An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.
One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems.
The conference schedule is now available
Note that the networking dinner location was wrong on our previous post.
The CORRECT PLACE for dinner will take place at this address:
Nash Airport Hotel 11 chemin de la Violette 1216 Cointrin Switzerland
Don’t forget to register for the dinner, workshops, conferences and contest onEventbrite
(and for the AppSec workshops).
Track 1 | Track 2 | Track 3 | |
9h30 – 10h30 | Intro Paul Such Keynote Mikko Hypponen | – | – |
10h30-11h | coffee break | ||
11h-12h | When you can’t afford 0days.Client-side exploitation for the masses Michele Orru, Krzysztof Kotowicz | Enjeux juridico-organisationnels et Contractuels du Cloud computing Nicolas Rosenthal | Mapping malware infections Ricky “HeadlessZeke” Lawshae |
12h-13h30 | lunch | ||
13h30-14h30 | Lurking in clouds: easy hacks for complex apps Nicolas Gregoire | Deploying cyberdefense measures and Policies in a Critical Infrastructure Sector Sébastien Bombal | Wallix TBA |
14h30-15h30 | JSMVCOMFG? To sternly look at JavaScript MVC and Templating Frameworks Mario Heiderich | Binary art – funky PoCs & visual docs Ange Albertini | Dalvik Executable (DEX) Tricks Axelle Apvrille |
15h30-16h | coffee break | ||
16h-17h | RFIDler Adam Laurie | I’ve got ARGuments for YOU ! Bruno Kerouanton | TBA |