grrcon 2017 Oct. 26, 2017 to Oct. 27, 2017, grand rapids,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
STRATEGIES ON SECURING YOUR BANKS & ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS & ENTERPRISES FOR A LIVING!)- Thursday Keynote Jayson E Street Most people who work on the defensive side of computer security only see the landscape ...
10 Cent Beer Night: The World we now Live In- Friday Keynote Johnny Xmas June 4th, 1974: A bench-clearing brawl in response to some extremely “dirty” baseball a week ...
The Black Art of Wireless Post-Exploitation Gabriel Ryan Wireless is an inherently insecure protocol. Most companies recognize this, and focus their resources on ...
The Credentials in the High Castle Kyle Shattuck , Kyle Eaton Account takeover (ATO) incidents can be obfuscated from an analyst in a magnitude of ways. ...
3rd Party Data Burns Arron "finux" Finnon Data-Loss via 3rd party data-breaches is a subject that most have a little time for, ...
Population Control Through The Advances In Technology… Chris Roberts The Future…. :) Will we end up with a hierarchical system of digital existence? At ...
Morphing to Legitimate Behavior Attack Patterns David Kennedy Let’s face it, the industry is getting better at detection. Not everyone, but it’s getting ...
We got it wrong J wolfgang Goerlich This session is on all the things we all say all the time, about all ...
Duncan Vs the Internet! Duncan Manuts Enjoy the show as Duncan debates the internet on a variety of topics. With some ...
The Shuttle Columbia Disaster: Lessons That Were Not Learned Joel Cardella When the shuttle Challenger was destroyed in 1986, poor NASA culture was significant in the ...
Cyber, Cyber, Cyber – Using the killchain to accomplish something Infosystir Everyone talks about the cyberkill chain(tm). I want to show you how to map some ...
Shadowcrew: A history and future of cybercrime Brett Johnson Presenter will detail a representative history of cybercrime, concentrating on Shadowcrew, Carderplanet, and its members ...
Those Phishing Guys: TA530 In-Depth Joe Petroske , Rachel Giacobozzi Successful financially-motivated adversary groups play the long game. They evolve, adapt, and change tactics to ...
Embedding Security in Embedded Systems Jared Demott If security were easy, we’d have solved it 20 years ago. Unfortunately for complex systems, ...
TBA Atlas of D00m More info to be announced shortly
I’ve got a (Pocket) Bone to pick with you Phil Polstra This talk will demonstrate several attacks that can be performed using the new open-source PocketBone ...
The Need for Speed – Benefits of Speed Driven Incident Response Joe Petroske , Aaron Shanas Threat actors, like your IR team, need time to complete their mission. By short-circuiting the ...
Building a Usable Mobile Data Protection Strategy David healwhans Schwartzberg Mobile smart devices from the consumer perspective are easy to activate for a enriched user ...
Oops! Was that your pacemaker? Charles Parker Medical devices have become more prevalent as the population has aged. The earlier applications included ...
Tales From The Trenches: Practical Information Security Lessons Michael Belton In this talk, Michael Belton discusses his past experiences delivering penetration testing services. The format ...
Red Team Yourself Thomas Richards So your organization conducts regular tests with $automated tool. Want to bring your security testing ...
Identity theft through OSINT/social engineering Zee Abdelnabi This talk will demonstrate how easy identity theft has become because of OSINT and the ...
The Future of Cyber Security Anothony Sabaj Trends, Threats and Solutions from the Data Center to the The Cloud for tomorrow and ...
vAp0r and the Blooming Onion Jim Allee , Justin Whitehead vAp0r is a Linux distro that brings together a specific set of tools to allow ...
Software Defined Segmentation Shaun Muller Acquisitions, partnerships, BYOD, IoT are just some business demands that increase security headaches for businesses ...
A Reporter’s Look at Open Source Intelligence Hilary Louise Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies ...
Infosec State of Affairs: Too much Kim Kardashian – not enough Malcolm Gladwell Jim Wojno , Dan Kieta In security we obsess about vulns, exploits and attacks with headline grabbing names like Petya ...
Vulnerability Disclosure Bat Bat will give a brief overview of vulnerability disclosure policies and their importance in both ...
An Attack Pathway Into Your Organization? Reducing risk without reducing operational efficiency David Adamczyk Despite the increased understanding in the importance of locking down privileged account access, the fact ...
Realizing Software Security Maturity: The Growing Pains & Gains Mark Stanislav , Kelby Ludwig Software security maturity is often diluted down to the OWASP Top 10, leaving organizations with ...
Infrastructure Based Security Chris Barnes As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the ...
Change is Simply an Act of Survival: Predicting the future while shackled to the past Bil Harmer This presentation will briefly review the history and development of the corporate network, it’s interaction ...
Skiptracing for fun and profit Rhett Greenhagen This talk will be somewhat humorous, taking real world examples from my work that are ...
How do you POC? Are you really testing a product? Ken Donze We have all read the reports from the successful breaches from Target to Equifax. Have ...
Critical Incident: Surviving my first layoff by applying BCP/DRP Principles Tom Mead The day before my 30th birthday will be forever ingrained in my mind. It was ...
Dissecting Destructive Malware and Recovering from CatastropheDissecting Destructive Malware and Recovering from Catastrophe Bryan York An in depth look into the NotPetya malware outbreak from a boots-on-ground incident responder with ...
Pen Test War Stories – Why my job is so easy, and how you can make it harder Aaron Herden As a Pen Tester and security professional, I get it. You are faced with a ...
Staring into the Abyss: The Dark Side of Security and Professional Intelligence Richard Thieme Nothing is harder to see than things we believe so deeply we don’t even see ...
Skills For A Red-Teamer Tim Roberts , Brent White Want to incorporate hybrid security assessments into your testing methodology? What does going above and ...
Learning from InfoSec Fails Derek Milroy This presentation will highlight some of the reasons why InfoSec either fails or is perceived ...
Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis Deral Heiland The “Internet of Things” (IoT) is taking over our lives, so we should be constantly ...
Eye on the Prize – a Proposal for Legalizing Hacking Back Adam Hogan The myriad objections to legalizing hacking back all agree that an undisciplined horde of skids ...
Defending The De-funded Keith Wilson There is a cyber poverty mark that plagues the Cyber Security Industry. The global 2000 ...
You Got Your SQL Attacks In My Honeypot Andrew Brandt Among the many automated attacks that target the honeypots hosted on my lab network, one ...
Hidden Treasure: Detecting Intrusions with ETW Zac Brown Today, defenders consume the Windows Event Log to detect intrusions. While useful, audit logs don’t ...
A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense) Ernest Wong Since the origins of the Republic, the American people have shown a strong speculative knack ...
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF) Jerod Brennen With global information security spending rapidly approaching $100 billion, you’d think we’d have a pretty ...
An Employee, their Laptop and a Hacker walk into a Bar Shannon Fritz If one of your company laptops were lost, what might an attacker be able to ...
Threat Intelligence: Zero to Basics in presentation Chris rattis J This is an audience participation talk, on going from having DFIR with no Threat Intelligence ...
National Guard for Cyber? How about a Volunteer Cyber Department? Ray Davidson Increased public awareness of “hacking” activities has led to an increase in calls for organized ...
ProbeSpy: Tracking your past, predicting your future Stumblebot As infosec enthusiasts and professionals, may of us are acutely aware that our devices may ...
Real-World Red Teaming Spartan Anyone who has been doing pentesting for any length of time knows that there’s a ...