corncon 2017 Sept. 8, 2017 to Sept. 9, 2017, davenport,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Born In The Wrong Century: Bladesmithing & Blacksmithing Spijk Sel This is a booth in the and runs 9-4:30 during expo hours. It involves demonstrations ...
Hacking The Pentagon Daniel Lim This is a booth in the and runs 9-4:30 during expo hours. It involves demonstrations ...
The Ethics of Creating and Hacking Technology Jen Fox [20 minutes] Jen Fox will speak to kids about the ethical use of technology. Once ...
Opening Keynote: Secrets of Superspies Ira Winkler [60 minutes] Everyone perceives spies as unstoppable entities who can come at organizations with unlimited ...
How I would Have Done It: Practical Election Hacking John Bambenek [90 minute shared session] For much of the past year we have been talking about ...
Nation State Disruption and Influence with Info Ops John Bumgarner [90 minute shared session] Prior to the birth of the internet foreign intelligence services manipulated ...
Restoring Trust in the Age of Digital Deception Katie Hanahan Despite decades of technological advancement and billions of dollars invested in security solutions, humans remain ...
Beware: The Ocean is Full of Phish Todd Fitzgerald [60 minutes] This session will examine the impact of phishing, the hidden costs of phishing, ...
Educational Pathways to the Cybersecurity Workforce Daniel Stein [60 minutes] The demand for cybersecurity professionals is at an all-time high, and the future ...
Social Media Risk: Why You Weren’t Hired or Fired Michael Kiefer [30 minutes] Social media is the new game changer in risk management. Your job application, ...
Diversity in Cybersecurity (Panel) Bob West , Katie Hanahan , Lauren Kinsey , Sarah Isaacs , Danielle Kingsbury [60 minutes] A panel of security industry executives will discuss barriers and opportunities facing underrepresented ...
Cyber Investigations & The Fuzz Nick Selby If you've ever filed a cyber crime complaint with the cops, you'll have noticed it ...
Closing Ceremony John Johnson , Shadrack Roberts Awards, door prizes and closing statements.
How to Create a Hacker’s Swiss Army Knife w/Parrot Xe1phix [30 minutes] I will be giving a live demo of several Parrot Linux use cases. ...
Abusing Normality: Data Exfiltration in Plain Site Aelon Porat [30 minutes] As a defender, you can recognize a potential compromise when a new WMI ...
A Good Shell is Hard to -Find- Choose Killian Ditch [30 minutes] Given the plethora of remote command shell payloads out there, how does one ...
Facebook Education and Diversity Program Stephanie Siteman [30 minutes] This presentation covers the gaps discovered the information security leaders at Facebook: Quality ...
Anatomy of a Breach Aaron R. Warner [30 minutes] Security breaches are interesting to discuss in the abstract and fun to simulate, ...
Repairing the internet with Responsible Disclosures Victor Gevers [30 minutes] In 2016 a non-profit organization GDI.foundation, operated volunteers started reporting vulnerabilities as responsible ...
Hacking Medical Devices: Don’t Let Your Pacemaker Skip a Beat Charles Parker [30 minutes] Medical devices have become more prevalent as the population has aged. The hardware ...