AnyconAlbany 2018 Aug. 24, 2018 to Aug. 25, 2018, Albany, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Deborah A. Snyder , Anne Marie Zettlemoyer N/A
Update from the Trenches: Top 10 Findings From Actual Web Application Testing Sean Murray This talk will focus on the top 10 findings NYSTEC has seen from security testing ...
CPR for EMR - Tearing apart electronic medical records systems Alex Ivanov Medical records systems present a large threat surface that may expose sensitive patient data. Alarmingly, ...
It's the Little Things Ben Sadeghipour Reconnaissance plays a huge role in finding [high-level and critical bugs] efficiently. While there are ...
Map the Webapp (with Burp Suite) Chad Furman Interested in a brief 30 minute overview of how to map a website attack surface ...
IP You P, We All P on UPnP Cory Kujawski Never fear, I is here. Enter a nation state worthy cyber war weapon. There is ...
Navigating SEAndroid Trust Relationships – Exploitation Techniques for Modern Android Devices Jake Valletta Over the past five years, the security model of modern Android devices (particularly Marshmallow and ...
The Exploit Factory: Building a home exploit mining cluster. John Dunlap The field of smart fuzzing has opened up serious bug hunting to a whole new ...
Security Tool Misconfiguration and Abuse Thomas Richards As any security program matures, it will use tools and techniques to automate processes to ...
Learn How to Expect the Unexpected: Unusual & Unexpected Findings in Incident Response Adam Dean The pace of data-breaches has reached epic proportions. Organizations large and small, in every industry ...
Performing Effective Risk Assessments; Dos and Don'ts Dan Didier In today’s risky environment, it’s not if, but when. At some point, your organization will ...
Defeating ERE's and APT's with AI & Blockchain Jason Baczynski How the Common Vulnerability Scoring System (CVSS) and vulnerability prioritization could have helped Equifax and ...
Hacking tools to strengthen cyber security program. Patrick Matthews This talks focus is about penetration tools that can be use by IT Managers or ...
[Insert Sun Tzu Quote]: Creating an Offense-informed Cybersecurity Program Phillipe Langlois Often times we as defenders seem to focus too much on the individual pieces of ...
Catch Me if You Can - Cybersecurity and Human Nature Shikole Struber Former Equifax CEO Richard Smith testified to Congress that the security failure causing the 2017 ...
Security Issues with Personal Medical Devices Todd Warner Personal medical devices (PMDs) – which can be implanted or wearable – are complex devices ...
Social Media Security Policies, the Art of Herding Cats Chaim Sanders With billions of users logging into social media networks, it’s no surprise that most organizations ...
Mind the Gap: How Can We Find 3.5 Million Cybersecurity Professionals by 2021? Ryan Spelman , Jim Niedermeier , Ethan Sprissler By 2021, the world will face a shortage of 3.5 million cybersecurity professionals. This shortage ...
A Day in the Life of a Cybersecurity Expert Valecia Stocchetti , Christopher Satanek , Derek Gerhard Have you ever wondered what it takes to be a cybersecurity expert? To do what ...
US & EU Legal updates: Keeping up to date with Privacy, Security and Regulatory Requirements Alexander Muentz We're seeing a lot of changes in privacy law and security regulations in both the ...
West Point Cybersecurity Cadet Capstone Projects: A Beginners' Guide to Teaching and Learning about Cybersecurity Ernest Wong As part of their senior year capstone engineering experience at the United States Military Academy, ...
The Hacker as an Artist Gotham Sharma Contrary to what the media will have you believe, hackers aren't criminals: they're artists. Most ...
Security Analytics with Elastic Michael “drbearsec” Smith A look at a the set of X-Pack Machine Learning Recipes as well as a ...
Building Cyber Armies at Scale: Methods and Means for Advancing Security Education Patrick Gaasedelen While nations quietly wage war over the internet, the number of qualified attackers (and defenders!) ...
An Analysis of Cybersecurity Educational Standards Rob Olson No one doubts that cybersecurity has become an enormously important discipline and there is a ...
So you think you are a hacker, what makes you a hacker? Steve Thomas A talk focusing on what constitutes someone who considers themselves a hacker. This will include ...