Programme

Programme - subject to change

All times are CET (German summer time). The slot length includes Q&A. All presentations are pre-recorded with the speaker available for questions after the talk and in the Slack chat.

Schedules

Day Date Schedule
0 Sunday, 2021-06-20, 09:00 CET Workshop day
1 Monday, 2021-06-21, 13:00 CET Conference day 1
2 Tuesday, 2021-06-22, 13:00 CET Conference day 2

Workshops

Date: 2021-06-20

Workshop registration will be done with pretix. You can book your workshop or CTF here. One workshop or CTF per person can be booked.

Time Length Title Authors
9:00 4h The Sorcery of Malware Reverse Engineering Ashwathi Sasi
9:00 3h Fuzzing and finding vulnerabilities on Linux Hardik Shah
10:00 4h Finding and exploiting basic buffer overflows Christian Gross and Sarah Mader
10:00 4h OSINT for Cyber Defenders Mario Rojas
13:00 4h OpenSourced Threat Hunting with Graylog + MISP + Sysmon Bruno Diniz
14:00 4h CTF: BHealth21-Secure Healthcare Services Fujitsu - Markus Endter

Conference day 1

Date: 2021-06-21

Time Length Title Authors
13:00 35 Elbsides Keynote - Practical DevSecOps and Beyond Thomas Fricke
13:35 20 Elbsides Sponsor Talk  
13:55 35 Demystifying the state of kubernetes cluster security - the cloud native way Vasant Chinnipilli and Pralhad Chaskar
14:30 20 Break  
14:50 20 Abracadabra - A researcher’s reversing spell! Sreenidhi Ramadurgam
15:10 20 On the edge with access control devices Vincenzo Ciancaglini, Joey Costoya, et al
15:30 35 The Care and Feeding of Meerkats Sascha Steinbiss and Andreas Herz
16:05 20 Break  
16:25 35 Rise of the Cyber Jedi – Building a security community of practice Gustav Lundsgård
17:00 35 “If Only They Would Take Us Seriously” : The Behavioral Science Influencing Your Cybersecurity Culture Christina Lekati
17:35 05 Closing Day 1  
17:40      

Conference day 2

Date: 2021-06-22

Time Length Title Authors
13:00 5 Opening  
13:05 35 BSidesMunich Keynote  
13:40 20 No Distribute Scanners: A Perfect Testing Ground for Malware Developers Florian Murschetz and Mathieu Gaucheler
14:00 35 AI in a Minefield: Learning from Poisoned Data Itsik Mantin
14:35 20 Break  
14:55 35 CrimeOps of the KashmirBlack Botnet Sarit Yerushalmi and Ofir Shaty
15:30 35 Modern Adversary Tradecraft Sajal Thomas
16:05 20 Break  
16:25 35 Padding Oracle Attacks - The critical bug in your home-brewed crypto protocol Henning Kopp
17:00 35 How to build better more secure KVM with off-the shelf hardware. Tim Panton
17:35 20 Log Management Keeps Your Network Secure – Real-World Examples Jeff Darrington
17:55 5 Closing  
18:00