking”  
18:45-19:45 Martin Mocko “Race to Bare Metal: UEFI and Hypervisors” Sharon Conheady “Social engineering for penetration testers”  
21:00-… After Party in Kijów Club

The Second Day, 16 May, 2009

9:45-10:00 Opening Ceremony
10:00-11:05 Rich Smith “VAASeline: VNC Attack Automation Suite”
11:05-12:10 Jacob Appelbaum - keynote “Tor Network”
12:10-13:10 Tavis Ormandy - keynote TBD
13:10-14:10 Lunch Break
  Network & OS - R&D Web & Database - R&D Hands-on
14:10-15:10 Alessio L.R. Pennasilico DDoS: How Evil Forces Have Been Defeated Christian Heinrich “Googless” Marcin Filipiak “F5 BIG-IP Workshop”
15:10-16:10 Alexei Kachalin “Efficiency Estimation of Network Security Systems of Global Networks.” Sandro Gauci Scanning the Intertubes for VoIP
16:10-17:10 Michael Kemp “Rootkits are awesome: Insider Threat for Fun and Profit” Marc Schoenefeld “Java and JEE Vulnerabilities explained”  
17:10-18:10 Piotr Oleszkiewicz “Is Storm just a summer breeze? New concepts in malware” Raoul Chiesa “Corporate Security and Intelligence: the dark links”  

* Agenda może ulec zmianie