Carolinacon 2017 May 19, 2017 to May 21, 2017, carolina,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Phishing, Whaling: Beyond Technology Social Engineering... Luke Stephens The consistent and critical weakness in all cyber systems is the human. So much of ...
RFID is dead; long live RFID! Smrk3r In many cases, building access badges have gone the way of "keep it secret; keep ...
A Pentester's Intro to Attacking ICS/SCADA Tripp Roybal Since coming into popular use in the late 1960s, industrial control systems (ICS) have become ...
DMARC for Fun and Threat Intel Katie Murphy Bring your mail security into 2017 and protect your brand with DMARC. Review how the ...
CTFs - Not Just for Halo Ray , Clayton Capture The Flag competitions present a unique opportunity to practice various information security problems and ...
So you want to learn Machine Learning John F. Davis Machine Learning is frequently in the news, but you might not know what it is. ...
Testing Phone Systems - "I can come up with something better later" Owen Phone systems have been long forgotten in favor of more modern technology from the legacy ...
Hillbilly Storytime: Pentest Fails Adam Len Compton "Whether or not you are just starting in InfoSec, it is always important to remember ...
How to buy illegal stuff online Vic Vandal , Quiet Riot QR and Vic will walk attendees through an A-Z tutorial on how people buy illegal ...
OpSec for InfoSec Justin Nordine A brief overview of OpSec techniques for various threat levels. The talk will cover different ...
Hacking The Invasion of Things (or as my wife calls it, what did you spend our money on this time) Deral Heiland The "Internet of Things" (IoT) is taking over our lives, so we should be constantly ...
A ROP Primer Pandatrax When writing exploits these days, stack protection techniques can be a pain in the ass. ...
Getting Started with PowerShell or One Tool to Hack them all Michael Wharton PowerShell has become a tool that many hackers and pentesters are now using. This session ...
Forgotten History of Cyberwar Sean Pierce In 1981 the French Directorate of Territorial Security (DST) flipped the high ranking KGB agent ...
How to Patch Stupid - A modern approach to remediating user risk Joshua Crumbaugh This talk is part of an open source project I'm heading up called The Human ...
HoneyPy & HoneyDB Phillip Maddux This talk will provide a light intro to honeypots and their benefits, and highlight two ...