rvasec 2014 June 4, 2014 to June 6, 2014, Richmond,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
RVAsec 2014 Keynote David Kennedy , Gene Fishel N/A
Introducing Intelligence into Malware Analysis Brian Baskin Malware analysis is the current en vogue topic for computer security companies and careers. However, ...
The Pyramid of Pain: Intel-Driven Detection & Response to Increase Your Adversary’s Cost of Operations David J. Bianco There’s more to good threat intelligence than lists of domains or IPs, and it’s useful ...
Terminal Cornucopia: Demystifying the Mullet Evan "treefort" Booth Growing up, it was a safe bet that if an object around the house was ...
Third Party Risk Management and Cybersecurity Jonathan Dambrot Several recent research reports have identified that close to 80% of data breaches are caused ...
Cyber Insurance – Worth the Effort or Total Ripoff? Inga Goddijn Have you ever found yourself paying premiums for years, just to be shortchanged by the ...
CVSS v3 – This One Goes to 11 Seth Hanford Software vulnerabilities — love em or hate em, they’re crucial to your job. Likewise, you ...
Five Secrets to Building an Amazing Security Culture in Your Organization Pete Herzog If only everyone thought about security the way we think about security. But they don’t. ...
Pissing Down The Leg Of Much Of Our Careers; Why Are You People Still Buying Firewalls & IPS? Elizabeth Martin , Dan Holden Do you recall the good ole days when you would often issue the command ‘more ...
Man In The Front – Modifying the Android OS for Mobile Application Testing Ray Kelly Most penetration testers know the headaches of testing mobile applications. Challenges like certificate pinning and ...
How To Find Mobile Internet Love Jack Mannino , Abdullah Munawar As mobile dating applications grow in popularity, so does our interest in the security posture ...
Attacker Ghost Stories: Mostly Free Defenses That Gives Attackers Nightmares Mubix This talk was originally titled “I’m tired of defenders crying”, but thought better of it. ...
Leading Security When the Rest of The Business Doesn’t Care About Security Kimberley Sullo In many organizations, security teams are viewed as a “necessary evil” or a cumbersome speed ...
Offensive Mobile Forensics Joey Peloquin It’s official; enterprise mobility has been redefined, and Bring Your Own Device is a permanent ...
I Found a Thing and You Can Too: ISP’s Unauthenticated SOAP Service = Find (almost) All the Things! Nick Popovich This presentation is meant to encourage individuals to put the applications and software that they ...
Real World Intrusion Response – Lessons from the Trenches David Sharpe , Katherine Trame Two battle-scarred, sleep-deprived GE-CIRT incident responders share lessons learned from the trenches, from their daily ...
The hacker in the fun house mirror (A talk on skewed perspectives) Jayson E. Street This is a talk on perspectives. Hackers, and hacking, are perceived differently around the world ...
How to Achieve Success with Cyber Risk Assessment and Analysis Ben Tomhave Technical professionals are frequently asked to lead or participate in risk assessments or risk analysis, ...
How to Make a Lock Schuyler Towne Locks were one of the earliest complex mechanical devices. They are ubiquitous, yet remain very ...