Showmecon 2014 May 5, 2014 to May 6, 2014, Saint louis,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
HACKING HOLLYWOOD Ralph Echemendia Have you seen a movie online before it’s theatrical release? As Hollywood increasingly incorporates multiple ...
GIVE ME YOUR DATA Dave Chronister We hear new stories daily about a malicious hacker compromising the sensitive data of corporations, ...
TERMINAL CORNUCOPIA: DEMYSTIFYING THE MULLET Evan "treefort" Booth When solving difficult problems that require unorthodox thinking, it’s crucial that you remember APATHY: Acronyms ...
THINKING OUTSIDE THE (SAND)BOX Kyle Adams Incorporating sandboxing and heuristic-based malware detection to security solutions is the new black. Unfortunately, malware ...
POWER-UPS AND PRINCESSES: WHAT VIDEO GAMES TAUGHT ME ABOUT BUILDING A SECURITY AWARENESS PROGRAM. Aamir Lakhani Everything I learned about building a security awareness program I learned from playing video games. ...
PROTECTING THE SEAMS:MILITARY DOCTRINE APPLIED TO APPLICATION AND NETWORK SECURITY Paul Vencill “Never open the door to a lesser evil, for other and greater ones invariably slink ...
POWERSHELL AND YOU: USING MICROSOFT’S POST-EXPLOITATION LANGUAGE Chris Campbell Anyone can write useful security tools in PowerShell. With just a little bit of knowledge ...
START WITH THE BPT THEN WORRY ABOUT THE APT! Kevin Cardwell According to the Verizon data breech report, most of the attacks in the news were ...
DROPPING DOCS ON DARKNETS: HOW PEOPLE GOT CAUGHT Adrian Crenshaw Most of you have probably used Tor before, but I2P may be unfamiliar. Both are ...
COGNITIVE INJECTION Andy Ellis It’s a trope among security professionals that other humans – mere mundanes – don’t ‘get’ ...
INSIDE THE WORLD’S MOST DANGEROUS SEARCH ENGINE John Matherly Shodan has been around for a few years and is widely used across the security ...
HACKING TO GET CAUGHT: A CONCEPT FOR ADVERSARY REPLICATION AND PENETRATION TESTING Raphael Mudge It’s 2014 and most of us accept that there are well resourced actors who are ...
PHYSICAL (IN)SECURITY – IT’S NOT ALL ABOUT CYBER Inbar Raz Today’s threat landscape is all about Cyber. We have cyber threats, cyber security, cyber warfare, ...
AROUND THE WORLD IN 80 CONS Jayson E Street This is a talk on perspectives. Hackers, and hacking, are perceived differently around the world ...
BENDING AND TWISTING NETWORKS Paul Coggin Learn about network attack vectors that an adversary can use to control, and influence network ...
TBA Erick Rudiak N/A
HERE, LET ME HOLD THAT FOR YOU. CONSUMER METADATA AND ITS DANGERS Robert Reed Forensics examiners have long known the value of metadata. Metadata can be used for a ...