ISSWAustin 2018 April 11, 2018 to April 13, 2018, Austin, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
What do you want to be when you grow up? Damon J Small Many industries have well-defined points of entry and well-understood education and training requirements. Information Security ...
Mettlesploit, a batteries-included, lightweight exploitation toolkit Mettlesploit Mettlesploit is a new exploitation toolkit developed from doing OSCP trainings. It combines payloads, consoles, ...
The SIEMpsons James "iv0ryw0lf” Boyd SIEMs are instrumental in most large organizations. Most cyber defenders are at the mercy of ...
Exploring the Safari: Just-In-Time Exploitation Wanderingglitch The Apple Safari web browser contains a JavaScript engine with a rather simple name — ...
An Auditor and a Security Admin Walk Into a Bar…A Security Humor User Session Meghan Mcgrath This interactive session welcomes security professionals of every kind to stop by and share a ...
Getting Physical Summer Rollin The mantra of any good red teamer is, “hope for the best, but plan for ...
Porn’s Cataskeuastic Effect on Degenerate Hackers Ron Schlecht Platform accessibility, programming frameworks, hardware sprawl, and yes….the porn industry are driving how quickly virtual ...
Grandmothers, Gangsters, Guerrillas and Governments Brian Contos Brian will explore threat actors including insiders, cybercriminals, hacktivists and nation-states. He will dissect how ...
Strengthen Your SecOps Team by Leveraging NeuroDiversity Megan Roddie High productivity, extreme attention to detail, logical/calculated, passionate, and hyper-focused. These are all characteristics considered ...
Mind Games: Exploring Mental Health Through Games Todd Carr Mental health is a serious topic in our community. Many people in the tech industry ...
Someone is Lying to You on the Internet – Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions Leah Figueroa The FCC is trying to ram through anti-net neutrality legislation and are using the submissions ...
Target-based Security Model: Mapping Network Attacks to Security Controls Garett Montgomery Garett will present a categorization of network-based attacks for the purpose of mapping to appropriate ...
Side-Channel Cryptanalysis and the Fourth Amendment Riana Pfefferkorn Encryption shields private information from malicious eavesdroppers. After years of slow adoption, encryption is finally ...