Nolacon 2017 May 19, 2017 to May 21, 2017, new orleans,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
HACKING THE IOT: A CASE STUDY | Nancy Snoke , Phoenix Snoke | An IoT device is made up of 5 different components: the hardware, webapp, mobile apps, ... | |
DOES DOD LEVEL SECURITY WORK IN THE REAL WORLD? | Jeff Man | After spending nearly 13 years working for the Department of Defense, I ventured out into ... | |
HURT ME PLENTY: THE DESIGN AND DEVELOPMENT OF ARGANIUM | Todd Carr | This talk will cover the design, development, and state of Arganium, the cooperative hacking shooter. ... | |
GOING PAST THE WIRE: LEVERAGING SOCIAL ENGINEERING IN PHYSICAL SECURITY ASSESSMENTS | Stephanie Carruthers | Many organizations have started understanding the value they can get with a physical security assessment. ... | |
EASY INDICATORS OF COMPROMISE: CREATING A DECEPTION INFRASTRUCTURE | David Kennedy | As an attacker there are certain things that I will go after that should never ... | |
ARMING SMALL SECURITY PROGRAMS: NETWORK BASELINE GENERATION AND ALERTS WITH BROPY | Matt Domko | Anomaly based IDS tools are expensive. Signature based IDS tools only work if a signature ... | |
LEAN THREAT INTELLIGENCE: DETECTING INTRUSIONS AND COMBATING INFILTRATORS WITH OPEN SOURCE SOFTWARE | Lennart Koopmann | With a vast increase in the amount of data and information coming in every second, ... | |
MAKE STEHM GREAT AGAIN | David healwhans Schwartzberg | Internet security threats continue to rise. Comparatively to the growing threats, there are too few ... | |
EDNS CLIENT SUBNET (ECS) – DNS CDN MAGIC OR SECURITY BLACK HOLE? | Jim Nitterauer | In January, 2011, the first version of Client subnet in DNS requests (draft-vandergaast-edns-client-subnet-00) was published ... | |
DESIGNING AND IMPLEMENTING A UNIVERSAL METERPRETER PAYLOAD | Brent Cook | While Windows has always been well supported with Metasploit’s Meterpreter payload, other platforms have not ... | |
ROOTING OUT EVIL: DEFEND YOUR DATA CENTER LIKE THE SECRET SERVICE PROTECTS THE PRESIDENT | Nathaniel Gleicher | Intruders spent more than a year inside the DNC and six months inside OPM. The ... | |
ATTACKING MODERN SAAS COMPANIES | Sean Cassidy | Modern software-as-a-service (SaaS) companies have a large footprint and a lot of automation which enables ... | |
DAVE LEWIS | Keynote | N/A | |
IRON SIGHTS FOR YOUR DATA | Leah Figueroa | Data breaches have become all too common. Major security incidents typically occur at least once ... | |
PHISHING FOR SHELLZ: SETTING UP A PHISHING CAMPAIGN | Haydn Johnson | Phishing for clicks is like the VA portion of a Pentest. It feels nice being ... | |
TALK ROULETTE | Wartortell | Random speakers make up random talks based on randomly generated topics what could go wrong? ... | |
SECURITY GUARDS — LOL! | Tim Roberts , Brent White | During onsite “black box” penetration assessments, it is quite common that you will encounter a ... | |
EMBRACE THE BOGEYMAN: TACTICAL FEAR MONGERING FOR THOSE WHO PENETRATE | Fuzzynop | When it comes to cyber penetration, evolving threat landscapes mandate advanced persistent tac.… ha ha, ... | |
SKYNET WILL USE PSEXEC: WHEN SYSINTERNALS GO BAD | Matt Bromiley , Brian Marks | The Sysinternals Suite: A set of legitimate tools designed to make system administrator’s lives easier. ... | |
RED TEAMING NEWBIES – A LOOK INTO CCDC | Trey Underwood | CCDC (Collegiate Cyber Defense Competition) competitions ask student teams to assume administrative and protective duties ... | |
LAYER 8 AND WHY PEOPLE ARE THE MOST IMPORTANT SECURITY TOOL | Damon J. Small | People are the cause of many security problems, but people are also the most effective ... | |
TOR-PI-DO NOW WITH BLOOMIN’ ONION | Justin Whitehead , Jim Allee | Tor-Pi-Do is a Linux distro that brings together a specific set of tools to allow ... | |
22 SHORT FILMS ABOUT SECURITY | Charlie Vedaa | Inspired by The Simpsons’ homage to Pulp Fiction titled ‘22 Short Films About Springfield’, this ... | |
THE DEVIL’S BARGAIN: EMERGING TRENDS IN THE RANSOMWARE ECOSYSTEM | Joshua Galloway | 2016 was hailed as the “Year of Ransomware” but the growth of this criminal industry ... | |
SECURITY IS DEAD. LONG LIVE INFOSEC! | David Shaw | The information security industry is profoundly ineffective at preventing security incidents. Major breaches of increasing ... | |
AN EMPLOYEE, THEIR LAPTOP AND A HACKER WALK INTO A BAR | Shannon Fritz | If one of your company laptops were lost, what might an attacker be able to ... | |
BEYOND OWASP TOP 10 | Aaron Hnatiw | We’ve all heard of the OWASP Top 10- it is the standard first reference we ... |