saintcon 2016 Oct. 11, 2016 to Oct. 14, 2016, utah,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Conference Opener Troy Jessup Troy will open the conference and bring his own special introduction to what will be ...
Lae Rcfb Evyjw Ros Tcts Fiddxd Wqoiasfx! Crypt , Clutch Fvzcyl ernqvat vf abg rabhtu. Gurer orgjrra gur yvarf naq jvguva gur cvpgherf yhexf n ...
Effective Detection: Visibility through integrated threat defense Steve Caimi N/A
Comprehensive Security – A 360 Degree View of Your Security Program David Mahon Understanding that breaches will occur, security executives in the public sector must work with senior ...
Sorting the Mess Chris Czub Security has become a mess in the eyes of many. Expensive solutions have been around ...
Nine years into mobility, has security caught up Georgia Weidman In this talk, Shevirah Founder and CTO Georgia Weidman will discuss strategies for security and ...
DDOS and why you should care Kelly Genessy This presentation will be geared towards executives dealing with today's security concerns and issues.
Adaptive Trust and the Internet of Untrustworthy Things John Howard Network trust has changed. No longer can you simply trust a device just because it ...
Social Engineering: If You Can't Beat Them, Join Them Nathan Cooper Hey Alice, Your computer seems to be missing a critical system patch. I need you ...
Left of Owned: Becoming the Hunter Instead of the Hunted Neil Wyler In August of 2007 the U.S. Marine Corps instituted a training program they dubbed "Combat ...
Wifi hacking trends and what to know Mike Spicer This presentation will be geared towards executives dealing with today's security concerns and issues.
Changing the Economics of Security Operations Sam Mclane Arctic Wolf Networks utilizes a combination of People, Process and Technology to provide SOC as ...
To Open Source or Not To Open Source: Identifying if it is right for your program Adam Crenshaw The purpose of this talk is to address the value of open source in an ...
Private Sector for leaders Steve Fink This presentation will be geared towards executives dealing with today's security concerns and issues.
Security in a K12 environment David Long This presentation will be geared towards executives dealing with today's security concerns and issues.
Defense Against the Dark Arts: A Choose Your Own Adventure guide to a career in InfoSec Sean Jackson , Marv White From an outsider looking in, breaking into the Information Security world can seem a daunting ...
IoT of Doom: A Survey of 3 Vulnerable Ecosystems Erich Ficker We will explore 3 IoT ecosystems in detail. The following will be discussed: why they're ...
Surviving Under Stress - Training a Cyberdefense Team for Nationals Dale Rowe In 2016, a BYU team won their regional Collegiate Cyber Defense Competition (CCDC) held in ...
Surviving a Pentest Damon Nielson This presentation will be geared towards executives dealing with today's security concerns and issues.
Security in a Healthcare Environment Pete Bonsavage This presentation will be geared towards executives dealing with today's security concerns and issues.
Doom and Gloom for leader Dave Packham This presentation will be geared towards executives dealing with today's security concerns and issues.
Higher Education Security Concerns Corey Roach This presentation will be geared towards executives dealing with today's security concerns and issues.
Big Shop AppSec for Everyone Else Chad Butler Organizations are experiencing increasingly more security scrutiny from their customers. Vendor security questionnaires are lengthy ...
Encrypting the Web - Lessons Learned at Let's Encrypt Daniel Jeffery Let's Encrypt has been a success for the open source community and for privacy in ...
Privacy and Security.. Which comes first? Jerry Smith This presentation will deal with the issue of privacy and information security and how both ...
Presentation - Lock Impressioning Lonnie Bates Join the Presentation in the LPV!
Leadership Round Table - Dealing with Security Realities David Long , Corey Roach , Steve Fink , Damon Nielson This will be a panel with some of the industry leaders that spoke earlier in ...
Phishing with Dynamite: Shrapnel from the TLD Explosion Chris Larsen We've come a long way since .com, .net, and .org. Around a thousand new TLDs ...
The Snapshot Attack on Encrypted Filesystems Aaron Toponce Here, we'll discover the snapshot attack on encrypted filesystems. This has application to off-site encrypted ...
Zero to PCI in 50 minutes Nathan Cooper No if’s and’s or butt’s: PCI can be a pain. Alternatively, it can be an ...
Leadership Round Table - Technical aspects of Security Kelly Genessy , Pete Bonsavage , Dave Packham , Michael Spicer This will be a panel with some of the industry leaders that spoke earlier in ...
Defending Web Applications with Mod Security Lance Buttars Web Application Firewalls (WAFS) are a useful tool to provided a front line of defense ...
Ingress Egress: The emerging threats of augmented-reality gaming Andrew Brandt Augmented reality gaming's first breakout hit has millions of players, and a "game board" that ...
They used my own method to own my account, and my son was the prime suspect Josh Dustin I couldn't believe it. They'd actually pwned me using the password cracking method that I ...
Presentation - Lockpicking Fun Lonnie Bates Please join us in the HHV classroom for this awesome presentation with Lonnie
Rubber Duckie Bashninja Learn about the Hak5 Rubber Ducky!
Correctly Hashing Passwords Aaron Toponce We'll discuss what it takes to correctly hash user-supplied passwords. Despite common belief, this does ...
Held for Ransom: Understanding the "New" Face of Malware Neil Wyler , Bart Stumper Security, like anything, has trends that come and go, fads that fade away, and attacks ...
Protecting Your Brand With Defensive OSINT Tactics Ethan Dodge What is the public saying about your company? Or even better question, what are the ...
Hackers Challenge hints! Josh Galvez Come join us to learn about some Hackers Challenge Hints and Tips
Getting Involved with the Lawmaking Process Jeremy Cox Utah's Cyber Security Laws are not well understood by lawmakers, and are also very open ...
Fear the Kon-boot Matt Lorimer Come Learn about Kon-Boot
Using LetsEncrypt and Optimizing TLS Christopher Hopkins Learn about why we should use HTTPS to secure our websites, some of the historical ...
Using Security Self Assessment Survey Tools to Determine Security Training Needs Derek Larson , Cory Stokes The Southwest Education Area Security Awareness Team (SEASAT), using the SANS 20 standards and through ...
"NSA-tied" hack tools disclosure and pros/cons of Government holding 0Days for offense Steve Fink "NSA-tied" hack tools disclosure and pros/cons of Government holding 0Days for offense. I'm going to ...
Minnow boards Mike Spicer Come Learn about Minnow boards
All about ISACA Steve Fink This is a great lightning talk in the community track to learn all about this ...
Docker Container Security Kevin Stultz Containers are providing the next wave of data center optimization which provides tremendous benefits for ...
Filtering Student Email - Adventures in Gaggle Andrew Frink After an incident of inappropriate email contact between a teacher and student last school year, ...
No Safety for Old Phones: How Android became the new Windows XP Andrew Brandt In March, 2016, research uncovered a malvertising attack network that used a variety of exploits ...
All about DC801 Neil Wyler Utah Statewide Information & Analysis Center (SIAC) This is a great lightning talk in the ...
All about OWASP Dmitry Dessiatnikov This is a great lightning talk in the community track to learn all about this ...
Cybersecurity Education: Turning Witchcraft and Wizardry into Information Security Mathew Toth We are fighting an asymmetric battle, versus unknown adversaries, who deploy seemingly limitless resources to ...
Super Fundamentals of Network Security Jonathan M. Smith I think a lot of people forget about the very basics of network security. I ...
Wrestling With Yourself: Dealing With Impostor Syndrome in InfoSec Ethan Dodge In an age of incredible technological advancements intertwined with mounds of ambiguity in the workplace ...
RFID Tools Lawrence Davis Come learn all about RFID
All about UtahSEC Justin Searle , Dmitry Dessiatnikov This is a great lightning talk in the community track to learn all about this ...
All about SIAC Mike Lindstrom Utah Statewide Information & Analysis Center (SIAC) This is a great lightning talk in the ...
Anatomy of Cyber Attacks and Cybersecurity Defense Ashok Banerjee Your employees and contractors are targeted with Spearphishing and social engineering attacks, your networks are ...
Container Carnage: Exploiting Container-Centric Datacenter Platforms Scott Pack , Bryce Kunz Welcome to the new age where technologies like DC/OS, Mesos, and Marathon will abstract your ...
How to integrate security into Agile SDLC using OWASP Application Security Verification Standard Dmitry Dessiatnikov OWASP Top 10 awareness document debuted in 2003 and since then has been widely adopted ...
Event - Lockpicking Contest Round 1 Lonnie Bates Join the Contest in the LPV!
All about InfraGard Dan Anderson This is a great lightning talk in the community track to learn all about this ...
All about UtahSAINT Troy Jessup This is a great lightning talk in the community track to learn all about this ...
Heater Meter Matt Lorimer Come Learn about the Heater Meter
All about ISC2 Rob Jorgensen Utah Statewide Information & Analysis Center (SIAC) This is a great lightning talk in the ...
All about SDR Eldon Koyle Come Learn all about SDR
Kill All The Orcs, Hack All The Things Chad Walker "Kill All The Orcs, Hack All The Things" is an RFC for every security-head who ...
Picking locks and why physical security is everyone's concern Colin Jackson Physical security is important and can be as damaging or even more damaging than a ...
Searching Logs for Hackers. What you need to know and how to catch them Michael Gough Commodity malware and advanced attacks are hitting enterprises more often than ever before. When such ...
ESP8266 & Arduino IDE Brian Peterson Learn about your badge and the ESP8266 as well as Arduino IDE.
Lego USB guy Brian Peterson Come see a Lego USB Guy and how it was made
Hackers Challenge Shakedown Josh Galvez A step-by-step review of an assortment of this years puzzles. Walkthroughs for all puzzles will ...
Tin Foil Hat Talks Jason Tracy COme learn and join the conspiracy theories and build your tin foil hats!
Easy Linux Ops with osquery Bryce Kunz Easy Linux Ops with osquery will first provide students with the information they need to ...
How to become a Windows Logging Ninja Michael Gough Logging is probably the least understood security tool, yet one of the most powerful security ...
Security Fundamentals Training Jeremy Cox Part of SAINTCON's 101 Training Track, in Security Fundamentals you will be introduced to the ...
Patching Monthly May Be IMPOSSIBLE, Maintaining Compliance Is still POSSIBLE Adam Steed Most compliance requirements like PCI allow an alternative to monthly patching, which is having a ...
Red Teaming: Going Beyond the Technology Jason Wood When someone says ""red team"" in conversation, what do you think of? A penetration testing ...
Keyboards Hacking Mav See Mav rock DIY keyboards
WiFi Surveillance at DEF CON 24 Michael Spicer Lots of information is encoded on electromagnetic radiation, including WiFi. The aim of this project ...
You didn't wipe your drives and now this talk happened Henry Hill Have you ever wondered what happens when you take your computer to be recycled? Do ...
Building a Successful Security Awareness Program Wes Furgason This session will talk about the elements of building a successful engaging security awareness program, ...
Looking in the Mirror: OSINT for Blue Teams Jc , Stephanie This workshop will instruct attendees on Open-Source Intelligence (OSINT) gathering tools and techniques specifically focused ...
Nmap: Network Scanning Basics to Advanced Techniques Jason Wood Nmap: Network Scanning Basics to Advanced Techniques covers how to use one of the most ...
Ghost Stories from a SysAdmin Kent Schaeffer Ever hear a newbie Operator wipe out the backups from the past month? Ever get ...
OAuth2 & Openid-Connect: Good, Bad, and Ugly Cam Morris We'll go in depth into the flows and the many options of OAuth2 and OpenID ...
ESP8266 & Lua Klint Holmes Learn all the things from Klint!
WiFi Pineapple N8zwn Learn about the Hak5 Wifi Pineapple!
Oooh! We've Had An Incident! How Should We Respond? Sean Jackson It's better to be informed before you have to act. This talk is aimed to ...
Tamper Evident Challenge Judging Begins Troy Jessup N/A
UtahSAINT Board Meeting Troy Jessup This is an open board meeting for members of the UtahSAINT. The agenda for this ...
Assessing and Exploiting PLCs Justin Searle Interested in learning more about PLCs (Programmable Logic Controllers) that run most of the critical ...
REPEAT - Easy Linux Ops with osquery Bryce Kunz Easy Linux Ops with osquery will first provide students with the information they need to ...
Wireshark: Are you under attack? Kyle Feuz This training will focus on using Wireshark to spot potentially malicious traffic on your network. ...
Forging Your Identity: Credibility Beyond Words Tim Roberts , Brent White During onsite black box penetration assessments, it is quite common that you will encounter a ...
But What If I'm Not a Coder Jason Tracy Similar to the differences between Windows and Linux (System Administration) - the ability to read ...
FBI Cyber Task Force: Capabilities and Role in Information Security Adam Marre The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, ...
Someone created a super-secret UtahSAINT subreddit - you won't believe what happened next! Jon Jarvis Introducing r/UtahSAINT and r/SaintCon! This presentation will introduce two new(ish) subreddits that are intended for ...
The SAINTCON 2016 Network Wrap-up Luke Jenkins This is a breakdown of the network statistics for the 2016 Saintcon conference.
The SAINTCON 2016 Badge Wrap-up Klint Holmes , Jonathan Karras This is a breakdown of the badge for the 2016 Saintcon conference.
The SAINTCON 2016 Hackers Challenge Wrap-up Josh Galvez This is a breakdown of the Hackers Challenge for the 2016 Saintcon conference.