ForenSecure 2012 April 19, 2012 to April 20, 2012, Wheaton, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SAML-based Federation Kiran Ramineni N/A Security
Top 5 Legal Tips for IT Professionals Daliah Saper N/A Security
Cloud Forensics Shawn Davis , Terence Fernandes , Kenny Warren N/A
Cyber Security: A New Frontier for Cross-Jurisdiction Alliances Rafael Diaz N/A Security
The Enron Analysis Steve Pieczko N/A Security
MP3 Steganalysis Ben Khodja , Erfan Setork , Kbrom Tewoldu , Zach Wagner N/A
Practical and Cost-Effective USB Write Blocking Philip Polstra N/A Security
How Do You Secure the World? Compliance and Security Antonio Hylton N/A Security
Strict Transport Security Joshua Hensley , Inaae Kim , Marius Maries N/A
Virtualization and Cloud as Disaster Recovery Solutions Ray Trygstad N/A Security
Mobile Devices: Security Through Monitoring and Control Adam Johnson N/A Security
Hard Drive Steganography Joshua Kenward , Michael Mohring , Anthony Tiritilli N/A
Securing The Future: Complexity and Simplicity Dan Kaminsky N/A Security
Malware Incident Response and Planning Fayyaz Rajpari N/A Security
Buckle Up That Data! Driving Security in an Auto Manufacturing Environment Toyota Motor Manufacturing & Engineering North America Randy Mefford N/A Security
Intro to iOS Device Acquisition and Analysis Katie Strzempka N/A Security
Software Requirements & Design with UML Extensions for Security Susan j. Lincke N/A Security
The Role of DRM in Creating Bad Security Policy Michael Verhulst N/A Security
iOS Forensics with Open Source Tools Katie Strzempka N/A Security
FBI and Cyber Crime John Pascoe , Eric Brelsford N/A
Public Policy and the Internet Dan Kaminsky , Ray Trygstad , Dan Graham , Bill Lidinsky N/A
An IT Professionals Guide to Using Data Analytics to Prevent and Detect Fraud Sandra Rolnicki N/A Security
Windows 8: Reducing the Attack Footprint at Boot, at Runtime, and at Rest Steven Murawski N/A Security
Non-Traditional Intrusion Detection for Non-Traditional Intrusions Tom Liston N/A Security
Android and iOS Devices with MPE+ Mark Stringer N/A Security
Password Recovery: Minimizing Support Securely John Hayward N/A Security
Buckle Up That Data! Driving Security in an Toyota Motor Manufacturing & Engineering North America Randy Mefford N/A Security