CircleCityCon 2017 June 9, 2017 to June 11, 2017, Indianapolis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Art of the Jedi Mind Trick: Learning Effective Communication Skills Jeff Man The hacker/security community continues to struggle with how to get our message across to others. ...
Level Up Your Leadership Stefanie Shafer-Pond, Wolfgang Goerlich Leading IT security or CyberSecurity? It’s hard, right? We ask them to go left, and ...
The Basics Power of PI Jeff Weaver, Sunil Peddakotla Course Description: Want to learn about a low cost low energy consumption platform for pen ...
Car Hacking Hands-On Robert Leale Learn how to connect to vehicle systems, send and receive messages, control and audit vehicle ...
A Pen Tester's Guide to Linux Joey Maresca This course is designed to be an introduction to Linux with a bit of a ...
Opening Keynote: Words Have Meanings Dan Tentler Getting your point across is important. Clear communications are essential. Why is the information security ...
And the Clouds Break: Continuity in the 21st Century Wolfgang Goerlich The promise of cloud computing was a utility; always up, always on, just a click ...
DNS Dark Matter Discovery – There’s Evil In Those Queries Jim Nitterauer DNS is the engine that drive the Internet, converting recognizable names into IP addresses behind ...
Intro to Ham Radio Justin Herman Interested in getting your FCC license but don't know where to start? This class will ...
Understanding the Computer Fraud and Abuse Act - a Legal Primer for Hackers Fred Jennings The Computer Fraud and Abuse Act, or CFAA, is the primary legal tool used to ...
DNS Blackholing with Pi-Hole (aka How To Block Unwanted Ads & Malware on your network for cheap) Arden Meyer This training will cover the basics of DNS and how it can be manipulated for ...
The 31337 Power of Pi Sunil Peddakotla , Jeff Weaver Course Description: The course will provide hands on labs for putting together attack kits Using ...
Building and Running Security Exercises Wolfgang Goerlich Everyone is talking about threat modeling. And a few are talking about security exercises. But ...
Better Security Through DNS Logging Using Open Source Tools Lennart Kooperman , Jim Nitterauer Security is difficult, especially budget and time are limiting factors. We have learned from experience ...
Detecting DNS Anomalies with Statistics Jamie Buening N/A
Password Cracking Like a Pro Jeremi Gosney Learn how to crack passwords like the professionals with a full day of instruction and ...
Effective Report Writing for Security Practitioners Benjamin Robinson Say more with less! Improve your report writing through tools and technical writing to succinctly ...
Application Security Metrics Caroline Wong What's your current level of confidence in your application security program? Are you tracking any ...
What a former Repo man can teach about OSINT and SE Michael James Attendees will learn the basics of Social engineering and OSINT. What makes SE/OSINT practices such ...
Network manipulation on video games. Alex C. Kot I will go over common misnomers of online cheating methods. Explain the realistic side of ...
Ph'ing Phishers Jae Credential phishing is super lame. Sadly it's one of the main workhorses behind financing so ...
Trials and Tribulations of setting up a Phishing Campaign - Insight into the how Haydn Johnson Phishing for clicks is like the VA portion of a Pentest. It feels nice being ...
Fuzzing with AFL Adam Dc949 Fuzzing is easy to learn, but hard to master. This will give you an overview ...
Open Sesamee Max Power Resettable combination locks are popular because they can be set to user-chosen codes. Multiple locks ...
The Decision Makers Guide To Managing Risk Joel Cardella How do you arrive at the IT decisions you make? What factors do you use ...
Network Security? What About The Data? 0ddj0bb 0ddj0bb The data is the ultimate prize for threat actors. Bypassing the firewall is not their ...
Threat Intelligence: Zero to Basics Chris rattis J This is an audience participation talk, on going from having DFIR with no Threat Intelligence ...
The State of Security in the Medical Industry Cannibal Billy Bringing awareness to the pain felt in the healthcare industry from a security standpoint, what ...
Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation Jason Beatty Attacks are more and more likely to come from internal network sources, possibly being allowed ...
Cybersecurity for real life: Using the NIST Framework to protect your critical infrastructure Ryan Koop Convince the suits why an industrial level of security is right for you. The C-level ...
Why is the Internet still working? James Troutman I have noticed that most InfoSec folks, even those coming from a network engineering background, ...
Security Training: Making Your Weakest Link The Strongest Aaron Hnatiw It is a common joke amongst security professionals that the weakest link in any organizations ...
It's A Disaster! Cheryl Biswas You don’t know what you don’t know. There are things we have no control over. ...
The Kids Aren't Alright: Security and K-12 Education in America Vivienne Pustell "Stupid users!" is a common lament. But users aren't stupid, they're just following their training. ...
How To Be Curious Bret Mattingly Curiosity. It’s not just for killing cats. In fact, it’s the heart of the hacker ...
Beginning Android App Reverse Engineering David healwhans Schwartzberg This hands-on training is focused on introducing Android APK reverse engineering to begin students with ...
Intro to Windows Forensics Using Free Tools Marcus Thompson This course introduces participants to the fundamentals of digital forensics for Windows-based systems. You will ...
OSINT For Pen Testers: Maximizing Your Efficiency Joe Gray Have you ever spent too much time in the reconnaissance phase of a pen test ...
Closing Keynote: Lectures or Life Experiences - Awareness Training that Works! Tottenkoph At some point in our careers, we’ve been subjected to user awareness training. Most of ...
Finding Your Way to Domain Admin Access and Even So, the Game Isn’t Over Yet. Keith Lee In this presentation, we discuss the tricky scenarios we faced during internal penetration test engagements ...
Ichthyology: Phishing as a Science Karla Burnett Many companies view phishing as a given: employees will click links and enter credentials, and ...
Peakaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet Amit Serper Imagine that you've purchased your small a cheap ip security camera to feel just a ...
See beyond the veil: Automating malicious javascript deobfuscation Chad Robertson Exploit kits use javascript to direct victim browsers to hosted exploits. These javascript are highly ...
You're not old enough for that: A TLS extension to put the past behind us Falcon Darkstar Momot TLS evolves rapidly. We don't all have the luxury of upgrading with it, unfortunately; new ...
Ye Olde Hacking Johnny Xmas Since the Second Industrial Revolution, technology has been advancing at a rate beyond anyone’s estimates. ...
Changing our future with 3D Printing Emily Peed 3D Printing represents the last tool that will be necessary is shifting into our new ...
We Don't Always Go Lights and Sirens Kendra Cooley One of the most critical steps to Incident Response is the initial triage phase. The ...