CircleCityCon 2014 June 13, 2014 to June 15, 2014, Indianapolis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Blurred Lines: When Digital Attacks Get Physical Phil Grimes As the vulnerability landscape evolves, the threat agent changes with it. Where network level vulnerabilities ...
Decrypting Communication: Getting Your Point Across to the Masses Katherine Cook Frye InfoSec and many other Technical career paths require professional communication in one form or another ...
Ain’t No Half-Steppin’ Martin Bos Am I ready for a pentest? As Information Security becomes more and more popular and ...
Eyes on IZON: Surveilling IP Camera Security Mark Stanislav Home IP cameras are becoming increasingly common thanks to sleek designs, WiFi connectivity, and intuitive ...
Title:Seeing Purple: Hybrid Security Teams for the Enterprise Mark Kikta The militaries of the world conduct wargames in order to increase their readiness in the ...
Keys That Go *Bump* In The Night Loak This talk will be a short overview of the basic functionality of bump keys, an ...
OWASP Top 10 of 2013: It’s Still a Thing and We’re Still Not Getting It Barry Schatz The top 10 web application vulnerabilities, as determined by OWASP in 2013, grouped by similarity ...
Ten Commandments of Incident Response (For Hackers) Lesley Carhart For many infosec professionals, a logical career move is to an incident response role; managing ...
Title:Moving the Industry Forward – The Purple Team David Kennedy Abstract:Let’s start off with a strong statement – pentesting today isn’t working. The blue team ...
Title:The Challenge of Natural Security Systems Rockie Brockway Abstract:Static security models and “business as usual” directives have naturally resulted in a collective eyes ...
Proactive Defense – Eliminating the Low Hanging Fruit Matt Kelly Every year the pen testers (or bad guys) come in, they find that one missing ...
How Hackers for Charity (Possibly) Saved Me a LOT of Money Branden Miller , Emily Miller What do you do when your oldest child tells you she wants to be an ...
The TrueCrypt audit: How it happened and what we found Kenneth White TrueCrypt is an open source file and whole disk encryption software package that runs on ...
3 Is a Magic Number (or your Reality Check is About to Bounce) Edward Mccabe Updates, changes, and game changers. How changes in Requirement 11.3 can potentially impact organizations as ...
Proper Seasoning Improves Taste James Siegel Systems administration can be a difficult task, when given a large number of systems to ...
How often should you perform a Penetration Test Jason Samide How often should your organization conduct a penetration test and what is in scope? I ...
Tape Loops for Industrial Control Protocols K. Reid Wightman In the last twenty years, industrial control systems have transitioned from esoteric serial networks to ...
gitDigger: Creating useful wordlists and hashes from GitHub repositories Jaime Filson This presentation intends to cover the thought process and logistics behind building a better wordlist ...
Developing a Open Source Threat Intelligence Program Edward Mccabe What if you could get out in front of common threats such as botnets, scanners ...
Hackers Are People Too Amanda Berlin The world and popular culture mostly see hackers as criminals. We should all make it ...
InfoSec Big Joke – 3rd Party Assessments Moey Darn $service_provider they bunked it up again! Wait didn’t we do a vendor assessment on ...
OpenAppID: Open Source Next Gen Firewall with Snort Adam Hogan A Next Generation Firewall is a system aimed at providing network level controls to application ...
Exploring the Target Exfiltration Malware with Sandbox Tools Adam Hogan I will demonstrate what kind of intelligence we can learn about malware by analyzing it ...
Hackers, Attack Anatomy and Security Trends Ted Harrington Studies1 show that as many as 89% of CIOs express confidence in the effectiveness of ...
Retrocomputing And You – Machines that made the ‘net Pete Friedman The roots of modern computing are many and varied; in this talk, we’ll look at ...
Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) Benjamin Brown When gathering open source data and transforming it into actionable intelligence, it is critical to ... IncludeThinkstScapes
Doge Safes: Very Electronic, Much Fail, WOW! Jeff Popio Commonly safes are used in IT to secure backup tapes, certificate roots, and other sensitive ...
From Grunt to Operator Tom Gorup Security analysts are the grunts of the security industry, much like the infantry is the ...
Human Trafficking in the Digital Age Chris Jenks Twenty minute talk on tracking Human Trafficking using social media, and open source intelligence techniques, ...
Human Are You a Janitor or a Cleaner John Stauffacher , Matthew Hoy In the wake of several major commercial breaches “DEFENDING” is the new hot topic. The ...
Human Profiling Campus Crime Chris J. , Jason J. , Katelyn C. , Alex H. A student study based on crime alerts to the campus community, of when, where, and ...
Software Assurance Marketplace (SWAMP) Von Welch Abstract:The Software Assurance Marketplace (SWAMP) http://continuousassurance.org/ is a evolving state-of-the-art facility that serves as an ...
Whitelist is the New Black Damian Profancik Blacklists are all too commonly seen as a defense against all kinds of attacks. I’ll ...
How to create an attack path threat model Wolfgang Goerlich Everyone advocates for threat modeling. Few actually do it. This session aims to close that ...
Competitive Hacking: why you should capture the flag Steve Vittitoe Have you ever wanted to play in a Capture the Flag competition but either don’t ...
Active Directory: Real Defense for Domain Admins Jason Lang Did your AD recently get owned on a pentest? It’s always fun to see an ...
Containing Privileged Processes with SELinux and PaX and Attacking Hardened Systems Parker Schmitt Many processes running as services need privileges and often run as root. Some of them ...