Opening Note

  • Ingrid van Engelshoven

    Ingrid van Engelshoven

    Deputy Mayor - The Hague


  • Harald Welte

    Harald Welte

    Co-Founder Sysmocom GmbH
  • Jon Callas

    Jon Callas

    Co-Founder / CTO Silent Circle and Blackphone

CXO Speakers

  • Beau Woods

    Beau Woods

    Infosec Veteran
  • Christopher King

    Christopher King

    Vulnerability Analyst - CERT/CC
  • Jasper van Woundenberg

    Jasper Woudenberg

    CTO for Riscure North America
  • Jaya Baloo

    Jaya Baloo

    CISO - KPN

Workshop Speakers

  • Lukasz Chmielewski & Rajesh Velegalati

    Lukasz Chmielewski & Rajesh Velegalati

    Hands-on introduction to Side Channel Analysis (SCA)
  • Vito Rallo

    Vito Rallo

    Kernel Tales - Testing security of Kernels for Embedded devices by fuzzing drivers


  • Christian Kison & Gunnar Alendal

    Christian Kison & Gunnar Alendal

    got HW crypto? On the (in)security of a Self-Encrypting Drive series
  • Florian Grunow

    Florian Grunow

    Security of Medical Devices
  • Joseph FitzPatrick & Jeremy Richards

    Joseph FitzPatrick & Jeremy Richards

    Hardware Hacking with the Beaglebone (Bl|H)ack
  • Marcus Janke & Dr. Peter Laackmann

    Marcus Janke & Dr. Peter Laackmann

    Advanced Attack Methodologies against Security Microcontrollers
  • Veysel Özer

    Veysel Özer

    1 guy looking at iLo 2 and 3 for 4 days and finding more than 5 bugs
  • Lucian Cojocar & Herbert Bos

    Lucian Cojocar & Herbert Bos

    From off-the-shelf embedded devices to research platforms. Two case studies: a PLC and a SSD
  • Michael Leibowitz

    Michael Leibowitz

    NSA Playset: Bridging the Airgap without Radios
  • Olivier Thomas

    Olivier Thomas

    Advanced IC Reverse Engineering Techniques : In Depth Analysis of A Modern Smart Card
  • Ömer Yüksel

    Ömer Yüksel

    Semantics-aware Intrusion Detection for Industrial Control Systems
  • Stefan Kiese

    Stefan Kiese

    Living in a fool's wireless-secured paradise
  • Raphael RIGO and Joffrey CZARNY

    Raphael RIGO and Joffrey CZARNY

    Attacking hardware for software reversers: Analysis of an encrypted HDD
  • Sofiane Talmat

    Sofiane Talmat

    Hacking Satellite TV receivers : Are those IoT devices secure ?