GrrCon 2014 Oct. 16, 2014 to Oct. 17, 2014, grand rapids,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Finding Our Way – From Pwned to Strategy David Kennedy The attacks continue to move forward, the INFOSEC industry continues to struggle with how exactly ...
Lulz per Employee and Other Key Metrics J wolfgang Goerlich What does it take to successfully lead a team of miscreants, misfits, hackers, and troublemakers? ...
Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Oddities Arron 'finux' Finnon Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ...
Securing our Ethics: Ethics and Privacy in a Target-Rich Environment Kevin Johnson Security has become a huge conversation, especially when you consider privacy as part of it. ...
Hack the Hustle! Career Strategies For Information Security Professionals Eve Adams While information security is widely considered a negative-unemployment industry (it’s actually closer to 3%), most ...
Full Douchesclosure Duncan Manuts Anti-social code savants, profiteering technology companies, shadowy government agencies, and a few well-meaning idiots are ...
Look Observe Link (LOL) – How I learned to love OSINT Ninjasl0th In this presentation, I will provide an overview of some of my most used OSINT ...
$#!T My Industry Says. . . Kellman Meghu The Security Industry says allot of ‘stuff’ about allot of things, and most of the ...
Bigger Boys Made Us Mike Kemp Recently news reverberated about the technical attacks conducted by the NSA and GCHQ (amongst others). ...
Glass Homes – The Transparency of Home Automation Matt Burch , Alain Iamburg With the growth of mobile devices and availability network connectivity home automation devices and technologies ...
Email DLP: Simple concept, often poorly implemented C0rrup7_r3x Businesses and organizations have dozens of quality software choices that address email data loss prevention, ...
Security Hopscotch Chris Roberts As humans we move between the various electronic domains within our lives. We are familiar ...
Advanced Breaches of 2013 vs. Behavioral Detection Charles Herring Signature detection of attacks require an understanding of what is bad. Advanced attackers craft innovative ...
Seeing Purple: Hybrid Security Teams for the Enterprise Beltface The militaries of the world conduct wargames early and often in order to increase readiness ...
Breach Stains Matt Johnson It was a beautiful December day during a particularly calm Michigan winter. My boss called ...
Security On The Cheap Joel Cardella 110 million credit cards got sold to the card market not due to custom malware ...
LEVIATHAN: Command and Control Communications on Planet Earth Kevin Thompson This presentation draws a new map of Planet Earth, based not on traditional parameters, but ...
Proof That Windows Computer Forensics is Sexy! Kyle‘chaoticflaws’ Andrus Forensics is sexy! My goal is to prove this to you by demonstrating a few ...
The Security Implications of Software Defined Networks Shane Praay SDN technology offers an opportunity to dynamically control traffic, which is useful for service chaining ...
Security for the People: End-User Authentication Security on the Internet Mark Stanislav Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the ...
Emulate SandBox and VMs to avoid malware infections Jordi Vazquez The use of virtualization software is widely known by malware researchers. They need a controlled ...
CSO’s Myopis Jordan M. Bonagura The CSO Myopia: Imagine what it would be like to manage your company without your ...
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design Richard Enbody , Aditya K Sood Online Social Networks (OSNs) have revolutionized the internet and social interactions by giving birth to ...
Social Engineering Can Kill Me, But It Can’t Make Me Care Gavin Ewan Rumours of my demise have been greatly, well partly, exaggerated. We are losing the battle, ...
Advanced Threats and Lateral Movement Protection Terrance Davis We hear in the news on a daily basis that the next another corporation was ...
BioHacking: Becoming the Best Me I Can Be Leonard This is one man’s journey from being fat and exhausted to a fit healthy energetic ...
Autonomous Remote Hacking Drones Phil Polstra This talk will cover scripting for remote hacking drones. While the focus will be on ...
Picking Blackberries Thomas Richards Blackberry 10 is the most recent operating system released by Blackberry(formally RIM). This talk will ...
Hackers Are People Too Infosystir The world and popular culture mostly see hackers as criminals. We should all make it ...
Cryptographic backdoors Chuck Easttom An introduction to cryptographic backdoors. This will include coverage of the concept, as well as ...
ZitMo NoM David healwhans Schwartzberg A world without malware is ideal but unlikely. Many of us would prefer *not* to ...
Are you a janitor, or a cleaner? Matthew Hoy , John Stauffacherm In the wake of several major commercial breaches “DEFENDING” is the new hot topic. The ...
Infosec in the 21st century Tim Crothers Most organizations are using a security model developed in the 60′s and 70′s and expecting ...
Bringing PWNED To You: Interesting Honeypot Trends Elliot Brink Honeypots, how much do you know about them? Have you ever run one? I wanted ...
Beating the Infosec Learning Curve Without Burning Out Scott Thomas So you have made the decision to get into Infosec and you’re going to be ...
The Challenge of Natural Security Systems Rockie Brockway Static security models and “business as usual” directives have naturally resulted in a collective eyes ...
Red Teaming: Back and Forth, 5ever Fuzzynop Whether you are on the red team, the blue team, or aspiring to either, you ...
Application Pen Testing Chris Pfoutz We’re all familiar with network pen testing, and many organizations port those processes and vendors ...
Reducing Your Organization’s Social Engineering Attack Surface Jen Fox This case study is a journey through the presenter’s experience compromising a Fortune-50 company at ...
Vaccinating APK’s Milan Gabor Number of mobile applications is rising and Android still holds large market share. As these ...
Hacking Android Godfrey Nolan This session looks at a variety of techniques for reverse engineering Android APKs as well ...
Vulnerable By Design – The Backdoor That Came Through the Front Matthew ‘mandat0ry’ Bryant With the popular use of free software developed by inexperienced programmers, security vulnerabilities are becoming ...
Lessons from the front lines: Top focus areas for information security leaders Shogo Cottrell Content will revolve around 4 strategies to help reduce risk & exposure: Actionable threat intelligence ...
How to budget IDS’s Brian Heitzman IDS Systems are the bane of all IT budgets. They spit enough information out that ...
OAuth2.0 – It’s the Implementation Stupid!! Tony Miller Recent media attention around “Covert Redirects” has stirred new concerns over an already identified weakness ...
CryptoRush – Rising from the Ashes King Dragon So you thought you knew everything about the digital currency world? Think again. CryptoRush, a ...
Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data Todd Bursch Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, Perimeter and ...
Memory Forensics with Hyper-V Virtual Machines Wyatt Roersma With the increased demand for Memory Forensics, and more people using Windows Hyper-V as a ...