NolaCOn 2014 June 19, 2014 to June 22, 2014, New Orleans,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - Terminal Cornucopia: Demystifying the Mullet Evan "treefort" Booth When solving difficult problems that require unorthodox thinking, it’s crucial that you remember APATHY: Acronyms ...
Why you are pwned and don’t know it Ben Miller 2013 was the year of the hacker. Network breaches made media headlines everywhere you turned. ...
Anti-Forensics: Memory or something, I forget. Int0x80 N/A
The Internet Of Evil Things: The 10 Most Wanted List Paul Asadoorian In this talk I will quickly bring you up to speed on the history of ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes Grecs Knowing how to perform basic malware analysis can go a long way in helping infosec ...
Do You Have Enough Executioners? Brian Foster Threat detection is an ongoing battle. Threats will always get through prevention and incident responders ...
Red Teaming: Back and forth 5ever Fuzzynop Whether you are on the red team, the blue team, or something in between, you ...
Responding to APT: Unpwning the Pwned Chad Olivier In 2012, one of the largest data breaches took place. This talk covers the entire ...
Probabilistic detection of malware infected hosts via DNS query analysis. Brandon Niemczyk A large amount of DNS traffic was collected from a US based network in an ...
Advanced RedTeaming: Ghosts in your Building Joshua Perrymon So its the middle of the day, and you have tailgated into a building and ...
Placing the Suspect Behind the Keyboard Brett Shavers Learn methods and procedures to close your cybercrime investigations quickly and accurately. In Placing the ...
Operational Security and Your Mental Health Chrisha Anderson , Chris Operational Security and Your Mental Health: how to get your head examined while maintaining your ...
Androids vs. Android: Synthetic Mobile Malware Analysis David Shaw In today's world of smartphone ubiquity, mobile malware is an increasingly prevalent (and difficult to ...
It Just Keeps Going and Going Josh Stone "SMB Relay". "Man-in-the-Middle". Did we catch your attention? This presentation will describe our journey from ...
Interpersonal Manipulation Shannon Sistrunk This talk will explore Interpersonal Manipulation and the theories that support it. During the talk ...
Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) Benjamin Brown When gathering open source data and transforming it into actionable intelligence, it is critical to ...