The G DATA Software AG offers an evening program, accompanying the "Offensive Security Course" at the Ruhr University of Bochum.
Every participant is welcome to meet the speakers and the organizing crew in the G DATA Academy. Excellent food and drink invite everybody to exchange thoughts and ideas in a comfortable atmosphere.
Whoever is seeking for the opportunity to get in touch with the external speakers or wants to speak at ease and talk shop with team members of G DATA's technical departments is just in the right place.
Location: G DATA Academy
Time: Starting at 6 p.m.
The following events are planned for the summer term 2014:
- 16.04.2014 - Mike West
- 30.04.2014 - Felix Gröbert
- 21.05.2014 - Mathias Bynens
- 18.06.2014 - Mathias Karlsson
- 02.07.2014 - Steven Van Acker
(no responsibility can be taken for this information)
Please contact Karsten Tellmann for further information regarding G DATA and the "Offensive Security Course".
|Mathias Bynens||Hacking with Unicode||Watch Video|
|Felix Gröbert||Security Analysis of Apple FileVault2||Watch Video|
|Mike West||User Agent Lockdown||Watch Video|
|Stefan Esser||iOS 7 Security Overview||Watch Video|
|Miroslav Stampar||Curious Case of SQLi||Watch Video|
|Fabian Yamaguchi||Information Retrieval and Machine Learning for Interactive Bug Hunting||Watch Video|
|Andreas Kurtz||Pentesting IOs Apps - Runtime Analysis and Manipulation||Watch Video|
|Karsten Nohl||In-depth crypto attacks - It always takes two bugs||Watch Video|
|Giorgio Maone||Defending the Indefensible - The Unsung Battles & Legacy of NoScript||Watch Video|
|Jeremiah Grossman||The real state of website security and the truth about accountability and "Best-Practices."||Watch Video|
|Matthias Kaiser||Recent Java Exploitation Techniques||Watch Video|
|Jürgen Pabel||Information Security Management||Watch Video|
|Felix Lindner||Security is Privacy||Watch Video|
|Svetlana Gaivoronski||Shellcode detection techniques||Watch Video|
|Arthur Gerkis||Dynamic PHP web-appliaktion analysis||Watch Video|
|Roberto Suggi Liverani||Cross Context Scripting (XCS) - Attacks and Exploitation||Watch Video|
|Soroush Dalili||File Uploaders Vulnerabilities - Fire in the hole!||Watch Video|
|Michel Aubizziere||Fuzzing scale and in style||Watch Video|
|Jonas Magazinius||Crossing Origins by Crossing Formats||Watch Video|
|Ange Albertini||A challenge in your pocket, an introduction to brainteasers||Watch Video|
|Sandro Gauci||Webapp Exploit Payloads - tools built for & during the job||Watch Video|
|Alexey Sintsov||Lotus Domino: Penetration Through the Controller||Watch Video|
|Vladimir Vorontsov||Blind XXE injections||Watch Video|
|Michele Orru||Beef, what a tasty piece of meat||Watch Video|
|Paul Stone||Browser Timing Attacks via the Graphics Stack||Watch Video|
|Nicolas Gregoire||Attacking xml processing||Watch Video|