cactuscon 2017 Sept. 29, 2017 to Sept. 30, 2017, arizonia,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
HTTP Route Busting – Enumerating Routes instead of Directories Dejan Zelic N/A
Ring 0 Assembly Xlogicx , Bryan Geesey N/A
What do little old ladies, Chinese threat actors, and a quarter of a million dollars have in common.... John Stauffacher N/A
Keynote Allison Miller , Viss N/A
Online Vulnerabilities and Exploits Paulo Shakarian , Phd , Mohammed Almukaynizi N/A
Not Your Grandma's CTI OODA Loop - Community Defense Explained Superdavee N/A
DumpsterFire Toolset - Generating Network & System Shenanigans to Manipulate Blue Teams Trycatchhcf N/A
Cash in the aisles: How gift cards are easily exploited Will Caput N/A
Hacking for Hired Rachel Harpley N/A
Wrangling Malware for Fun and Pentesting John Freimuth , Alex Stockwell N/A
The road to hiring is paved in good intentions Tim O’brien N/A
OSINT-SPY Sharad Kumar N/A
Security Puzzle Solving Kashish Mittal N/A
Chaos in the Machine: Why Security Needs a Style Guide Brianne Hughes N/A
Deliberate Practice Sandra Escandor-o'keefe N/A
Leveraging Modern Applications and Tools Stefan Edwards N/A
GET HIRED! (A HIRING MANAGER'S PERSPECTIVE) Glen Walker N/A
Memory Forensics 101 Xmen vs. Magneto Mari Degrazia N/A
Practical Malware Analysis Devin Duffy-halseth , Sam Bowne N/A
Achieving Cyber-autonomy Yan Shoshitaishvili N/A
Decoding digital mobile radio systems using software defined radio Dan H.264 N/A
Enemy at the Virtual Gates: An Introduction to Investigating E-Commerce Data Breaches Mari Degrazia N/A
Securing Java Microservices with Java JWT (JJWT) Micah Silverman N/A
Sex, Secret and God: A Brief History of Bad Passwords Kyle Rankin N/A
Securing the Internet of Things (IoT) Travis Smith N/A
More than Code: Creating Production Ready Tools Kevin N/A
Recycling Malware Joe Giron N/A
Ten Commandments of Physical Security Drew Redshift Porter N/A
Domo Arigato, Mr. Roboto: Security-Testing in a DevOps World Seth Law N/A
Operationalizing Cyber Threat Intelligence Ryan J. Chapman N/A
Attack and Defend with Powershell Aelon Porat N/A
Testing like a Ghost Catatonic N/A