Others

Title Speakers Conference Tags
Pentanews Game Show Alien8 , Astro ( Astro ) Chaos Communication Congress-27 - Berlin, Germany Security Others
Opening Session Dinis Cruz , Carlos Sá da costa , Francisco Cercas , Carlos Serrão , Vicente Aguillera OWASP IBWAS-2010 - Portugal Security Others
The Thing That Should Not Be Bruno Morisson OWASP IBWAS-2010 - Portugal Others Security
2010 And Still Bruteforcing Christian Martorella OWASP IBWAS-2010 - Portugal Security Others
Weighted Deadline Driven Security Aware Scheduling For Real Time Computational Grid Rekha Kashyap OWASP IBWAS-2010 - Portugal Security Others
Neofelis, High-Interaction Honeypot Framework For Mac Os X João Franco OWASP IBWAS-2010 - Portugal Others Security
Welcome Ferdinand Vroom , Martin Knobloch OWASP BeNelux-2010 - Netherlands Security Others
Understanding The Java Serialization Attack Surface Daniel Grzelak KiwiCon-2010 - Wellington, New Zealand Security Others
Operational Security For Hackers Eon KiwiCon-2010 - Wellington, New Zealand Security Others
Full Circle Kiosk Paul Craig KiwiCon-2010 - Wellington, New Zealand Security Others
How Does Your Gut Stack Up? Patrick , Andrew KiwiCon-2010 - Wellington, New Zealand Security Others
Monkeying Around On The Ape Mike Jager KiwiCon-2010 - Wellington, New Zealand Others
Aleatory Persistent Threat Nicolas Waisman KiwiCon-2010 - Wellington, New Zealand Others
Unsolvable Problems In Computer Security Peter Gutmann KiwiCon-2010 - Wellington, New Zealand Security Others
Weapons Of Mass Storage Destruction Cartel KiwiCon-2010 - Wellington, New Zealand Security Others
Was That A Hacker Wearing A Jacobean Ruff? Fosm KiwiCon-2010 - Wellington, New Zealand Security Others
A Crumple Zone For Service Oriented Architectures Andrew Gronosky OWASP BASC-2010 - Boston, USA Mobile Security Others Deep Knowledge
Business Logic Attacks - Bats And Blbs Paul Schofield OWASP BASC-2010 - Boston, USA Security Others Analysis
Owasp Basics 1 And 2 Rob Cheyne OWASP BASC-2010 - Boston, USA Security Web Others Deep Knowledge Analysis
Coffee Shop Warefare:Protecting Yourself In Dark Territory Anonymous Speaker OWASP BASC-2010 - Boston, USA Mobile Security Wireless Others
Web Applications And Data Tokenization Kenny Smith OWASP BASC-2010 - Boston, USA Security Web Others Application Security Compliance
Wild Wild Wild Security Planet Manoranjan Paul OWASP AppSec Brasil-2010 - Brazil Security Others
Stux Between A Rock And A Hard Place Jeff Williams PacSec-2010 - Tokyo, Japan Security Others
Exploring The X64 Junichi Murakami PacSec-2010 - Tokyo, Japan Security Others Application Security
Secure Code Review: Enterprise Metrics Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Others Security
Security Risk And The Software Supply Chain Karen Mercedes Goertzel OWASP Appsec-2010 - Washington DC, USA Security Others Risk
Owasp Modsecurity Core Rule Set Ryan Barnett OWASP Appsec-2010 - Washington DC, USA Security Others
Emerging Security Threats Simple Nomad Security B-Sides DFW-2010 - USA Security Others Deep Knowledge
Infosec Sheepdogs: Creating An Abstraction/Translation Nick Selby Security B-Sides DFW-2010 - USA Security Others Deep Knowledge Community Law Enforcement
The Mistakes Qsas Make Branden R. Williams Security B-Sides DFW-2010 - USA Security Others Deep Knowledge
The Code Your Code Could Smell Like Wendy Nather Security B-Sides DFW-2010 - USA Security Others
Open-Source Cryptographic Libraries And Embedded Platforms Pascal Junod hashdays-2010 - Lucerne, Switzerland Security Others Cryptography
Osmocombb: A Tool For Gsm Protocol Level Security Analysis Of Gsm Networks Harald Welte hashdays-2010 - Lucerne, Switzerland Mobile Security Security Others
Frozencache Jürgen Pabel hashdays-2010 - Lucerne, Switzerland Security Others Deep Knowledge
7 Mistakes Made By Qsa'S Branden R. Williams House Con-2010 - USA Security Others
Security Practitioners: Winning Friends And Influencing People Josh Sokol House Con-2010 - USA Security Others Deep Knowledge
Lunatic Fringe - Stories From The Leading Edge Of Web Application Security Bill Pennington House Con-2010 - USA Security Others Deep Knowledge
Top 5 Information Security Threats Paulwilliams Williams House Con-2010 - USA Others Deep Knowledge
Website Security Statistics (2010) - Industry Bechmarks Jeremiah Grossman House Con-2010 - USA Security Others Deep Knowledge
Revolution Or Evolution: Information Security 2020 William BEER SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Applied Threat Modeling Allison Miller SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Security Sucks Chris Brown SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Implementing A Csirt Brian Honan SOURCE Barcelona-2010 - Barcelona, Spain Security Others Community
Erp Security: Myths, Problems, Solutions Alexander mikhailovich Polyakov SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Security In The Sdlc: It Doesn'T Have To Be Painful! Matt Bartoldus SOURCE Barcelona-2010 - Barcelona, Spain Security Others Deep Knowledge
Passwords In Corporate Networks Carric Dooley , Simon Roses Femerling SOURCE Barcelona-2010 - Barcelona, Spain Security Others Firewall Exploitation
Jackpotting Automated Teller Machines Barnaby Jack SOURCE Barcelona-2010 - Barcelona, Spain Security Others Hardware Reverse Engineering Hardware General
Security In Agile Plc - Practical Navigational Aid For Speed Boats Vishal Asthana SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Building Bridges: Forcing Hackers And Business To Hug It Out Chris Nickerson , Andrew Hay SOURCE Barcelona-2010 - Barcelona, Spain Security Others Business
10 Things Yore Doing Wrong With Siem Wim Remes SOURCE Barcelona-2010 - Barcelona, Spain Security Infrastructure Others Business
If Black Hats Always Win, Why Is Albert Gonzalez In Prison? Bruno Oliveira , Jibran Ilyas SOURCE Barcelona-2010 - Barcelona, Spain Security Others Community
Carders.Cc, The Rise And Fall Of An Underground Forum David Barroso , Vicente Diaz SOURCE Barcelona-2010 - Barcelona, Spain Security Others Deep Knowledge
Everything Useful I Learned About Software Security, I Learned At Microsoft! Michael Howard LASCON-2010 - Austin, USA Security Others Deep Knowledge Development
Owasp Top 10: What Is It All About? Dean Bushmiller LASCON-2010 - Austin, USA Security Others Deep Knowledge
Automating Web Testing Beyond Owasp Webscarab Using Python Brad Causey LASCON-2010 - Austin, USA Development Others
Why The Cloud Is More Secure Than Your Existing Systems Ernest Mueller LASCON-2010 - Austin, USA Security Others Cloud
Hazards Of Duke / Java Sandbox (In)Security Sami Koivu t2-2010 - Helsinki, Finland Security Others
How To Notice When You Are Re-Owned Halvar Flake t2-2010 - Helsinki, Finland Security Others
The Threat In Your Pocket? Nils t2-2010 - Helsinki, Finland Security Others
Hacking Femtocells Kevin Redon , Ravishankar Borgaonkar t2-2010 - Helsinki, Finland Security Others
Solving The T2'10 Challenge Timo Hirvonen t2-2010 - Helsinki, Finland Security Others
Ruby On Rails Security: Understanding The Rails Developers Mind-Set Matti Paksula t2-2010 - Helsinki, Finland Security Others
Google Hacking Jesus Alvarez Cedillo BugCon-2010 - Mexico Security Web Others
Hacking Without Being Caught Big Companies Joseph Mccray BugCon-2010 - Mexico Others Security
The Role Of Security Expert Cesar Peregrino BugCon-2010 - Mexico Security Others
Hacking & Beers Anonymous Speaker BugCon-2010 - Mexico Security Others
Discrete Alogrithm Problem On Elliptic Curves Eduardo Ruiz Duarte BugCon-2010 - Mexico Security Others
Nmap Script Engine Hugo Gonzalez BugCon-2010 - Mexico Security Others Automation
Electronic Voting System Anonymous Speaker BugCon-2010 - Mexico Security Others Legal
Virtualization Security Araico Sandino Sanchez BugCon-2010 - Mexico Security Web Others
Solving Common Mistakes On Wepapps José Carlos Nieto BugCon-2010 - Mexico Security Web Others Application Security
Creating A Livecd For Security Porpouses Mauro Parra BugCon-2010 - Mexico Security Others
Your Worst Enemy Araico Sandino Sanchez BugCon-2010 - Mexico Security Others
The (True) Culture Hacker Gustavo Barrón BugCon-2010 - Mexico Security Others
Opening Statement: Welcome To Owasp China Summit 2010 Tom Brennan OWASP China-2010 - China Security Others
Owasp Top 10 Weilin Zhong OWASP China-2010 - China Security Others
Current State Of Adoption Owasp Tom Brennan OWASP Appsec-2010 - Germany Security Others
Owasp Top 10, The Fourth: What Now? Dirk Wetter OWASP Appsec-2010 - Germany Security Others Community
Curing Of Sap Http And Web Services Frederik Weidemann OWASP Appsec-2010 - Germany Security Web Others Business Browser
Opening Remarks Sebastian M. Convertino BlueHat-2010 - Redmond, USA Others
Blue Screen Of Death Is Dead Matthieu Suiche BlueHat-2010 - Redmond, USA Security Others
Opening Remarks Mike Howard BlueHat-2010 - Redmond, USA Others
Building A Sec Community Ollie Whitehouse ZaCon-2 - Johannesburg, South Africa Security Others Deep Knowledge Community
Something About Tea Roelof ( RT ) Temmingh ZaCon-2 - Johannesburg, South Africa Security Others Deep Knowledge
Data Loss Prevention Stephen Kreusch ZaCon-2 - Johannesburg, South Africa Security Others Intrusion Detection
Fig Leaf Security Haroon Meer ZaCon-2 - Johannesburg, South Africa Security Others Deep Knowledge Risk
The Wombat Project: Recent Developments In Internet Threats Analysis Andreas Moser , Olivier Thonnard BruCON-2010 - Brussels, Belgium Security Web Others
Lightning Talks Day 2 Craig Balding BruCON-2010 - Brussels, Belgium Others
Top 5 Ways To Steal A Company Chris Nickerson BruCON-2010 - Brussels, Belgium Security Others Deep Knowledge Exploitation
Head Hacking – The Magic Of Suggestion And Perception Dale Pearson BruCON-2010 - Brussels, Belgium Others Deep Knowledge Social Engineering
Malicious Pdf Analysis Didier Stevens BruCON-2010 - Brussels, Belgium Security Others Analysis
Introduction In Assessing And Exploiting Web Applications With Samurai-Wtf Livecd Justin Searle BruCON-2010 - Brussels, Belgium Security Others Application Security
Powerpoint Karaoke Frank Breedijk BruCON-2010 - Brussels, Belgium Others
Chairman’S Welcome And Opening Speech Geoff Harris CyberSec -2010 - Brussels, Belgium Security Others
How The Uk’S Office Of Cyber Security (Ocs) Is Ensuring A Coherent Response To Cyber Security Graham Wright CyberSec -2010 - Brussels, Belgium Security Web Others Cyberwar
The Danish Perspective: Connecting The Dots Thomas Kristmar CyberSec -2010 - Brussels, Belgium Security Others Cyberwar
Purpose Built Tools For Cyber Security Monitoring Stuart Wilson CyberSec -2010 - Brussels, Belgium Security Others Monitoring
Cert Polska – Working As A National Level Computer Security Incident Response Team (Csirt) Piotr Kijewski CyberSec -2010 - Brussels, Belgium Security Others Deep Knowledge Incident Response Computer Forensics
United Against Cybercrime: The Cybercrime Information Exchange Annemarie Zielstra CyberSec -2010 - Brussels, Belgium Security Others Community
How Public-Private Partnerships Can Stop Cyber Threats From Becoming Reality: Sharing & Layering And Unified Analytic Policies And Practices. Anonymous Speaker CyberSec -2010 - Brussels, Belgium Security Others Community
Cyber Attacks: The Insider Threat Geoff Harris CyberSec -2010 - Brussels, Belgium Security Others Deep Knowledge
How The Communications Sector Supports Cyber Security Gareth Niblett CyberSec -2010 - Brussels, Belgium Security Others
Role And Challenge Of Attribution In Protecting Critical Infrastructure Bob Hutchinson CyberSec -2010 - Brussels, Belgium Others Security
Welcome To Owasp Ireland 2010 Conference Eoin Keary , Fabio Cerullo , Rahim Jina OWASP Dublin-2010 - Ireland Security Others
Owasp State Of The Nation Eoin Keary , Dinis Cruz OWASP Dublin-2010 - Ireland Others Security
The Evolution Of Security Testing: Testing The Resiliency Of Security David Stubley OWASP Dublin-2010 - Ireland Security Others Exploitation
Using The Owasp O2 Platform To Consume Owasp Projects Dinis Cruz OWASP Dublin-2010 - Ireland Others Security
Scareware Traversing The World Via Ireland Mark Hillick OWASP Dublin-2010 - Ireland Others Security
Solving Real-World Problems With An Enterprise Security Api (Esapi) Chris Schmidt OWASP Appsec-2010 - USA Security Others Business
State Of Ssl On The Internet - 2010 Survey Ivan Ristic OWASP Appsec-2010 - USA Security Web Others Analysis
Owasp Secure Coding Practices Quick Reference Guide Keith Turpin OWASP Appsec-2010 - USA Security Others Compliance
Smart Phones With Dumb Apps: Threat Modeling For Mobile Applications Dan Dan cornell OWASP Appsec-2010 - USA Mobile Security Android Others Hardware Reverse Engineering
Assessing, Testing And Validating Flash Content Peleus Uhley OWASP Appsec-2010 - USA Security Others Analysis
Tour Of Owasp Projects Dinis Cruz OWASP Appsec-2010 - USA Security Others
Using The Owasp O2 Platform Dinis Cruz OWASP Appsec-2010 - USA Security Web Others Application Security
Welcome Yuval Elovici CollSec-2010 - Washington DC, USA Security Others
Integrity Of The Web Content: The Case Of Online Advertising Jean-pierre Hubaux , Julien Freudiger , Nevena Vratonjic CollSec-2010 - Washington DC, USA Security Web Others
Collaborative Algorithm For Reducing False Acceptance Error Rate Of Face Recognition Based Admission Control System Sagi Ben Moshe CollSec-2010 - Washington DC, USA Security Others Community
Evolutionary Synthesis Of Collective Behavior David Kriesel CollSec-2010 - Washington DC, USA Security Others Deep Knowledge
Technology Companies Are Best Positioned To Offer Health Record Trusts Umesh Shankar , Shirley Gaw HealthSec-2010 - Washington DC, USA Security Others
Beefing Up A Health-Data Ecosystem: Struggles And Successes From Microsoft Healthvault Jim O'leary HealthSec-2010 - Washington DC, USA Security Others
Using The Wave Protocol To Represent Individuals' Health Records Shirley Gaw , Umesh Shankar HealthSec-2010 - Washington DC, USA Others Security
Ebam: Experience-Based Access Management For Healthcare Carl Gunter , David Liebovitz , Bradley Malin HealthSec-2010 - Washington DC, USA Security Others
Genetic Fingerprint - Dna Hacking At The Vol Nora Neumann , Andrea Reiss NinjaCon-2010 - Vienna, Austria Others Security
Crash Course In Penetration Testing Oliver Roeschke NinjaCon-2010 - Vienna, Austria Security Others Network Penetration
Breaking News: Cyber Attack Started Eyjafjallajökull Volcano Eruption Anchises De paula NinjaCon-2010 - Vienna, Austria Security Others
Invasion! Barry Van kampen NinjaCon-2010 - Vienna, Austria Security Others Cyberwar
The Bar Quiz Anonymous Speaker NinjaCon-2010 - Vienna, Austria Security Others
Security In A Changing World - Bringing Security-Sense To Virtualized Desktop Environments Dror-john Roecher NinjaCon-2010 - Vienna, Austria Security Others
Csn.Or.At Community Sense Net - Honeypot+ Florian Eichelberger NinjaCon-2010 - Vienna, Austria Security Others Community
Visualization For It-Security L. Aaron Kaplan NinjaCon-2010 - Vienna, Austria Others Security
Hackerspaces Os Sweatshop Anonymous Speaker NinjaCon-2010 - Vienna, Austria Security Others Community
How To Stay Invisible (Still Using Cellphones) Kugg Hossi Phrosit NinjaCon-2010 - Vienna, Austria Mobile Security Security Others
How To Give A Lousy Presentation Pepi Zawodsky NinjaCon-2010 - Vienna, Austria Others
Last Announcements (An Obituary To Plumbercon 10) Astera NinjaCon-2010 - Vienna, Austria Others
Detecting Malicious Documentations Nguyen ANH Quynh NinjaCon-2010 - Vienna, Austria Others Malware
Moonsols Windows Memory Toolkit Matthieu Suiche NinjaCon-2010 - Vienna, Austria Security Others
Under The Kimono Of Office Security Engineering David Conger , Tom Gallagher NinjaCon-2010 - Vienna, Austria Security Others
Industrial Bug Mining - Extracting, Grading And Enriching The Ore Of Exploits Ben Nagy NinjaCon-2010 - Vienna, Austria Others Data Exfiltration
Aura Software Security / Xero - Tales From The Crypt0 Graeme Neilson , Kirk Jackson OWASP New Zealand-2010 - New Zealand Security Others Cryptography
Welcome Address Rob Gonggrup HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Others
Breaking Virtualization By Switching To Virtual 8086 Mode Jonathan Brossard HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Others Intrusion Prevention
The Traveling Hacksmith 2009-2010 Saumil Shah HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Others Deep Knowledge
Subverting Windows 7 X64 Kernel With Dma Attacks Damien Aumaitre HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Others
Breaking Browsers: Hacking Auto-Complete Jeremiah Grossman Blackhat USA-2010 - Las Vegas, USA Security Others Browser
Voyage Of The Reverser: A Visual Study Of Binary Species Greg Conti , Sergey Bratus Blackhat USA-2010 - Las Vegas, USA Security Others Forensics
Initial Presentation Event Hugo Pagola , Martin Tartarelli OWASP Argentina-2010 - Argentina Security Others
Graduate Data Security Hugo Paola OWASP Argentina-2010 - Argentina Security Others
Organizing Ninjas: A How To For Better Team Pentesting Jonathan Cran Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others Deep Knowledge
The Ex Factor: Exploring Proximity-Based Identity Marisa Fagan Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others
Catching The Unicorn: A Technical Exploration Of Why Nac Is Failing Jennifer Jabbusch Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others Deep Knowledge
Can Risk Management Be Science? Challenging The Epistemological Anarchist To Escape Our Dark Age David Mortman , Alex Hutton Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others Deep Knowledge
Feathers Will Fly Panel! - Professional Image And Gender Issues For Women In Security Leigh ( Hypatiadotca ) Honeywell , Erin Jacobs , Stacy Thayer , Leigh Hollowell , Nicolleneulist Neulist , Magen Hughes Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others Deep Knowledge
Warvox H.d. Moore Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others Deep Knowledge
Lightning Talks Day 2 Frank^2 Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Others
Welcome To Owasp Appsec Research 2010 Conference John Wilander OWASP Appsec-2010 - Stocholm, Sweden Security Others
Deconstructing Coldfusion Chris Eng OWASP Appsec-2010 - Stocholm, Sweden Security Others Deep Knowledge Exploitation Risk
Busting Frame Busting Gustav Rydstedt OWASP Appsec-2010 - Stocholm, Sweden Security Others
Hacking By Numbers Tom Brennan OWASP Appsec-2010 - Stocholm, Sweden Security Others Deep Knowledge
Owasp_Top_10_2010 Dave Wichers OWASP Appsec-2010 - Stocholm, Sweden Security Others
Cloudy With A Chance Of Security Davi Ottenheimer Security B-Sides Denver-2010 - Denver, USA Security Web Others
Agile Security, Soc And How Mortman/Hutton Ruined My Summer Vacation Peter Schawacker Security B-Sides Denver-2010 - Denver, USA Security Others
When Does Electronic Espionage Become An 'Act Of War' And What Options Do Nations Have To Defend Their Networks? David Willson Security B-Sides Denver-2010 - Denver, USA Security Others
Welcome Speech Jaak Aaviksoo CCDCOE-2010 - Estonia Security Others
Opening Remarks Ilmar Tamm CCDCOE-2010 - Estonia Security Others
Unskilled Volunteers In Cyber Conflicts Rain Ottis CCDCOE-2010 - Estonia Security Others Cyberwar
Technology, Policy, Law, And Ethics Regarding U.S. Acquistition And Use Of Cyber Attack Capabilities - U.S. Lessons Learned Herb Lin CCDCOE-2010 - Estonia Security Others Cyberwar
Blurring Boundaries: Crime And Espionage Online Nart Villeneuve CCDCOE-2010 - Estonia Security Others Legal Cyberwar
Cyber Warfare: Beyond The Beyond The Hype Talks Haroon Meer CCDCOE-2010 - Estonia Security Others Cyberwar
Geographical Implications Of Cyber Security Wolf Heintschel Von heinegg CCDCOE-2010 - Estonia Security Others
State Attribution Of Cyber Attacks Scott J. Shackelford CCDCOE-2010 - Estonia Security Others Cyberwar
Attribution And Responsibility Of Non-State Actors Russell Buchan , Lilian Edwards CCDCOE-2010 - Estonia Security Others
It Supply Chain Risk Michael Aisenberg CCDCOE-2010 - Estonia Security Others
Mission Assurance Michael Grimaila CCDCOE-2010 - Estonia Security Others
Track Keynote: Breakingpoint Systems – Deep Packet Inspection Richard Favier CCDCOE-2010 - Estonia Security Infrastructure Others Analysis
Recent Initiatives And Plans At The Osce Nemanja Malisevic CCDCOE-2010 - Estonia Security Others
Optimizing It Security Costs By Evolutionary Algorithms Toomas Kirt , Jüri Kivimaa CCDCOE-2010 - Estonia Security Others Business
The Good, The Bad, And The Ridiculous In Pen Testing Vinnie Liu , Stach Liu SANS Pen Test Summit-2010 - Baltimore, USA Security Others Deep Knowledge
Goal-Based Pen Testing Jabra SANS Pen Test Summit-2010 - Baltimore, USA Security Others Network Penetration
Closing Remarks Ed Skoudis SANS Pen Test Summit-2010 - Baltimore, USA Security Others
“Owasp Top 10 – 2010: Towards A Secure Software Development Lifecycle”, Konstantinos Papapanagiotou AthCon-2010 - Athens, Greece Security Others Community
“Extrusion Testing – One Step Beyond” George Fekkas AthCon-2010 - Athens, Greece Others Security
“Bnf (Backus-Naur Form) Based Blackbox Fuzzing” Chariton Karamitas AthCon-2010 - Athens, Greece Security Fuzzing Others
“Abusing Network Protocols” Fotis Hantzis AthCon-2010 - Athens, Greece Security Others Risk Network Penetration
“Context-Keyed Payload Encoding: Fighting The Next Generation Of Ids” Dimitrios Glynos AthCon-2010 - Athens, Greece Security Others
“The Dhcp Recession: Extended Dhcp Exhausting Attack” A.r Samhuri AthCon-2010 - Athens, Greece Security Web DNS Others
“The Real Value Of Penetration Testing For The Enterprise” Notis Iliopoulos AthCon-2010 - Athens, Greece Security Others Network Penetration
“Abusing Jboss” Christian Papathanasiou AthCon-2010 - Athens, Greece Security Others Application Security Exploitation
“Gone Rogue: An Analysis Of The Rogue Security Software Landscape” Corrado Leita AthCon-2010 - Athens, Greece Security Others Application Security Risk
Welcome To Froc 2010 Conference David Campbell OWASP FROC-2010 - Denver, USA Security Others
Owasp: State Of The Union Tom Brennan OWASP FROC-2010 - Denver, USA Security Others
2010: A Web Hacking Odyssey – The Top Hacks Of The Year Jeremiah Grossman OWASP FROC-2010 - Denver, USA Security Others
Anatomy Of A Logic Flaw Charles Henderson , David Byrne OWASP FROC-2010 - Denver, USA Security Others
Beware Of Serialized Gui Objects Bearing Data David Byrne , Rohini Sulatycki OWASP FROC-2010 - Denver, USA Security Others
What'S Old Is New Again: An Overview Of Mobile Application Security Zach Lanier OWASP FROC-2010 - Denver, USA Security Others
Solving Real-World Problems With An Enterprise Security Api (Esapi) Chris Schmidt OWASP FROC-2010 - Denver, USA Security Others
Conference Overview – Security In 2010: Where Are We Now? Charl van der Walt , Johann van der Merwe , Dominic White ITWeb Security Summit-2010 - Johannesburg, South Africa Others
Protecting Your Customers Assests: What Must You Do So That You Will Not Need The Npa Paul Louw ITWeb Security Summit-2010 - Johannesburg, South Africa Security Others Business
The Security Implications Of The Ppi Bill: An End User'S Perspective Ritasha Jethva ITWeb Security Summit-2010 - Johannesburg, South Africa Others Privacy Business
...But If You Try Sometime, You Get What You Need Joseph Sokoly Security B-Sides Boston-2010 - Boston, USA Security Others
So You Want To Write A Security Book, Eh? Andrew Hay Security B-Sides Boston-2010 - Boston, USA Security Others
I Can'T Make This Sh!T Up! - War Stories From A Former And Award Winning Cso Erin Jacobs Security B-Sides Boston-2010 - Boston, USA Others Deep Knowledge
Tastes Great Vs Less Filling: Deconstructing Risk Management (A Practical Approach Towards Decision Making) Mike Dahn Security B-Sides Boston-2010 - Boston, USA Others Deep Knowledge
Fsck The Fud And The Echo Echo Echo Chamber Joshua Corman Security B-Sides Boston-2010 - Boston, USA Security Others
We Found Carmen Sandiego! Don Bailey , Nick Depetrillo QuahogCon-2010 - USA Others
Hacking The Crisis: Disaster Prep And Mitigation Gadsden QuahogCon-2010 - USA Others
Packing & The Friendly Skies - Why Transporting Firearms May Be The Best Way To Safeguard Your Tech When You Fly Deviant Ollam QuahogCon-2010 - USA Security Others
Gender Hacking Joan Pepin QuahogCon-2010 - USA Security Others
Blackberry Mobile Spyware - The Monkey Steals The Berries (Part Deux) Tyler ( Txs ) Shields SOURCE Boston-2010 - Boston, USA Security Web Others Risk
Milking A Horse Or Executing Remote Code In Modern Java Web Frameworks Meder Kydyraliev Ruxcon-2010 - Melbourne, Austrailia Security Others
Padding Oracle For The Masses Nicolas Waisman Ruxcon-2010 - Melbourne, Austrailia Security Others
Identifying C Structs From Binaries Kuza55 Ruxcon-2010 - Melbourne, Austrailia Security Others
This Job Makes You Paranoid Alex Tilley Ruxcon-2010 - Melbourne, Austrailia Security Others
Understanding The Java Serialisation Attack Surface Daniel Grzelak Ruxcon-2010 - Melbourne, Austrailia Security Others
Everybody Be Cool This Is A Roppery! Tim Kornau Ruxcon-2010 - Melbourne, Austrailia Security Others
It'S A Feature, Not A Vulnerability Deral Heiland CarolinaCon6-2010 - Raleigh, USA Security Others Application Security
Omg, The World Has Come To An End!!! Felonious Fish CarolinaCon6-2010 - Raleigh, USA Others
The Young And The Restless Joseph Sokoly Security B-Sides Austin-2010 - Austin, USA Others Security
Being Inbred / Group Think Vikram Phatak Security B-Sides Austin-2010 - Austin, USA Others
Getting More Out Of App Vuln Scan Results Dan Dan cornell Security B-Sides Austin-2010 - Austin, USA Others Firewall Access Control Access Exploitation Risk
Security Podcasting Andrew Borel Security B-Sides Austin-2010 - Austin, USA Security Others
Siem Rocky Destefano Security B-Sides Austin-2010 - Austin, USA Security Others
Hackerspace How-To Hypatiadotca Security B-Sides Austin-2010 - Austin, USA Others Security
Getting Punched In The Face Nicholas Arvanitis ZaCon-1 - Johannesburg, South Africa Others Security
Smashing The Stats For Fun (And Profit) Shaun Dewberry ZaCon-1 - Johannesburg, South Africa Security Others Statistics
Enterprise Portals - Gateway To The Gold Ian De Villiers ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge
Make Tea Not War Roelof ( RT ) Temmingh ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge
Why Zacon? Haroon Meer ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge
The Mechanics Of Ddos Ralfe Poisson ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge Analysis
Layer 2 Hackery Todor Genov ZaCon-1 - Johannesburg, South Africa Security Others Network Penetration
A Future Security Landscape Anthony Olivier ZaCon-1 - Johannesburg, South Africa Security Others Deep Knowledge
Threat Modeling Express Krishna Raja OWASP Appsec-2009 - Washington DC, USA Security Others
Enterprise Application Security - Ge'S Approach To Solving Root Cause And Establishing A Center Of Excellence Darren Challey OWASP Appsec-2009 - Washington DC, USA Security Others Application Security
The Case Of Promiscuous Parameters And Other Ongoing Capers In Web Security Jacob West OWASP Appsec-2009 - Washington DC, USA Security Buffer Overflows Web Others
Synergy! A World Where The Tools Communicate Joshua Abraham OWASP Appsec-2009 - Washington DC, USA Security Others
Attacking Wcf Web Services Brian Holyfield OWASP Appsec-2009 - Washington DC, USA Security Web Others Application Security
Application Security Metrics From The Organization On Down To The Vulnerabilities Chris Wysopal OWASP Appsec-2009 - Washington DC, USA Security Others
Owasp Top 10 2010 Appsecdc Dave Wichers , Dave Wichers OWASP Appsec-2009 - Washington DC, USA Security Others
Sans Dshield Webhoneypot Project Jason Lam OWASP Appsec-2009 - Washington DC, USA Others Security
Techniques In Attacking And Defending Xml/Web Services Phil Dunkelberger OWASP Appsec-2009 - Washington DC, USA Security Others
Presentation Of The Open Web Application Security Project (Owasp) Boris Hemkemeie OWASP Appsec-2009 - Germany Others Security
Safe Development And Common Vulnerabilities In Proprietary Sap Web Applications Sebastian Schinzel OWASP Appsec-2009 - Germany Security Others Development
Adaptive Anomaly Detection By Security Hartmut Keil OWASP Appsec-2009 - Germany Security Others
Sniff Keystrokes With Lasers/Voltmeters – Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Others Community
What'S New With Xprobe Fyodor Yarochkin SOURCE Barcelona-2009 - Barcelona, Spain Others Security
A Look At Security Projects And Spending In The Current Recession Dov Yoran SOURCE Barcelona-2009 - Barcelona, Spain Security Others
Expanding The Control Over Operating System From The Database Guido Landi SOURCE Barcelona-2009 - Barcelona, Spain Security Others Unix
Transacting Online: What Might Be Good Enough And What Isn'T Michael Baentsch SOURCE Barcelona-2009 - Barcelona, Spain Security Web Others
State Of Malware: Explosion Of The Axis Of Evil Peter Silberman SOURCE Barcelona-2009 - Barcelona, Spain Security Others Malware
Key Stroke Dynamics As The Basis For Secure Authentication Dieter Bartmann SOURCE Barcelona-2009 - Barcelona, Spain Others Security
Reil Using Platform-Independent Automated Deobfuscation Christian Ketterer , Sebastian Porst SOURCE Barcelona-2009 - Barcelona, Spain Security Others Analysis
“I Am Walking Through A City Made Of Glass And I Have A Bag Full Of Rocks” (Dispelling The Myths And Discussing The Facts Global Cyber-Warfare) Jayson E. Street BruCON-2009 - Brussels, Belgium Others Security
Rage Against The Kiosk Paul Craig BruCON-2009 - Brussels, Belgium Security Others Exploitation
Update On The Belgian Information Security Initiative Jean-luc Allard , Alain De greve BruCON-2009 - Brussels, Belgium Security Others
Open Source Information Gathering Chris Gates BruCON-2009 - Brussels, Belgium Security Others
Red And Tiger Team Chris Nickerson BruCON-2009 - Brussels, Belgium Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Knowing Me Knowing You (The Dangers Of Social Networks) Brian Honan BruCON-2009 - Brussels, Belgium Security Others
Building Hackerspaces Everywhere Astera BruCON-2009 - Brussels, Belgium Security Others
Malicious Markup - I Thought You Were My Friend - Cycle 3 Mario Heiderich BruCON-2009 - Brussels, Belgium Security Others Browser
Biohacking: Dna Lab Day Lisa Thalheim NinjaCon-2009 - Vienna, Austria Security Others
Call-In: Scientists Are The New Rockstars Scott Beibin NinjaCon-2009 - Vienna, Austria Security Others
Call-In: What Is Old Is New Again, Or Why The Bomb Really Matters In Our Everday Lives Eric Michaud NinjaCon-2009 - Vienna, Austria Others Security
Security By Candlelight Michael Kafka NinjaCon-2009 - Vienna, Austria Security Others
The Church Of Security: Flashmob Hellekin Jaromil NinjaCon-2009 - Vienna, Austria Security Others
The Ten Finger Discount: Philosophy And Ethics Of Modern Piracy Mjg CarolinaCon-5 - Raleigh, USA Security Others Media
Information Security In Higher Education: Baby Steps Adam Dodge , Kees Leune SOURCE Boston-2009 - Boston, USA Security Others Access Business
Decoding The Smartkey Shane Lawson ShmooCon-2009 - Washington DC, USA Security Others
The Gentlemen'S Agreement - Pwning Friends Legally For Fun, ????, And Profit! Zachary Fasel , Matthew Jakubowski , Josh Krueger ShmooCon-2009 - Washington DC, USA Security Others Legal
Solve This Cipher And Win! Michael ( theprez98 ) Schearer ShmooCon-2009 - Washington DC, USA Security Others
Remote Code Execution Through Intel Cpu Bugs Kris Kaspersky HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Others Malware
The Art Of Do-Foo Matt Joyce The Last HOPE-2008 - USA Security Others Statistics
The Attendee Meta-Data Project Lexicon , Matt Joyce , Daravinne , Neo Amsterdam , Aestetix , Echo , Dementia , Christopher Petro The Last HOPE-2008 - USA Security Web Others Development
Autonomously Bypassing Voip Filters With Asterisk: Let Freedom Ring Blake Cornell , Jeremy Mcnamara The Last HOPE-2008 - USA Security Others Access
Policy Hacking: Taking Back Public Sector It Arjen Kamphuis The Last HOPE-2008 - USA Security Others Access
Sharing Your Love Of Technology With Normal People - Prometheus Radio Project Tips Pete Tridish , Steph99 The Last HOPE-2008 - USA Security Others Access Media
, Log Management - The Way Of The Future? Andrew Morris TROOPERS-2008 - Munich, German Security Others
An Update On Riaa Lawsuits Under The Dmca Sapna Kumar CarolinaCon-4 - Raleigh, USA Security Others Legal
New Countermeasures To The Bump Key Attack Deviant Ollam ShmooCon-2008 - Washington DC, USA Security Others Risk
Hackerspaces Jens Ohlig , Paul Böhm , Bruder , T Chaos Communication Congress-23 - Berlin, Germany Security Others
Aspect-Oriented Programming: Radical Research In Modularity Gregor Kiczales 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Others
Surviving Moore'S Law: Security, Ai, And Last Mover Advantage Paul Kocher 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Others
J0Hnny'S Greatest Hits: The Best Of Johnny Long (Break It!) Johnny Long ShmooCon-2006 - Washington DC, USA Security Others
Ciso Q&Amp;A With Jeff Moss Justin Somaini Blackhat USA-2005 - Las Vegas, USA Security Others Panel Privacy
High-Speed Computing & Co-Processing With Fpgas David Hulton ShmooCon-2005 - Washington DC, USA Others Security
Learning Openpgp By Example Seth Hardy Chaos Communication Congress-21 - Berlin, Germany Security Web Others
Open Source Vulnerability Database Jake Kouns SyScan-2004 - Singapore Security Others Community
Hacker Radio Sl1pm0de The Fifth HOPE -2004 - USA Security Others Community
Report From Ruckus Anonymous H2K2-2002 - USA Security Others
Attacking And Securing Unix Ftp Servers Jay Beale Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Politics Of Vulnerability Reporting Scott Blake Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Web Application Brute Forcing 101 – “Enemy Of The State (Mechanism)” David Endler , Michael Sutton Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Web Application Security: Stuff Your Mother Never Told You Bill Pennington , Dennis Groves Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Enterprise Email Security Made Practical Paul Holman Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Database Security - The Pot And The Kettle. David Litchfield Blackhat USA-2002 - Las Vegas, USA Security Web Mail DNS Others
Mobile Security: Sms And Wap Job de Haas Blackhat Europe-2001 - Amsterdam, The Netherlands Mobile Security Security Others Access
An Overview Of A Tcp/Ip Internals And Its Security Strengths And Weaknesses. Peter Shipley Blackhat USA-1998 - Las Vegas, USA Security Others