ShellCon.io 2018 Sept. 21, 2018 to Sept. 22, 2018, San Pedro, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - DIY Blue Teaming Vyrus "White hat", "black hat", "corporate", "criminal", no matter the context, "red" or offensive security practitioners ...
Building Identity for an Open Perimeter Tejas Sharamshi Netflix is a 100% cloud first company. The traditional corporate network security perimeter no longer ...
We detected a severe vulnerability, why is nobody listening? Julia Albright Have you ever wondered why one of your high-priority vulnerabilities got rejected or delayed even ...
Breaking LTE on Layer 1, 2, and 3 Mattias Huber This talk will be a general overview of the known attacks on the LTE cellular ...
Exploiting Vulnerabilities Through Proper Reconnaissance Ben Sadeghipour Reconnaissance plays a huge role while hacking. While there are 100s of different tools available ...
Purple Team: Exposed Mary Sawyer Are you looking to rapidly improve your security posture or train a new member of ...
Shells on Cells Tj Mcclerain For my talk I'll be going into how to setup a Raspberry Pi Zero W ...
How the hell does Monero work? Ken Scott Monero is a privacy focused cryptocurrency that uses 3 distinct cryptography techniques to provide user ...
The Beginner's Guide to ICS: How to Never Sleep Soundly Again Daniel Bougere Are you tired of missing the Modbus? Do you think DALI is a weird artist? ...
Where do I start? The first 365 days of building a security program Hudson Bush Scenario: You've been put in charge of InfoSec for a business with no existing security ...
Automated Bug Finding in Practice Clint Gibler , Daniel Defreez Over the past decade there have been a number of automatic and semi-automatic approaches used ...
How NOT to suck at Vulnerability Management Plug , Chris Halbersma In the current cyber landscape several vulnerabilities are discovered every day. The volume and multiple ...
A Day in the Life of a CISO Richard Greenberg The CISO's role has been evolving over the years. It is moving away from so ...
Python for OSINT Tooling Emily Chance The practice of Open Source Intelligence (OSINT) gathering can be tedious when done manually. Fortunately, ...
Cloud Security on the Dollar Menu Michael Wylie , Arnel Manalo Are we in the cloud yet? Yes. It's not raining yet, but it will soon. ...
Intro to Python for Security Professionals Ravin Kumar (canyon289) Python is a fantastic programming language that is extensively used in many domains and widely ...
Building and Breaking Blockchains Merlin Corey Learn what it takes to create a basic blockchain, explore ways to break it, and ...
Tracy: Because Tracing User Input Through JavaScript is for Tools Michael L. Roberts , Jake Heath Being able to comprehend causal relationships between sources of user input and their corresponding output ...
Do you wanna build a challenge? We can CTF today! Jason Ritzke While there are many ways to solidify a role in the community, without a doubt ...
Efforts in Scaling Application Security Programs Eric Fay With organizational success comes the exciting period of ever-increasing scale and scope. This talk will ...
Open-Source Facial Recognition and Mass Surveillance Ian O'niell Facial recognition and biometric data systems are being integrated worldwide on a massive scale. While ...