SourceBoston 2014 April 8, 2014 to April 10, 2014, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How to Implement New Security Features and Fix Broken Stuff with Feature Flags and A/B Tests Kenneth Lee Defenders always run into a wall when it comes to rolling out security features or ...
Setup for Failure: Defeating SecureBoot Corey Kallenberg , John Butterworth , Sam Cornwell In our previous "Defeating Signed BIOS Enforcement" talk, we discussed how some vendors' BIOS protections ...
Diablo Security: What Can Infosec Learn from Video Games? Dwayne Melançon Adventure games make it easy for us to understand how our skills, weapons, and countermeasures ...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell Developers want to write code and security testers want to break it. The problem is ...
Measuring Security Outcomes: From Data to Insight for Third Party Risk Management Stephen Boyer Organizations struggle with how to measure and manage the risks introduced through third-party relationships. In ...
Top 50 Hacker Groups of the World Christopher Ahlberg The future of warfare is information warfare, in fact in modern war the power of ...
Meta Cognition and Critical Thinking in Open Source Intelligence (OSINT) Benjamin Brown When gathering open source data and transforming it into actionable intelligence, it is critical to ...
Offensive Defense through Attacker Mimicry Stephan Chenette Defending against attackers relies on the fact that you understand their techniques, tools and procedures. ...
Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Allison Miller Virtual currencies. Are they a way to move money, or make money? In this session ...
iOS App Reversing; a Practical Approach Patrick Wardle Does your favorite iOS app compromise your security or privacy? Seemingly every week, a new ...
Mackerel: A Progressive School of Cryptographic Thought Justin Troutman Mackerel is a cryptographic app design and development framework based on the premise that real-world ...
Risk, Audit, and Compliance for Hackers & Defenders John Nye Your work is where the security rubber meets the road - vulnerabilities and exploits, input ...
Case study: how to build an application security metrics program Jared Pfost We'll share a case study constructing and piloting a metrics program for secure software development ...
Trapping Hacks With Ensnare Scott Behrens , Andy Hoernecke Several methods exist for protecting applications from attackers outside of secure coding practices. Most of ...
Hacking The US Trademark System: A Cautionary Tale Paul Asadoorian While many have enjoyed listening to our podcasts for the past 8 years, what you ...
Security Testing WITHOUT an Army of Ninjas Andrea Doherty How do you do security testing if you don't have an army of ninjas? Hire ...
Ripped from the Headlines: What the news tells us about Information Security Incidents Kevin Thompson , Suzanne Widup Take a scientific look at information security incidents reported in public news sources. This talk ...
Delivering Security at Big Data Scale Davi Ottenheimer We are meant to measure and manage data with more precision than ever before using ...
Speed Networking Rob Cheyne , Bob Rudis The SOURCE conference attracts some amazing people. How would you like to meet them? Come ...
Hiring/Recruitment Workshop Hosted By Mark Knowlton, Sr. Technical Recruiter, Akamai Mark Cucinelli Jen Ellis, Director of Global Communications, Rapid7 Do you find it challenging to figure out ...
Reality Checking Your Security Testing Program Darren P Meyer Your Application Security Testing Program was probably built for compliance; and around tools, processes, and ...
Information-sharing tools, taxonomies, and trust: Babel or better? Douglas Wilson , Trey Darley , John Wunder , Stephen Brannon There has been a fury of activity over the past year around defining information-sharing protocols. ...
The Privileged User Discussion: Security Enforcer or Threat? Michael Crouse At the core of the privileged user problem is this dichotomy: With greater access to ...
URL Scheme Security on iOS Guillaume K. Ross Have you ever clicked a phone number in Safari to get the phone app to ...
How to Save the Environment, or Why Nobody Takes Your Security Advice Daniel Crowley Some security advice is bad, not because it doesn't fix the problem it's aimed at ...
Aligning Threats and Allies through Stories Steven f. Fox , J wolfgang Goerlich Successful defense occurs when the interests of a security team's stakeholders intersect with the attackers ...
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer In this talk, we review common classes of iOS mobile application flaws as seen in ...
Too Many Fallen: #SecBurnOut Pt3 "Prevention & Introspection" Madeline Wallach Enough. Over the last few years, too many of our own have fallen. Len, Aaron, ...
5,500 hackers + Your code = ??? Casey Ellis There's an asymmetry in the way we approach security today... The threat takes the form ...
Marauder or Scanning your DNSDB for Fun and Profit Dhia Mahjoub Passive DNS (DNSDB) is nowadays a fundamental investigative tool that helps security researchers, malware analysts, ...
The Cavalry Isn't Coming; It Falls To Us: How you can help! Joshua Corman , Beau Woods , Jen Ellis What should be clear after Andrea's keynote is: The time is now for us to ...
Painting a company red and blue Ian Amit Getting real and cutting the FUD out of red team. This talk will enable the ...
IT Security Risk Assessment:Measuring What Matters Reed Augliere Classical IT risk assessment typically requires measuring everything from application threats and vulnerabilities to the ...
The Internet of Things: We've Got to Chat Zach Lanier , Mark Stanislav Similar to the explosive growth of cloud computing, the "Internet of Things" (IoT) has reached ...
Applied Security Metrics: Building the Financial Services Threat Report Andrew Jaquith Every six months, SilverSky releases its Financial Services Threat report, an in-depth analysis of likely ...
Keynote Justine Aitel , Bruce Schneier N/A