Skydogcon 2016 Oct. 21, 2016 to Oct. 23, 2016, nashville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
“Minority Report 2016: The Future is Now” Alex Berta The movie Minority Report is predicated on a technology that can predict crime before it ...
“AWShit. 'Pay-as-you-go' pentesting” Nathan Clark Learn about how to use Amazon Web Services to host your whole pentesting platform. Launch ...
“Post-Incident Analysis with Pretty Pictures” Endian This talk will focus on discovering more about those pesky malware distribution networks and converting ...
“Wireless hacking/(in)security” Scott M In this demo-heavy talk, I will provide tips and tricks for hacking wireless networks, as ...
“Just Got PWND.sh” Itzik Kotler You've been at it for all night. Trying all the exploits you can think of. ...
“Out of Denial: A 12-Step Program for Recovering Admins” Paul Lee With massive data breaches being announced almost daily, the number of IT professionals moving into ...
“What can you do?” Cameron Maerz Wrecking networks with ease. An offensive review of layer 2, this ain't your grampa's poison. ...
“Building an Applied Intelligence Model” Dave Marcus , Wally Prather The Advanced Programs Group (APG), has combined traditional malware and cyber-attack research with advanced intelligence ...
“So You Wanted to Work in Infosec” Joey Maresca Ten years of experience working as a grunt and as a manager, have provided an ...
“Closing the gap between Operations and Cybersecurity.” Tiefighter The company is concerned about being compliant. We are concerned about being secure. We know ...
“Spy Game: Red Teaming In The Real World” Kizz Myanthia Red Teaming or Tiger Teaming is a black hole of misinformation and knowledge most have ...
“How I Learned to Stop Worrying and Love the Blue Team” Ryan O’horo The journey from pen tester to bona fide red team leader. How to elevate your ...
“Hacking Open-Source Licensing” Tyler Pitchford Open source is, in general, a friendly, giving, and even forgiving community. That, however, isn't ...
“You Are Being Manipulated” James Powell There is constant pressure coming from companies, people, and attackers. Most times we don’t realize ...
“Maintaining Jedi order after Jar Jar Binks was left in command” Chris Scott Avoid Storm trooper camp by joining the rebellion. Get your midichlorians at the door because ...
“The Mysterious World of Polyglots” Josh Sheppard Have you ever wondered how to reach a piece on unexploited code that you cant ...
“Hunting: Defense Against The Dark Arts” Jacqueline Stokes We can all agree that threat ("Evil") detection is an essential component of a functioning ...
“Security Guards - LOL!” Brent White During “black box” social engineering assessments, it is quite common that you will encounter a ...
“I Promise I'm Legit: Winning with Words” Cyni Winegard , Bethany Ward Social engineering is quickly becoming more prevalent in the infosec industry. Users are becoming more ...