LayerOne 2018 May 25, 2018 to May 27, 2018, Los Angeles, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Go Hack Yourself: Moving Beyond Assumption-based Security Michael Sanders You have many security products, probably too many. But you are still not secure because ...
Leeky Onions: Deanonymizing Live Tor Hidden Services Z0rro This talk will demonstrate how administrative slip-ups can result in deanonymization of live tor hidden ...
Adware is just Malware with a Legal Department Amit Serper Adware isn’t a new or an exciting threat. It is often ignored by security professionals ...
Git for Hackers Rtzq0 While a lot of noise has been made about sensitive artifacts being left in git, ...
How to Security Research Without Getting Sucked into a Courtroom Robert Adams The idea for this talk came from several clients asking the same basic legal questions ...
InfoSec Career Panel Sam Bowne , Jack Baker , Geoffrey Janjua , Patrick Albert , Mark Liphardt , Matthew Stits The InfoSec Career Panel is a live Q&A session where audience members can ask questions ...
HTTP2 and You Security Panda Although not commonly known, HTTP2 was first published in May 2015 as an update to ...
Can You Hear Me Now?: Wireless Communication for Pentesters Wasabi Wireless communication is getting cheaper and hobby projects are integrating long range low powered communication ...
From Security to Risk: Shifting the focus and changing the conversation Matthew Stits Security people are often seen as a contradiction in terms. Being both the smartest people ...
Signal Safari: Investigating RF Controls with RTL-SDR Katie Knowles Cranes, trains, building controls, oil rigs, and …ceiling fans? Recent developments have made secure wireless ...
Hack In, Cash Out: Hacking and Securing Payment Technologies Leigh-anne Yunusov Have you ever wanted to learn more about how payments work? Do you want to ...
Data Security: How to avoid an embarrassing breach Matt Hoy This presentation is a discussion about designing your defense strategy based on Data Security models ...