SAINTCONUtah 2018 Sept. 25, 2018 to Sept. 28, 2018, Provo, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Conference Opener introduction of the MC Troy Jessup N/A
Keynote: Using Neuroscience to improve the usability of Information Security Bonnie Anderson N/A
Keynote: Freeing the Mind: Security and power in a world without walls Richard Thieme We will explore the relationship of context to content in a world transformed by new ...
Keynote: Teach them to Hack Zane Durkin , Preston Pace , Tanner Purves N/A
Keynote: Own the Con Jeremy Cox N/A
Leadership Discussion and Q&A with Keynote Presenters Hands-on Web Hacking WMImplant and A Guide for using WMI Offensively Jim Stewart N/A
Blue cloud of Death: Red Teaming Azure The Theory and Practice of Building A Privacy Token Thinking like a Hacker Bryce Kunz On-demand IT services are being publicized as the new normal, but often times these services ...
The Theory and Practice of Building a Privacy Token Forrest Monsivais The various Ministries-of-Positive-Nouns and their Large Relatives are engaging in illegal backroom exchanges of your ...
Thinking like a Hacker James Pope N/A
Latest features of Kismet Mike Spicer N/A
ATM Jackpotting Vincent Kenney ATM Jackpotting isn't something new, as security researcher Barnaby Jack famously demonstrated jackpotting an ATM ...
How Many Licks Does it take to get to the Center of Security Awareness? Paige Ishii You have been tasked with building a security awareness program for your organization. Where do ...
Beginning Hackers Challenge Josh Galvez N/A
PRTG hacking Rd Van Noy N/A
Inside the Defcon 26 Mad Max Valhalla Self Driving Car Challenge David Owens N/A
Security in AWS, Azure, Google, Oracle and IBM is cloudy Paul Kraus Instrumenting cloud for security issues with cloud first strategy - ways to instrument the cloud ...
Lock Picking 101 Colin Jackson N/A
How to secure your own devices from external threats Troy Jessup N/A
Hey, You Got Your SQL In My Honeypot! Andrew Brandt Beginning last year, a honeypot I run on the DMZ of my lab network started ...
Privacy - Security's Bedfellow: A look at the upcoming changes to data standards. Sean Mchenry Where is the line between convenience and intrusion? What is your expectation of privacy? There ...
Intro to Pentesting: How you can get the career you want (and break stuff) Erich Ficker We will discuss different career paths that ultimately lead toward becoming a pentester and beyond. ...
Bring Your Own Cypher Zach Walton Learn the basics of rolling your own crypto. State of Security in UtahPhil BatesN/AN/AThe state ...
Making your house work for you Spencer Brown We will be diving into home automation with Samsung's Smartthings
Legal Issues and Data Security Discussion (USBE) Greg Cox , Ehitney Phillips , David Sallay Legislatures are increasingly trying to grapple with data security, and we’re even seeing tech companies ...
Introducing Effective Controls in your Environment with Windows Defender Application Control Chris Truncer Off-the-shelf malware, custom developed malware, or just living off the land are ways to attackers ...
Quantum Cryptology Armageddon Chris Mather The quantum computing era is upon us. So, what does that mean for the cybersecurity ...
Network Security 101 David Thurm Covering the basics and low hanging fruit for network security.
Docker Security Lois Garcia We will discuss a reference architecture, with some extra context on additional options.
Dragnet – Your Social Engineering Sidekick Truman Kain First, Dragnet collects dozens of OSINT data points on past and present social engineering targets. ...
To Be FAIR About It - Using FAIR and other risk models to prioritize your security initiatives Thomas Elegante If you are like the many organizations out there, you have a large number of ...
Secure Network Segmentation Jeremy Cox In this session we will discuss the importance of network segmentation, how to plan for ...
Attend Track Two Talk - Lesson Learned: Top 10 critical pentest findings Troy Jessup N/A
Lesson Learned: Top 10 critical pentest findings Troy Jessup N/A
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests Tomasz Tuzel Over the last decade we have seen a rapid rise in virtualization-based tools in which ...
Cross Site Request Forgery 101 Aaron Bishop An introduction to Cross Site Request Forgery, why it is an issue and why you ...
Wireshark: A Beginners Introduction Kyle Feuz Have you heard your friends or colleagues talk about "sniffing" network traffic? Do you want ...
Path and Future of Content Filtering (issues, concerns, and next steps) Jeremy Cox As the Internet continues to be filled with content that is inappropriate for work and ...
Human is the weakest link in cyber security April Powers N/A
Introduction to Shellcode Lance Buttars In this presentation, we will go over the basics of writing shellcode, focusing on writing ...
Volunteerism in InfoSec Panel Discussion Marv White This panel will discuss volunteerism within infosec and answer any questions you have.
Communication in a Breach Rich Finlinson Communication in a Breach will overview crisis communication planning for data breaches and other incidents. ...
Amygdala Lowjacking - 7 Real Techniques to Join the Resistance Seth Johnson Social engineering is a real threat to each of us and our organizations and groups. ...
How to Solve Kryptos "Incorrectly" Daniel Taualii I have worked on cracking the message on the Kryptos statue at the CIA headquarters. ...
Everything you need to know about TLS1.3 Scot Mccombs Panel and group discussion centered around the steps that each organization is taking to systematically ...
What we are doing with security in general to protect us Gary Sockrider , Dave Dubois , Douglas Santos This panel of security service providers will discuss the hot new intel from their threat ...
Do you see what we see? The latest & greatest from the Threat Intelligence Labs Gary Sockrider , Dave Dubois , Douglas Santos This panel of security service providers will discuss the hot new intel from their threat ...
Mentoring the Next Generation Kevin Howard Information Security has a near 0% unemployment rate. We are increasing the demand while reducing ...
Hashcat 101 Andrew Goble Whether you just want to participate in the password cracking challenge or are looking to ...
KiCAD artwork Michael Whiteley Artwork in KiCad. How to do it easily and avoid common pitfalls.
Legal Issues and Data Security Discussion (USBE) -• Inappropriate use of technology in schools • Employee privacy (or lack of it, posting on social media, etc.) Whitney Phillips , Greg Cox , David Sallay In this presentation, we will review federal and state laws that address the appropriate use ...
Packet Capture Community N/a N/A
KiCAD artwork Leverage the Dark Side of your Network Mike Julander N/A
The Badge Talk Michael Whiteley , Mike Weaver N/A
The OWASP Top 10 in Review (New and Improved in 2017) Sean Jackson N/A
Leverage the Dark Side of your Network Jeremy Cox You are constantly being scanned, every single day. It's often fully automated and never sleeps. ...
Discussion on Handling Policy and Rules for the Board (FERPA, COPA, HIPPA, PCA, CIPA, State Law, Etc.) Scot Mccombs Each Federal and State law governing the protection of student and employee information will be ...
Pwning on the Pixelbook Nathan Smith A look at Project Crostini and how to turn your chrome OS laptop into a ...
Lets Play with some WiFi Johnathan Smith N/A
Using metadata and telemetry to detect malware in encrypted traffic Bill Clay Iii With the upcoming ratification of TLS 1.3, network based detection of malware within encrypted tunnels ...
A Hacker's First Look at Your Network: Port Scanning Spencer Heywood Port scanning is a simple way to find vulnerable targets within a network. Learn how ...
Alexa: take over my job; a red teamer's dream in action David Cross A live demo of HackerMode 2 for Amazon Alexa an Open Source Kali-integrated skill that ...
Bluetooth: From basics to vulnerabilities Corban Villa In this presentation, we will go over the basics of bluetooth, with a focus on ...
Are Security Certifications Worth the Effort? Alan Jex Define your role as a penetration tester, security architect, or cloud/privacy expert and learn what ...
Cyber Breach Insurance Claim Trends Mark Petersen N/A
SamSam: The (Almost) Six Million Dollar Malware Andrew Brandt When news first started to break about a ransomware infection named SamSam, it focused on ...
THE INDUSTRIALIZATION OF RED AND BLUE TEAMING Brian Contos By leveraging security instrumentation platforms, you are bringing together red and blue teaming initiatives with ...
IPv6: Is there an open door in your network? Chris Larsen IPv6 support is built in throughout the Internet now, so there's not as much talk ...
Password Standards. Yes, they have changed again. Jeremy Cox In this presentation will will discuss the latest password recommendations from NIST. Surprise, they changed ...
CoSN and Other Security Resources for Administrators Cory Stokes CoSN, a national organization that supports district and school educational technology leaders, has many resources ...
Oscilloscopes and you Scotty Come learn the basics of oscilloscopes
CryptoMining has replaced Ransomware James Young Locky is dead, and Coinhive has replaced it. Here's a look at the types of ...
Icebreaker.py - Gaining a foothold in Active Directory in one command Dan Mcinerney Icebreaker is a tool for when you have a compromised box on an internal network, ...
Mobile Device Management (MDM) in Classroom and with Take-Home Devices Jeff Egly Mobile Device Management (MDM) - School owned devices inside and outside of the classroom.Panel discussion ...
Dr. StrangeTalk, or How I Learned to Stop Worrying and Present at the Con Colin Smith At a recent conference, a few of us were discussing how there are a ton ...
Year of the #WiFiCactus Mike Spicer The #WiFiCactus is a wireless monitoring tool that is capable of listening to 50+ channels ...
SAINTCON Radio Jeremy Cox N/A
$8 rubber ducky Mav N/A
PCI Gotchas!: Deciphering PCI Nuances Jonathan M. Smith At face value, the PCI Data Security Standard seems very black-and-white. But as anyone involved ...
Following the Bread Crumbs... How an Investigation Should Change Our Mind Set. Samuel Kimmons Does this alert warrant an investigation? What may seem like benign or normal traffic can ...
Anatomy of a Business Email Compromise (BEC) and tools for Incident Response Aaron Sherman Business Email Compromises (BEC) continue to plague organizations world-wide, inflicting catastrophic, financial damages. This presentation ...
SAINTCON Panel... We really just wanted to play video games Troy Jessup , Jeremy Cox , Seth Johnson , Kevin Howard N/A
Social Engineering: How to steal a laptop and have lunch while at it! Shaunak Shah Information security is fast growing discipline. However, the weakest link still remains the human element. ...
Objective #1: Don't Be Low-Hanging Fruit Chase Palmer For those new to cyber security, is easy to get into the mindset that all ...
Building A Security Program for Enterprise Nathan Cooper End-users care that your site looks nice, and that your name hasn't recently been in ...
Hackers Challenge Shakedown Josh Galvez We will walkthrough several challenges and answer questions about the stumpers and more complex Hackers ...
Tactical Endpoint Monitoring 101 Chris Tidwell The adversary is actively targeting end-users and endpoints and they are getting quite proficient at ...