Converge 2016 July 14, 2016 to July 15, 2016, detroit,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote 1 Steve Werby Steve’s keynote will focus on achieving successful security outcomes using atypical-yet-practical technical techniques and embracing ...
So You've Inherited a Security Department, Now What… Amanda Berlin So many of us have been there. We've walked into an environment that has exploded ...
AppSec Awareness: A Blue Print for Security Culture Change Chris Romeo How does an individual change the application security culture of an organization? By designing and ...
Threat Modeling for Secure Software Design Robert Hurlbut Threat modeling is a way of thinking about what could go wrong and how to ...
MySQL 5.7 Security Dave Stokes MySQL 5.7 features several security enhancements including password rotation, third party authentication plug-ins, secure by ...
Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring , Bill Ritch Enterprise Security Operation Centers (SOC) receive thousands to millions of security events per day. These ...
Ebony & Ivory: Converge on Responsible Disclosure and IoT Zee Abdelnabi , Chad Childers You may have found a vulnerability or you may be responsible for security of a ...
Violating Trust: Social Engineering Past and Present Paul Blonsky Before the Internet, con men used social engineering to get what they wanted. The playing ...
Red Team Madness - Or, How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nielson Defensive blue team members are often seen as the "Walmart Greeters" of information security. Tiring ...
Establishing a Quality Vulnerability Management Program without Wasting Time or Money Zee Abdelnabi • Sell the story to establish your program to management. • Compare Vulnerability Management (VM) ...
Not Even One Shade of Gray: Stop Tolerating Compromise in Security Rich Boyer The state of today’s enterprise security practices varies wildly in terms of effectiveness in warding ...
Welcome to The World of Yesterday, Tomorrow! Joel Cardella 30 years ago, the United States suffered a pivotal moment within our space program when ...
Game of Hacks – Play, Hack, and Track Igor Matlin We created “Game of Hacks”– a viral web app marketed as a tool to train ...
Red is the new Blue - Defensive Tips & Tricks from a Defender turned Pentester Ben Ten After spending 13 years defending systems and organizations against attackers, I decided to switch roles ...
Food Fight J wolfgang Goerlich Modern food production relies upon a collaboration of information technology and operational technology. Break one ...
Maneuvering Management Madness Andrew Hay Why do practitioners have such a hard time convincing their management team about the value ...
SCADA/EMS and the Electric Grid Chris Robb The impact of SCADA, EMS and Electric Grid failure. Repercussions: economic and other. Is it ...
Surreal Paradigms: Automotive Culture Crash Dave Schaefer The parking lot I entered was full of cars with special patterns and packed as ...
Haking the Next Generation David healwhans Schwartzberg Kids are wired to learn. They are learning while they are playing so why not ...
Still broken after all these years aka Utility Security for Smarties Doug Nibbelink Maybe you've never stepped foot in a power plant before. Perhaps you've read about Stuxnet ...
Building a better user: Developing a security-fluent society Rich Cassara The quality of your security always boils down to the people in your organization. An ...
Enterprise Class Threat Management Like A Boss Rockie Brockway Attribution is hard. And in most business cases unnecessary. Threat Management, like Vulnerability Management, is ...
Sentry on the Wall Reid Brosko We all see and hear about breaches left and right from various companies and organizations. ...
Expanding Your Toolbox the DIY Way Chris Maddalena This presentation will walk through these tools and how they can help you. However, the ...
Malware Magnets: A practical walkthrough in developing threat intelligence Tazz Tazz Talos has access to multiple terabytes of data, and one of the things we do ...