Anycon 2017 June 16, 2017 to June 17, 2017, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments Ronny L. Bull Cloud service providers and data centers offer their customers the ability to deploy virtual machines ...
Red Team Yourself Thomas Richards So your organization conducts regular tests with $automated tool. Want to bring your security testing ...
Noob 101: Practical Techniques for AV Bypass Jared Hoffman The shortcomings of anti-virus (AV) solutions have been well known for some time. Nevertheless, both ...
OWASP Top 10: Hacking Web Applications with Burp Suite Chad Furman A fast-paced intro to the world of web application security. Briefly, I will summarize OWASP, ...
DIY Spy: Roll-Your-Own Covert Channels With Scapy & Python Jennifer Allen This is an educational track to teach newcomers to covert channels the concept of stealthy ...
Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools John Dunlap In this talk I will compare ROP compiler support for Jump Oriented Programming (“JOP”) across ...
The Stuffer Ronny L. Bull , Sean Drzewiecki , Aaron Gudrian The Stuffer is a utility which exploits the reserved bits and padding space of multiple ...
Jedi Mind Tricks: People Skills for Security Pros Alex People skills for security professionals but WAY MORE FUN!
Sniffing Sunlight Erik Kamerling Laser listening devices (laser microphones) are a well understood technology. They have historically been used ...
Bringing Home Big Brother: Personal Data Privacy in the Surveillance Age Todd , Michele Have you ever purchased something online and then seen an ad for a related item ...
Measuring the Efficacy of Real-Time Intrusion Detection Systems Jeffrey Richard Baez To solve the problem of attack detection in the cloud, Artificial Intelligence (AI) techniques can ...
Incident Response Evolved - A Preventative Approach to Incident Management Aaron The current threat landscape has been in a state of evolution that presents a significant ...
Making Friends for Better Security Alex Doing security well is difficult enough. Without internal allies, it can be damn well impossible. ...
To SIEM or not to SIEM: an Overview Chris Maulding In this talk, we will visit the questions I hear from clients and others, is ...
Thinking 1nside-the-B0x: Cyber Defense and Deterrence via How Hackers Think Ernest Y. Wong Since our Republic’s origins, Americans have demonstrated a speculative knack and considerable optimism that have ...
Problems With Elliptic Curves In TLS and SSH Joe Testa This presentation examines the elliptic curve parameters standardized by NIST in FIPS 186-2, which are ...
Let's Play Defense at Cyber Speed Duncan Sparrell Cyber-attacks are increasing in terms of sophistication, speed and dynamics. Advanced cyber actors (and even ...
Does DoD Level Security Work in the Real World? Jeff After spending nearly 13 years working for the Department of Defense, I ventured out into ...
Ermahgerd: Lawrs Robert Heverly When do you – and other coders, hackers, developers, and tinkerers – think or worry ...
Real Security Incidents, Unusual Situations Adam Dean The pace of databreaches has reached epic proportions. Organizations large and small, in every industry ...
Breaking is Bad: Why Everyone at This Conference Will be Unemployed Reg Harnish The truth is hard to swallow sometimes, but the reality is this: PENTESTING IS DEAD. ...
Top 10 Issues in Cybersecurity & Data Privacy Law Antony Haynes For anyone interested in protecting data privacy or providing cybersecurity, what are the leading issues ...
Big Data's Big Problems Jeanna Neefe Matthews The data that we record daily about ourselves through our cell phones, credit card purchases, ...
Hacking Politics: Infosec in Public Policy Shahid Buttar , Jonathan Capra , Rashida Richardson In recent times, the issues of the InfoSec community have arguably become synonymous with those ...
New York State's New College of Emergency Preparedness, Homeland Security and Cybersecurity: Training a New Generation of Leaders Brian Nussbaum This presentation will describe the creation, rapid growth, structure, and function of the new College ...
The Road to Hiring is Paved in Good Intentions Tim O'brien The information security field is in desperate need of people with the technical skills and ...
Hold my Red Bull: Undergraduate Red Teaming Jonathan Gaines In this talk Jon covers the pros and cons of Undergraduate Cyber Security Programs, including ...
Whose Idea Was That? Comparing Security Curriculums and Accreditations to Industry Needs Robert Olson , Chaim Sanders Security is hard but security education may be harder. Few academic institutions have the skills ...
So You Want To Be A H6x0r, Getting Started in Cybersecurity Doug White , Russ Beauchemin Russ and Doug, co-hosts of Secure Digital Life and with a combined, MANY years working ...
Hacks, Lies, & Nation States Mario A hilarious and non-technical skewering of the current state of Cybersecurity, the Cybersecurity "industry", the ...
InfoSec Career Building through Reserve Military Service Dan Van Wagenen While not often thought of as a fast track to building a career in Information ...
Career Advice From an Awesome Tech Woman Devi Momot Join Devi Momot, CISSP, GISP, GSLC, CEO of Twinstate Technologies and some friends to discuss ...