BSidesAsheville 2016 July 22, 2016 to July 23, 2016, asheville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Layer 2 Network Protocols Exploitation Paul Coggin This talk will focus on how to exploit a network by targeting the various first ...
Mysterious World of Polyglots Josh Sheppard Have you ever wondered how to reach a piece on unexploited code that you cant ...
You are Being Manipulated James Powell You are being manipulated. There is constant pressure coming from companies, people, and attackers. Millions ...
Agilely Compliant Yet Insecure Tom Ruff Titled "Agilely Compliant yet Insecure", the focus is entirely on how Agile development is/can be ...
The Hacker Evolution: What have we become? Jason Gillam Do you know the difference between a hacker and a security researcher? How is the ...
Catch Me if You Can Michael Bryant Skilled penetration testers and malicious actors are utilizing similar techniques to compromise organizations. These techniques ...
Ad-Weary Jeff Bollinger Ransomware has been holding the security press for ransom with attention grabbing headlines and stories ...