RVASECRichmond 2018 June 7, 2018 to June 7, 2018, Richmond, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Katie Moussouris N/A
Demystifying Payments: Payment Technologies and Security Risks Tim Yunusov , Leigh-anne Galloway Have you ever wanted to learn how payment technologies work? What happens when you pay ...
Bypassing ISP and Enterprise Anti-DDoS with 90's technology Dennis Rand Stressers/Booter services is providing "DDoS as A Service" and they are getting more and more ...
GDPR and You Bob Siegel The General Data Protection Regulation is the new law of the land for protecting personal ...
Container Security: Vulnerabilities, Exploits and Defense Elissa Shevinsky Whether it's an unsecured Kubernetes configuration or the Meltdown/Spectre exploits, there is always a way ...
Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel for for Fun and Mostly Profit Mark Arnold The appropriation of intelligence (and/or its art) within the security industry has raised the ire ...
From Web App to ATM: Why the Basics Matter Travis Mccormack This is a technical application security discussion for junior penetration testers or anyone interested in ...
How Do You Measure Expertise? A New Model for Cybersecurity Education Simone Petrella The industry relies upon a strong and knowledgeable talent base to protect both commercial and ...
Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection Mike Hodges Organizational spending on cybersecurity is at an all-time high. From an attacker’s perspective, this means ...
Red Team Apocalypse Beau Bullock , Derek Banks TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the ...
Doxing Phishers: Analyzing Phishing Attacks from Lure to Attribution Vrane Hasshold This presentation will cover the various pieces of intelligence that can be collected from each ...
How to REACT to JavaScript [In]Security Ksenia Peguero According to a StackOverflow survey, JavaScript is the most commonly used programming language on earth. ...
Let’s build an OSS vulnerability management program! Tyler Townes Does your company use Open Source Software (OSS) libraries in the products that it builds? ...
OS X App Whitelisting Without Losing Your Job Chris Czub Application whitelisting: it's easy to say it should be practiced as part of a complete ...
From Grief to Enlightenment: Getting the Executive Support for Information Security Karen L. Cole Most information security professionals got into the field to enjoy the technical challenges of keeping ...
A Game Theoretic Model of Computer Network Exploitation Campaigns Robert Mitchell Increasingly, cyberspace is the battlefield of choice for twenty first century criminal activity and foreign ...
Building a Better Catfish Nathaniel Hirsch Picture this, a Red Team and a Blue Team working together to make the organization ...
Seize and Desist? Criminal Evolution One Year After AlphaBay’s Demise Michael Marriott As we’re approaching the one year anniversary of AlphaBay’s seizure, the talk will demonstrate the ...