InfoSecSouthWest 2015 April 10, 2015 to April 12, 2015, Texas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Too Much for Anyone to Know (or) How to survive during war, "cyber-mayhem," and the game of spy versus spy. Richard Thieme We built it and now we have to live with it. That is a non-trivial ...
Everything They Don't Tell You: When Hackers Talk to the Press Violet Blue Why reporting on security is a mess How this mess directly affects hackers Examples of ...
Bugged Files: Is Your Document Telling On You? Daniel Crowley , Damon Smith , Isec Partners Certain file formats, like Microsoft Word and PDF, are known to have features that allow ...
Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For Joshua Danielson , Axway Applying security standards consistently across environments has typically been a struggle for security practitioners. Maintaining ...
Honeypots for Active Defense Greg Foss , Logrhythm Labs InfoSec analysts are all somewhat familiar with honeypots. When they are given the proper attention, ...
Clear Text Credentials Everywhere Rob "mubix" Fuller As Pentesters and Red Teamers we've all grown to love Mimikatz and WCE as methods ...
Let's Talk About SOAP, Baby. Let's Talk About UPnP Ricky "headlesszeke" Lawshae Whether we want it to be or not, the Internet of Things is upon us. ...
Striker Pierce Investigations and Executive Solutions Brian O'shea Social Hacking and Corporate Espionage Understanding the way corporate spies operate is essential in attempting ...
Writing Metasploit Modules (For Fun and Profit) Brandon Perry Writing Metasploit Modules (for fun and profit) will focus on turning web application vulnerabilities into ...
High Performance Fuzzing Richard Johnson Security conference talks related to fuzzing tend to focus on distributed frameworks or new proof-of-concept ...
Bit9 + Carbon Black Mike Sconzo I am packer and so can you Packer and toolchain detection can be a tricky ...
0x00labs Sam "0x00string" Shapiro Hacking Things In 2015, Part 1: Reverse Engineering the KanKun Smartplug - It's 2015 and ...