RVASec 2017 June 8, 2017 to June 9, 2017, richmond,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome to RVAsec! Jake Kouns N/A
Keynote - Mikko Hyponnen Mikko Hypponen N/A
CTF Intro Mike "mckt" Bailey N/A
Badge Intro Paul Bruggeman N/A
Can Game Theory Save Us from Cyber Armageddon? Barry Kouns What can the movies "War Games" and Doctor Strangelove" teach us about avoiding a cyber ...
Maintainability + Security = <3 Robert Wood The security and devops culture craze is all around us, even with all this talk ...
Defend the Defenders: Managing and Participating in Excellent Teams Seth Hanford Response teams apply threat models to protect an organization's goals and to determine which controls ...
Best Practices for Securing the Hybrid Cloud Greg Pepper Cloud has enabled applications and infrastructure to move at a pace not seen before. Organizations ...
CTF Prep Mike "mckt" Bailey N/A
Adventures in (Dynamic) Network Segmentation or And That's How I Got This Scar Rick Lull , Shannon Yeaker Network segmentation is a great way to build a foundation for a thorough approach to ...
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niques') -Join '') Daniel Bohannon PowerShell is increasingly being used by advanced attackers and script kiddies alike in targeted attacks, ...
Managing Crowdsourced Security Testing Mike Shema The crowdsourced security model has been embraced by organizations running public bug bounty programs. These ...
AWS Survival Guide 2.0 Ken Johnson In this talk, we discuss harnessing existing AWS functionality to strengthen your organization's AWS infrastructure ...
Think of the Children: Preparing the Next Generation of Security Specialists Roman Bohuk , Jake Smith Undoubtedly, cybersecurity is one of the hottest topics in today’s industry. For example, a Cisco ...
TIP of the Spear: A Threat Intelligence Platform Acquisition Jay Wonn Military organizations have long known of the value of intelligence, but commercial entities only realized ...
Zero Trust “Lite” Architecture to Securely Future-Proof Your Network Jeremy Dorrough The traditional 3-tier data center architecture model continues to challenge security professionals who are tasked ...
Day 1 Closing Chris Sullo N/A
Welcome to Day 2 of RVAsec! Jake Kouns N/A
Keynote - Ron Gula Ron Gula N/A
OSINT: The Secret Weapon in Hunting Nation-State Campaigns Alon Arvatz Discussing real use cases of state actors engaged in APT campaigns, explore what can be ...
Recent Developments in Linkography Based Cyber Security Robert Mitchell Cyber attacks on critical cyber systems are not decreasing in frequency or complexity. Aggressors choose ...
CTF Mike "mckt" Bailey N/A
DevOpSec - Killing the Buzz Jason Ross The DevOps movement continues to grow, and it is beginning to move out of small ...
Retailing Another Threat Landscape Story Dan Holden Over the last several years, retail breaches have become some of the highest profile stories, ...
Building A Pentest Program On A Shoestring Budget Grayson Walters You don’t have $85,000 laying around to bring in an external pentest vendor. Even if ...
RoboCop- Bringing law and order to CICD Troy Marshall In the movie, RoboCop is given three primary directives: "Serve the public trust, Protect the ...
Poor Man’s Spy vs. Spy - Analysis of Red Team Attack Techniques by Blue Team Forensicators Derek Banks , Troy Wojewoda How advanced are the cyber attack techniques that are all over the news these days? ...