Hacker Summer Camp 2016 is almost upon us! There are a lot of really interesting talks this year, not to mention the I Am The Cavalry track at BSides Las Vegas. Since we can’t hit all of the talks, we’ve narrowed down some that look like they’re highly related to our mission. We might see you there!

BSides Las Vegas: August 2-3, 2016

[table]Date, Time, Who, Title

8/2,11:00,Leonard Bailey and Jen Ellis,Shall We Play a Game? 30 Years of the CFAA
8/2,14:00,Chad Dewey,Hacking the High Seas
8/2,14:00,”Jens Devloo, Vito Rallo, and Jean-Georges Valle”,How to Securely Build Your Own IoT-Enabling Embedded Systems: from Design to Execution And Assessment (4h training)
8/2,14:30,Wendy Knox Everette,”Security Vulnerabilities, the Current State of Consumer Protection Law, and How IoT Might Change It”
8/3,8:30,Arnaud Soullie,Pentesting ICS: Capture the Flag! (3h training)
8/3,15:00,Philippe Lin,PLC for Home Automation and How It Is as Hackable as A Honeypot

[/table]

Black Hat Las Vegas: August 3-4, 2016

[table]Date, Time, Who, Title

8/3,13:50,Arnaud Lebrun and Jonathan-Christofer Demany,CANSPY: A Platform for Auditing CAN Devices,
8/3,13:50,Jeff Melrose,Drone Attacks on Industrial Wireless: A New Front in Cyber Security,
8/3,13:50,Slawomir Jasek,GATTacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool,
8/3,15:30,Paul Sabanal,Into The Core – In-Depth Exploration of Windows 10 IoT Core,
8/3,16:20,Michael Ossman,GreatFET: Making GoodFET Great Again,
8/3,17:30,Lei Ji and Yunding Jian,The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack,
8/4,9:00,Chris Sistrunk and Josh Triplett,What’s the DFIRence for ICS?
8/4,9:00,Colin O’Flynn,A Lightbulb Worm?
8/4,9:45,Jason Healey,Defense At Hyperscale: Technologies And Policies For A Defensible Cyberspace

8/4,9:45,Anirudh Duggal,”Abusing HL7 2.x Standards – Attacking Medical Devices, Hospitals and More”
8/4,9:45,Charlie Miller and Chris Valasek,Advanced CAN Injection Techniques for Vehicle Networks
8/4,11:00,Joe FitzPatrick,”The Tao of Hardware, the Te of Implants”
8/4,14:30,”Hendrik Schwartke, Maik Bruggemann, and Ralf Spennenberg”,PLC-Blaster: A Worm Living Solely in the PLC
8/4,17:00,Lynn Terwoerds,Building Trust & Enabling Innovation for Voice Enabled IoT

[/table]

DEF CON XXIV: August 5-7, 2016

[table]Date, Time, Who, Title

8/5,12:00,Javier Vazquez Vidal and Ferdinand Noelscher,CAN I haz car secret plz?
8/5,12:30,Six_Volts and Haystack,Cheap Tools for Hacking Heavy Trucks
8/5,13:00,Matteo Beccaro and Matteo Collura,(Ab)using Smart Cities: The Dark Age of Modern Mobility
8/5,15:00,Sebastian Westerhold,How to Remote Control An Airliner: Security Flaws in Avionics
8/6,10:00,Zack Fasel and Erin Jacobs,”I Fight For The Users, Episode I – Attacks Against Top Consumer Products”
8/6,11:00,Lucas Lundgren and Neal Hindocha,Light-Weight Protocol! Serious Equipment! Critical Implications!
8/6,11:00,Anthony Ross and Ben Ramsey,Picking Bluetooth Low Energy Locks from a Quarter Mile Away
8/6,12:00,Arnaud Lebrun and Jonathan-Christofer Demany,CANSPY: A Framework for Auditing CAN Devices
8/6,12:00,Brad Dixon,pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle
8/6,14:00,Brian Gorenc and Fritz Sands,Hacker-Machine Interface – State of the Union for SCADA HMI Vulnerabilities
8/7,13:00,”Jianhao Liu, Wenyuan Xu, and Chen Yan”,Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle

[/table]