0% found this document useful (0 votes)
107 views4 pages

Noconname2k22 Schedule

This document contains the schedule for the No cON Name 2022 cybersecurity conference being held on Friday, November 25th and Saturday, November 26th. The schedule lists the presentation topics, speakers, and times for each day. Presentation topics include common ransomware tactics, malware emulation, threat intelligence, Android threats, Active Directory attacks, radio car hacking, reversing endpoint detection response tools, serverless persistence, and IoT data exfiltration. The conference will be held at the Biblioteca Jaume Fuster in Barcelona, Spain and include breaks for lunch and networking.

Uploaded by

kddow nddk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views4 pages

Noconname2k22 Schedule

This document contains the schedule for the No cON Name 2022 cybersecurity conference being held on Friday, November 25th and Saturday, November 26th. The schedule lists the presentation topics, speakers, and times for each day. Presentation topics include common ransomware tactics, malware emulation, threat intelligence, Android threats, Active Directory attacks, radio car hacking, reversing endpoint detection response tools, serverless persistence, and IoT data exfiltration. The conference will be held at the Biblioteca Jaume Fuster in Barcelona, Spain and include breaks for lunch and networking.

Uploaded by

kddow nddk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

No cON Name 2k22

#Cybersecurity

Friday - 25N

8:30–10:30 Fast Check-in (prepare your QRs while waiting outside)

10:30–10:45 No cON Name presentation - Staff

10:45–11:30 Common TTPs of modern ransomware – Marc Rivero

11:45–12:30 Developer in a digital crosshair, 2022 ed. - Mateusz Olejarka

Break

13:00–13:45 Malware emulation with scemu – Jesús Olmos

Lunch

16:30-17:15 Inside the Halls of a Criminal Business – David Sancho

17:30-18:15 Building Threat Int. from the malware network protocol - Albert Priego

18:30-19:15 Container Escape: All you need is cap - Ilan Sokolovsky, Eran Ayalon

Biblioteca Jaume Fuster Hashtag #NcN2k22

Schedule
Plaça de Lesseps, 20-22,
Barcelona, Spain @noconname

@hemerotecadeseguridad

https://ww.noconname.org
#Cybersecurity

Saturday - 26N
10:15–11:00 Development of Threat Intelligence platforms with the integrity of the security
operation center. - Touhami Kasbaoui

11:15–12:00 Android Threats in Legitimate App Stores - Android Threats in Legitimate App
Stores - Tatyana Shishkova

Break

12:20–13:05 El compendio definitivo de ataques en Directorio Activo - Jorge Escabias

13:05-13:50 Radio Car Hacking, mejorando rolljam para ataques en entornos reales -
Joel Serna Moreno

Lunch

16:15-17:00 Reversing and Debugging EDRs to find vulnerabilities and strengths -


Alejandro Pinna

17:15-18:00 Is persistence on serverless even possible?! Pwning AWS Lambdas & GCP Cloud
Functions - Paweł Kusiński

18:15-19:00 Characterization and Evaluation of IoT Protocols for Data Exfiltration -


Daniel Uroz - Ricardo J.Rodriguez

19:00 Raffle, closing #ncn2k22 and going for beers

Biblioteca Jaume Fuster Hashtag #NcN2k22

Schedule
Plaça de Lesseps, 20-22,
Barcelona, Spain @noconname

@hemerotecadeseguridad

https://ww.noconname.org
Thank you for support a
echo 2022 | sha1sum | base64 -w 20

non-profit initiative with


your entrance
and the support of

Closing day 2 we will


raffle an Evil Crow RF v2
….
..
and we’ll go for beers

You might also like