Nolacon 2017 May 19, 2017 to May 21, 2017, new orleans,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
HACKING THE IOT: A CASE STUDY Nancy Snoke , Phoenix Snoke An IoT device is made up of 5 different components: the hardware, webapp, mobile apps, ...
DOES DOD LEVEL SECURITY WORK IN THE REAL WORLD? Jeff Man After spending nearly 13 years working for the Department of Defense, I ventured out into ...
HURT ME PLENTY: THE DESIGN AND DEVELOPMENT OF ARGANIUM Todd Carr This talk will cover the design, development, and state of Arganium, the cooperative hacking shooter. ...
GOING PAST THE WIRE: LEVERAGING SOCIAL ENGINEERING IN PHYSICAL SECURITY ASSESSMENTS Stephanie Carruthers Many organizations have started understanding the value they can get with a physical security assessment. ...
EASY INDICATORS OF COMPROMISE: CREATING A DECEPTION INFRASTRUCTURE David Kennedy As an attacker there are certain things that I will go after that should never ...
ARMING SMALL SECURITY PROGRAMS: NETWORK BASELINE GENERATION AND ALERTS WITH BROPY Matt Domko Anomaly based IDS tools are expensive. Signature based IDS tools only work if a signature ...
LEAN THREAT INTELLIGENCE: DETECTING INTRUSIONS AND COMBATING INFILTRATORS WITH OPEN SOURCE SOFTWARE Lennart Koopmann With a vast increase in the amount of data and information coming in every second, ...
MAKE STEHM GREAT AGAIN David healwhans Schwartzberg Internet security threats continue to rise. Comparatively to the growing threats, there are too few ...
EDNS CLIENT SUBNET (ECS) – DNS CDN MAGIC OR SECURITY BLACK HOLE? Jim Nitterauer In January, 2011, the first version of Client subnet in DNS requests (draft-vandergaast-edns-client-subnet-00) was published ...
DESIGNING AND IMPLEMENTING A UNIVERSAL METERPRETER PAYLOAD Brent Cook While Windows has always been well supported with Metasploit’s Meterpreter payload, other platforms have not ...
ROOTING OUT EVIL: DEFEND YOUR DATA CENTER LIKE THE SECRET SERVICE PROTECTS THE PRESIDENT Nathaniel Gleicher Intruders spent more than a year inside the DNC and six months inside OPM. The ...
ATTACKING MODERN SAAS COMPANIES Sean Cassidy Modern software-as-a-service (SaaS) companies have a large footprint and a lot of automation which enables ...
DAVE LEWIS Keynote N/A
IRON SIGHTS FOR YOUR DATA Leah Figueroa Data breaches have become all too common. Major security incidents typically occur at least once ...
PHISHING FOR SHELLZ: SETTING UP A PHISHING CAMPAIGN Haydn Johnson Phishing for clicks is like the VA portion of a Pentest. It feels nice being ...
TALK ROULETTE Wartortell Random speakers make up random talks based on randomly generated topics what could go wrong? ...
SECURITY GUARDS — LOL! Tim Roberts , Brent White During onsite “black box” penetration assessments, it is quite common that you will encounter a ...
EMBRACE THE BOGEYMAN: TACTICAL FEAR MONGERING FOR THOSE WHO PENETRATE Fuzzynop When it comes to cyber penetration, evolving threat landscapes mandate advanced persistent tac.… ha ha, ...
SKYNET WILL USE PSEXEC: WHEN SYSINTERNALS GO BAD Matt Bromiley , Brian Marks The Sysinternals Suite: A set of legitimate tools designed to make system administrator’s lives easier. ...
RED TEAMING NEWBIES – A LOOK INTO CCDC Trey Underwood CCDC (Collegiate Cyber Defense Competition) competitions ask student teams to assume administrative and protective duties ...
LAYER 8 AND WHY PEOPLE ARE THE MOST IMPORTANT SECURITY TOOL Damon J. Small People are the cause of many security problems, but people are also the most effective ...
TOR-PI-DO NOW WITH BLOOMIN’ ONION Justin Whitehead , Jim Allee Tor-Pi-Do is a Linux distro that brings together a specific set of tools to allow ...
22 SHORT FILMS ABOUT SECURITY Charlie Vedaa Inspired by The Simpsons’ homage to Pulp Fiction titled ‘22 Short Films About Springfield’, this ...
THE DEVIL’S BARGAIN: EMERGING TRENDS IN THE RANSOMWARE ECOSYSTEM Joshua Galloway 2016 was hailed as the “Year of Ransomware” but the growth of this criminal industry ...
SECURITY IS DEAD. LONG LIVE INFOSEC! David Shaw The information security industry is profoundly ineffective at preventing security incidents. Major breaches of increasing ...
AN EMPLOYEE, THEIR LAPTOP AND A HACKER WALK INTO A BAR Shannon Fritz If one of your company laptops were lost, what might an attacker be able to ...
BEYOND OWASP TOP 10 Aaron Hnatiw We’ve all heard of the OWASP Top 10- it is the standard first reference we ...