BsidesLasVegas 2014 Aug. 5, 2014 to Aug. 6, 2014, las vegas,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Wireless Essentials Dragorn , Dakahuna , Rick Mellendick , Zero Chaos , Russell Handorf This class will cover the essentials of using Pentoo, current and emerging 802.11 wireless threats, ...
Building Skills, Understanding and Influencing People I Cavalry The directed sessions will use a facilitated Question and Answer format called A&Q. In this ...
Attacking Drupal Greg Foss Drupal is a very popular content management system that has been widely adopted by government ...
Vaccinating Android Milan Gabor , Danijel Grah Number of mobile applications is rising and Android still holds large market share. As these ...
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY Sergey Bratus , Ira Ray Jenkins Producing IEEE 802.15.4 PHY-frames reliably accepted by some digital radio receivers, but rejected by others---depending ...
Energy-efficient bcrypt cracking Katja Malvoni N/A
Password Generators & Extended Character Set Passwords William Gray , Stephen Lombardo N/A
Ripped from the Headlines What the news tells us about Information Security Incidents Kevin Thompson , Suzanne Widup Take a scientific look at information security incidents reported in the public news sources. This ...
RFID Hacking Joshua Perrymon , Sean Satterlee Learn the basics of RFID hacking, in this workshop you will be guided through building ...
Hackers vs Auditors Dan Anderson A view into what hackers are about and what auditors are about, comparison and contrasting.
Insider Threat Kill Chain: Human Indicators of Compromise Ken Westin Your organization’s greatest assets are also its greatest threat: People. Your greatest risk are those ...
Security testing for Smart Metering Infrastructure Robert Hawk , Steve Vandenberg In July 2010, BC Hydro, the electric utility and grid operator of British Columbia began ...
Fuck These Guys: Practical Countersurveillance Lisa Lorenzin We've all seen the steady stream of revelations about the NSA's unconstitutional, illegal mass surveillance. ...
The problem with the real world Michal Špaček N/A
Encryption and Authentication: Passwords for all reasons Jeffrey Goldberg N/A
Third-Party Service Provider Diligence: Why are we doing it all wrong? Patrice Coles The demands of Third Party Service Provider vendor due diligence and compliance management are growing ...
A Place to Hang Our Hats: Security Community and Culture Domenic Rizzolo Contrary to popular belief and media depictions, hacking is a social endeavor. By examining the ...
Pwning the hapless or How to Make Your Security Program Not Suck Casey Dunham , Emily Pience Pwning the hapless or How to Make Your Security Program Not Suck Customer data is ...
Password Topology Histogram Wear-Leveling, a.k.a. PathWell Rick Redman N/A
Enhancing Password Based Key Derivation Techniques Stephen Lombardo , Nick Parker N/A
The Savage Curtain Tushar Dalvi , Tony Trummer Mobile, the Final Frontier. These are the voyages of two researchers. Their 45 minute mission: ...
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014 Zach Lanier , David Mortman , Joshua Corman , David Kennedy , Jay Radcliffe Our four intrepid debaters will tackle the most pressing issues facing the security community today, ...
Ask the EFF Kurt Opsahl , Eva Galperin , Yan Zhu , Mark Jaycox , Nate Cardozo Once again, the Electronic Frontier Foundation returns to the Underground to answer your toughest Off-the-Record ...
Teach a man to Phish... Vinny Lariza "When the world ends, the only things that will be left on earth will be ...
The Lore shows the Way Eric Rand Mistakes have been made, and mistakes will be made again. Those unfamiliar with the history ...
Beam Me Up Scotty! – Passwords in the Enterprise Dimitri Fousekis N/A
Capturing Passwords into the Secure Desktop Bruno Oliveira , Marcio Almeida Macedo N/A
We Hacked the Gibson! Now what? Philip Young IBM has been touting the security of the mainframe for over 30 years. So much ...
Pwning the Pawns with WiHawk Anamika Singh , Santhosh Kumar ***THIS TALK IS VIA VIDEO CONFERENCE THE US CONSULATE IN CHENNAI COULDN'T PROCESS THEIR VISAS ...
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State Richard Thieme Over a decade ago, a friend at the National Security Agency told Richard Thieme that ...