GrrCon 2016 Oct. 6, 2016 to Oct. 7, 2016, grand rapids,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Act Three, The Evolution of Privacy– Thursday Keynote Arron "finux" Finnon ZOMG not another god-damn privacy talk, i’m fed up of this. When will it ever ...
Friday Keynote John Stauffacher , Matthew Hoy TBA
GrrCON Presents, Celebrity Bumfight Cybergeddon Duncan Manuts , B3ltf4ce A GrrCON exclusive superstar panel discussion special event: Bend over, here it comes: CYBERWAR! Pew ...
Weaponizing Nanotechnology and hacking humans; defining the boundaries Chris Roberts The barrier between humans and computers has been pushed for many years, however we’ve now ...
…. and bad mistakes I’ve made a few….. Jayson E Street In an industry that does so much to uncover and expose the mistakes of others. ...
Tales from the Crypt…(analyst) Jeff Man As a certified Cryptanalyst for the National Security Agency, the speaker was classically trained in ...
Guarding Dinner J wolfgang Goerlich Modern food production relies upon a collaboration of information technology and operational technology. Break one ...
Ghosts in the IOT Ninjasl0th In this talk, I will discuss some security improvements in the realm of IOT as ...
Secure Dicks Mike Kemp Er… something…. something…. security… dick jokes
Welcome to The World of Yesterday, Tomorrow! Joel Cardella 30 years ago, the United States suffered a pivotal moment within our space program when ...
Back to the Future: Understanding our future but following the past Kevin Johnson From hacker history to bug bounties; from hacktivism to security research, hacker history is a ...
Abnormal Behavior Detection in Large Environments David Kennedy Attack patterns are something that when it occurs is extrinsic (not natural) behavior in a ...
No Title Given Atlas of D00m It is a time of relative peace in the Republic. Auto manufacturers have provided reliable ...
Binary Ninja Jared Demott Yes. It’s called Binary Ninja. I’m going to teach you all about it during this ...
Quick and Easy Windows Timelines with Pyhon, MySQL, and Shell Scripting Phil Polstra Creating a timeline is a standard part of many forensic investigations. Often this process is ...
So You’ve Inherited a Security Department, Now What… Infosystir Over the last decade, technology as a whole has exploded worldwide and corporations have struggled ...
Make STEHM Great Again David healwhans Schwartzberg Internet security threats continue to rise. Comparatively to the growing threats, there are too few ...
How to Implement Crypto Poorly Sean Cassidy Security experts often warn against rolling your own crypto, but do we listen? Of course ...
Money, Fame, Power – Build your success as a security professional Nathan Dragun A huge world of opportunity at your fingertips! But where to begin? What awaits? You’ve ...
What do you mean I’m pwn’d?! I turned on automatic updates! Scott Thoms , Jeff Baruth We’ve all heard the stories about data loss in the news. The cries of “patch ...
What’s in your Top Ten? Intelligent Application Security Prioritization Tony Miller Here’s something no one wants to admit: just because an application has been assessed doesn’t ...
Stop attacking your mother’s car! Charles Parker In generations past the vehicle was a mechanical beast. The extent of technology was in ...
Establishing a Quality Vulnerability Management Program without Wasting Time or Money Zee Abdelnabi Sell the story to establish your program to management. • Compare Vulnerability Management (VM) tools ...
Lie To Me – LIE TO THEM Justin Whitehead What does your face and body language really say about you when you are doing ...
Five Nights At Freddys: What We Can Learn About Security From Possessed Bears Nick Jacob The game is a simple, but brilliant one. The place is a wonderful place during ...
Breaking Android Apps for Fun and Profit Bill Sempf The massive growth of internet connected smart devices like phones and toasters is truly amazing, ...
Strolling Through Your Internet Museum Solcrusher Researching individuals and creating an actor profile can be tricky. This presentation will walk you ...
Becoming a Cyborg: The First Step Into Implantable Technology Michael Vieau This talk will look at the different types of implantable technology and the use cases ...
On being an Eeyore in Infosec Stefan Edwards or, how I learnt to hate everything, and love Winnie the Pooh. This talk will ...
Predator to Prey: Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin For several years I developed and utilized various technologies and methods to track criminals leading ...
Threat Detection & Response with Hipara J Brett Cunningham Hipara is an Open Source tool that leverages the power of the industry-standard Yara framework ...
Security Guards — LOL! Tim Roberts , Brent White During onsite “black box” penetration assessments, it is quite common that you will encounter a ...
Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years Matt Bromiley , Preston Lewis As early as 2009, one particular financial attack group has been successfully stealing payment card ...
Reversing and Exploiting Embedded Devices (Walking the software and hardware stack) Elvis Collado As technology matures and microprocessors are becoming cheap we are starting to see a trend ...
Surreal Paradigms: Automotive Culture Crash D0xt0r Z3r0 The parking lot I entered was full of cars with special patterns and packed as ...
So You Want to Be a Pentester Absolute0x0 Does the idea of getting paid to hack things sound like the best job ever? ...
Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey Vacationing on a cruise ship should be a relaxing, care-free endeavor that allows one to ...
Magnetic Stripes 101 Tyler Keeton This presentation will give the basics of how magnetic stripes are implemented, used, and read ...
Alignment of business and IT Security Shane Harsch Shane Harsch will discuss security operations as a business unit within a changing marketplace. This ...
Machine Duping: Pwning Deep Learning Systems Clarence Chio Deep learning and neural networks have gained incredible popularity in recent years. The technology has ...
Securing Trust – Defending Against Next-generation Attacks John Muirhead-gould New threats target the trust provided by keys and certificates, and allow bad guys to ...
Fighting the Enemy Within Matt Crowe Concerned about Stuxnet, Operation Aurora, and other similar advanced nation-state attack campaigns and looking for ...
Encryption, Mobility & Cloud Oh My! Bill Harmer How the Unholy Trinity have left us blind to attacks and what we can do ...
Pentester-to-customer:I will 0wn your network! * Customer-to-pentester:No, I will make you cry! David Fletcher , Sally Vandeven This talk will take a red team / blue team approach to how defenders can ...
Phish your employees for fun! Kristoffer Marshall 2015 was the milestone year companies started realizing that IT security is no longer a ...
Internet of Things (IoT) radio frequency (RF) Analysis With Software Defined Radio Kevin Bong This 50-minute crash-course offers attendees an introduction to Internet of Things (IoT) radio frequency (RF) ...
Contracting: Privacy Security and 3rd Party Nathan Steed , Kenneth Coleman More info Shortly
Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma One of the biggest problems many in this industry have is taking advantage of good ...
Security 3.0: The future of information security, from beginning to End-point Vinny Troia When it comes to information security, we’ve seen that prevention simply doesn’t work. Our future ...
Piercing the Air Gap: Network Steganography for Everyone John Ventura Steganographic communication systems subvert common expectations for how network based communication is supposed to work ...
Behind Bars Sean Wcisel Barcodes are ubiquitous to the point that they go virtually unnoticed in daily life, but ...
How Do You Secure What You Don’t Control Dimitri Vlachos N/A
Getting to the Root of Advanced Threats Before Impact Josh Fazio In today’s modern digital landscape, effectively protecting against advanced malware and zero-day attacks requires more ...