BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//talks.toorcon.net//toorcon21//talk//PEMWVR
BEGIN:VTIMEZONE
TZID:PST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T100000Z
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T110000Z
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-toorcon21-PEMWVR@talks.toorcon.net
DTSTART;TZID=PST:20191108T174000
DTEND;TZID=PST:20191108T175000
DESCRIPTION:We present the results of our government-funded R&D to develop 
 an intelligent automated **vulnerability assessor and penetration tester
  (VAPT)**\, usable as a virtual appliance for use on enterprise networks o
 r cyber ranges\, and as a portable device for use on embedded systems. It 
 consists of two parts\, an* AI-supported vulnerability assessor* and an *A
 I-supported penetration tester*. In one use case it intelligently automate
 s software vulnerability assessment for embedded systems\; in another use 
 case\, it intelligently automates the tasks of an ethical hacker (penetrat
 ion tester) via the network\, finding systems on the network\, discovering
  vulnerabilities\, and exposing them.
DTSTAMP:20260314T224938Z
LOCATION:Blue Day
SUMMARY:AI HACKER! Automatic vulnerability assessment & pen-testing of embe
 dded & other systems - Ulrich Lang\, PhD
URL:https://talks.toorcon.net/toorcon21/talk/PEMWVR/
END:VEVENT
END:VCALENDAR
