sourceseattle 2017 Oct. 4, 2017 to Oct. 5, 2017, seattle,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security fears: When the machines eat the ladder and stilts won’t reach the cloud Gunter Ollmann For today’s security professional there are two truly decisive technologies rewriting career paths. Advances in ...
“Security Leadership Lessons from the Dark Side” Adam Shostack Description: Leading a security program is hard. Fortunately, we can learn a great deal from ...
Attack and Defense on Linux: Mr Robot Edition Jay Beale In this presentation, Jay Beale will demonstrate how an attacker gains access on a server ...
Developing a Threat Modeling Mindset Robert Hurlbut Nearly every day we hear about another compromise of a system that involves a breakdown ...
Twitelligence, an open-sourced threat intelligence platform with customizable twitter feeds powered by big data and machine learning Xiaoning Li , Li Shen , Yanhui Zhao Social media as sources of information are playing a significant role delivering real-time information to ...
Your Security X-Ray: A Systematic Approach of Finding Exploitable Spots with Big Data in Linux Ya Ou , Ke Sun Vulnerabilities take many forms in security. It can be an unprotected return address, a writable ...
Scaling Security With Kubernetes Jack Mannino Kubernetes allows you to build highly scalable containerized services, scale them and deploy them wherever ...
Prevention is good, but detection is better William Lidster In a world where security professionals warn that it is not a matter of "if", ...
Platform Firmware Defense for Blue Teams Lee Fisher For attackers, "Firmware is the new Software". However, defenders, for the most part, have not ...
State of DDoS and Defensive Clouds Ian Gorrie The State of DDoS Denial of service attacks are nothing new, but the perfect storm ...
New Technology, Same Old Vulnerabilities Rob Cheyne Technology often creates new, exciting and more efficient ways of doing business. Adding efficiency and ...
Threat Modeling Robert Hurlbut Threat modeling is a way of thinking about what could go wrong and how to ...
Communications Matters! Improve your Presentations and Public Speaking and improve your effectiveness Rob Cheyne Many people, when polled, say that they would prefer death over public speaking. Others enthusiastically ...
Minimum Viable Risk Management Program Rachael Lininger Most information risk management programs are cumbersome and expensive, requiring expertise and time that smaller ...