CypherCon3.0 2018 April 12, 2018 to April 12, 2018, Milwaukee, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hack Dumberly Not Smarterer Tim Medin Tim Medin discuss the dumbest red team tricks and hacks encountered over the years. We ...
KEYNOTE: Hacking, Phreaking, and Juvenile Delinquency Joe ( Kingpin ) Grand In a time when tinkering with technology was a guarantee for ridicule and torment, a ...
Cypher Village Contest Springboard David "heal" Schwartzberg N/A
Crypt-Oh No! Zach Grace The security community hasn’t done a great job at making it easy for developers to ...
An Interdisciplinary View of Risk: Applications for Security Susan j. Lincke Risk is important to cybersecurity professionals to justify security controls, to engineers during therequirements phase ...
Developers, developers, developers. When DevOps Fails to secure. David "videoman" Bryan In the last year, I’ve found some pretty stupid security mistakes. Blatantly overlooked controls, or ...
What the Fungi!? Mushroom Health Hacks & How to grow your own Nootropics Eric Zimmermann Big time farmers are getting rich off fungi –Ripping off consumers and controlling the supply ...
Attacking wireless devices with SDR Caleb Madrigal In this talk, we’ll be exploring how wireless communication works. We’ll capture digital data live ...
Forensics When You’re Broke Phil Cochran Exploring the forensic methodology and tasks using free open source software. We won’t be focusing ...
Hacking Academia Anita N Disciplines such as genetics and chemistry have a long history of discoveries that were initially ...
Embedding Security Mike “shecky” Kavka Sequestered, Cordoned Off, Separated, even Out of Touch. These words have been used by plenty ...
Text Mining: Reading Between The Lines John Platais Ever hear the phrase, “Read between the lines?” This usually refers to one’s ability to ...
Security Orchestration, Automation and Response (SOAR): Operating at Attacker Speed Brian Genz , Jason Lange , And Ben Zimmerman We face a shortage of qualified information security professionals, a high volume of security alerts, ...
Developer Friendly Cryptography Brice Williams Software developers often make mistakes when using cryptography in applications, which tends to result in ...
SAEDY: Subversion and Espionage Directed Against You Judy Towers “Frequently, people who go along a treasonous path do not know they are on a ...
Alice in ICSland Lesley Carhart , Mark Stacey From Crash Override to TRISIS, the past decade has made it clear that the threat ...
How to “theoretically” Kill a Continent Michelle​ Meas SARS, H1N1, MRSA, Zika, Ebola. The human body is terrifyingly vulnerable. With the rise of ...
KEYNOTE: Hacking a Better Tomorrow Ben Heck N/A
Spy Ken Grigas N/A
Hack in the day Brad Swanson This talk will be about hacking/phreaking in the late 80’s, early 90’s, and what the ...
Handshakes and Hashes, plucking passwords from thin air. Robert Reif , Shannon Fritz New developments in Hashcat have brought some new WiFi attack techniques to light. We’ve taken ...