rvasec 2014 June 4, 2014 to June 6, 2014, Richmond,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
RVAsec 2014 Keynote | David Kennedy , Gene Fishel | N/A | |
Introducing Intelligence into Malware Analysis | Brian Baskin | Malware analysis is the current en vogue topic for computer security companies and careers. However, ... | |
The Pyramid of Pain: Intel-Driven Detection & Response to Increase Your Adversary’s Cost of Operations | David J. Bianco | There’s more to good threat intelligence than lists of domains or IPs, and it’s useful ... | |
Terminal Cornucopia: Demystifying the Mullet | Evan "treefort" Booth | Growing up, it was a safe bet that if an object around the house was ... | |
Third Party Risk Management and Cybersecurity | Jonathan Dambrot | Several recent research reports have identified that close to 80% of data breaches are caused ... | |
Cyber Insurance – Worth the Effort or Total Ripoff? | Inga Goddijn | Have you ever found yourself paying premiums for years, just to be shortchanged by the ... | |
CVSS v3 – This One Goes to 11 | Seth Hanford | Software vulnerabilities — love em or hate em, they’re crucial to your job. Likewise, you ... | |
Five Secrets to Building an Amazing Security Culture in Your Organization | Pete Herzog | If only everyone thought about security the way we think about security. But they don’t. ... | |
Pissing Down The Leg Of Much Of Our Careers; Why Are You People Still Buying Firewalls & IPS? | Elizabeth Martin , Dan Holden | Do you recall the good ole days when you would often issue the command ‘more ... | |
Man In The Front – Modifying the Android OS for Mobile Application Testing | Ray Kelly | Most penetration testers know the headaches of testing mobile applications. Challenges like certificate pinning and ... | |
How To Find Mobile Internet Love | Jack Mannino , Abdullah Munawar | As mobile dating applications grow in popularity, so does our interest in the security posture ... | |
Attacker Ghost Stories: Mostly Free Defenses That Gives Attackers Nightmares | Mubix | This talk was originally titled “I’m tired of defenders crying”, but thought better of it. ... | |
Leading Security When the Rest of The Business Doesn’t Care About Security | Kimberley Sullo | In many organizations, security teams are viewed as a “necessary evil” or a cumbersome speed ... | |
Offensive Mobile Forensics | Joey Peloquin | It’s official; enterprise mobility has been redefined, and Bring Your Own Device is a permanent ... | |
I Found a Thing and You Can Too: ISP’s Unauthenticated SOAP Service = Find (almost) All the Things! | Nick Popovich | This presentation is meant to encourage individuals to put the applications and software that they ... | |
Real World Intrusion Response – Lessons from the Trenches | David Sharpe , Katherine Trame | Two battle-scarred, sleep-deprived GE-CIRT incident responders share lessons learned from the trenches, from their daily ... | |
The hacker in the fun house mirror (A talk on skewed perspectives) | Jayson E. Street | This is a talk on perspectives. Hackers, and hacking, are perceived differently around the world ... | |
How to Achieve Success with Cyber Risk Assessment and Analysis | Ben Tomhave | Technical professionals are frequently asked to lead or participate in risk assessments or risk analysis, ... | |
How to Make a Lock | Schuyler Towne | Locks were one of the earliest complex mechanical devices. They are ubiquitous, yet remain very ... |