Digital Overdose
Conference

(aka. D_OVER CON)

Schedule

Day 1

10:05(CEST)
10:20(CEST)
Conference kick-off
The hosts welcome you to the conference and start the festivities.
10:25(CEST)10:25(Local)
10:55(CEST)10:55(Local)
Juan Giarrizzo
A rookie journey into OSINT: How to get started (on a budget)
11:00(CEST)11:00(Local)
11:30(CEST)11:30(Local)
Abigail Simmons
Honey, I shrunk the disks! - A beginner's guide to data recovery
11:35(CEST)11:35(Local)
12:05(CEST)12:05(Local)
3t3rn4l P4r4d0x
Capabilities: That one vulnerability vector you don't realize exists
12:10(CEST)12:10(Local)
12:40(CEST)12:40(Local)
Patrick Rus
Cyber-Investigation/OSINT of Phishing Emails
 
Break
14:00(CEST)14:00(Local)
14:30(CEST)14:30(Local)
Chloe Seaton
What it takes to be an Ethical Hacker - A journey into a technical role
14:35(CEST)14:35(Local)
15:05(CEST)15:05(Local)
Nasreddine Bencherchali
Common Tools & Techniques Used By Threat Actors and Malware
15:10(CEST)15:10(Local)
15:40(CEST)15:40(Local)
Luna Belfort
A.I. - The Inevitable Threat w/ Alvaro Leno
Alvaro Leno
A.I. - The Inevitable Threat w/ Luna Belfort
15:45(CEST)15:45(Local)
16:15(CEST)16:15(Local)
Deeksha Shekar
Introduction to Social Engineering
16:20(CEST)16:20(Local)
16:50(CEST)16:50(Local)
BosintBlanc
Systematic OSINT and the OSINTFUNdamentals
16:55(CEST)16:55(Local)
17:25(CEST)17:25(Local)
Sam Ferguson
All Your Modules Are Belong To Us - An Introduction to Python Module Hijacking
17:30(CEST)17:30(Local)
18:05(CEST)18:05(Local)
Drew Jones
Preparing for the Offensive Security Certified Professional (OSCP) Without Any PenTesting Experience
18:10(CEST)18:10(Local)
18:40(CEST)18:40(Local)
Suryansh M.
Application Logic Vulnerabilities and My Journey
18:45(CEST)
19:00(CEST)
Conference Day 1 Sendoff

Day 2

10:05(CEST)
10:15(CEST)
Conference Day 2 Kick-off
10:20(CEST)10:20(Local)
10:50(CEST)10:50(Local)
Becca I.
BizOps in motion
10:55(CEST)10:55(Local)
11:25(CEST)11:25(Local)
Michael McGinley
Parting ways with Purdue? - The Effect of Industry 4.0 on Industrial Control Systems Security Architectures
11:30(CEST)11:30(Local)
12:00(CEST)12:00(Local)
Josephine Windsor-Lewis
Smart phone to medical device in five (not so) easy steps
12:05(CEST)12:05(Local)
12:35(CEST)12:35(Local)
White Hat Inspector
Skype: A hidden OSINT goldmine
12:40(CEST)12:40(Local)
13:10(CEST)13:10(Local)
Anastasiia Mytrofanovska
IPv6. Does size matter?
 
Break
14:35(CEST)14:35(Local)
15:05(CEST)15:05(Local)
Tehreem Fahim
Building an effective Red Team
15:10(CEST)15:10(Local)
15:40(CEST)15:40(Local)
Alex Hoffman
0-Days & Nat 20's - CVSSv3 Through the Lens of Dungeons & Dragons
15:45(CEST)15:45(Local)
16:15(CEST)16:15(Local)
Elizabeth Momola, Vivian Band, Juan Spinel
"Moving forward in cybersecurity", a panel by ex-rookies, hosted by James Bore.
16:20(CEST)16:20(Local)
16:50(CEST)16:50(Local)
Luke Pajor
What to do About Motivated Intruders
16:55(CEST)16:55(Local)
17:25(CEST)17:25(Local)
Sarthak Taneja
The Zero Trust Model
17:30(CEST)17:30(Local)
18:00(CEST)18:00(Local)
Argandov
Making sense of data with Linux
18:05(CEST)
18:20(CEST)
Conference Closing Comments
18:30(CEST)
20:30(CEST)
Afterparty stream w/ Dan Conn