LayerOne 2014 May 24, 2014 to May 25, 2014, LosAngeles,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
You’re HIPAA certified and Bob just killed someone from the parking lot Boris Sverdlik My friend Bob is undergoing Chemo and his wife asked him to get a copy ...
Privacy and Policy, Fighting an Uphill Battle. Daniel Zolnikov Representative Daniel Zolnikov will discuss the largest opponents to passing privacy legislation, his personal successes ...
You’ve been DDoSed – it’s not a joke anymore! Ghostwood In the age where DDoS is exceeding 400Gbps the status quo has changed. Even worse ...
Reverse Engineering 101 Gleep This presentation will cover the basic tools and techniques to begin reverse engineering binaries. Reverse ...
Bug Bounty Extortion Kevin Dick , Matt Mosley In the summer of 2013, a client of ours was being held ransom by a ...
Making of the 2014 L1 Badge Krs A behind the scenes look at what it took to bring you this year’s proxmark ...
Beyond the Perimeter: The reality of the new application security landscape Kunal Anand Gartner estimates that 70% of all hacks happened at the application layer in 2013 – ...
3D Printing Our Way to Skynet Machinist Nearly every day we hear in the news about a 3D printed trinket, but how ...
Are you a Janitor or a Cleaner? John Stauffacher , Matthew Hoy Everyday corporations are faced with the increasing likelihood of attack. They spend millions in security ...
Detecting and Defending Against State-Actor Surveillance Robert Rowley Recently released secret documents are leaving a trail of details on how state actors with ...
Next Generation Red Teaming Robert Wood Too often organizations conduct assessments within a vacuum: physical, social, network, or application-layer. Attackers do ...
Violent Python & The AV Scam Sam Bowne I’ve been writing attack software in python, inspired by the book “Violent Python”. It’s very ...