BSidesDetroit 2014 July 12, 2014 to July 12, 2014, Detroit,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Practicing Our Mistakes Until We Master Them Jack Daniel We have seen cycle after cycle of change and disruption in technology and security, and ...
Threats in Vehicle-to-Vehicle Communications George Corser Speakers George Corser Converge Conference DetroitPrivacy threats in emerging vehicle-to-vehicle communication systems pose problems to ...
Security for the Next Generation: Lessons Learned From a First Time Father Keith Dixon Speakers Keith Dixon Converge Conference DetroitThis talk is part twisted inspiration from Kellman Meghu’s talk ...
Thinking Outside the Bunker: Security as a Practice, Not a Target Steven Legg Speakers Steven Legg Converge Conference DetroitVery often people think of security as a target – ...
Eat, Sleep, BILL, Repeat Zee Abdelnabi Thousands of students struggle daily in college. The excuses I hear of why they failed, ...
Seeing Purple: Hybrid Security Teams for the Enterprise Mark Kikta The militaries of the world conduct wargames early and often in order to increase readiness ...
Beating the Infosec Learning Curve Without Burning Out Scott Thomas So you have made the decision to get into Infosec and you’re excited to begin ...
Who Moved My Keys??? An Amazing Way to Deal with Changes We Need to Make in InfoSec Caston Thomas In this presentation, we’re going to dissect our preconceptions, misconceptions, self-deceptions, lack of direction, and ...
Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields Eve Adams So you think you want a career in information security, but you work in an ...
What Happened to the ‘A’? – How to Leverage BCP/DR for your Info Sec Program Michael A. Ortega Speakers Moey Converge Conference DetroitIn the beginning, every Information Security professional learns about the triad: ...
Hacking Your Way Into the APRS Network on the Cheap Mark Lenigan Speakers Mark Lenigan Converge Conference DetroitAPRS (Amateur Packet Reporting System) is a twenty-something year-old packet ...
Verbal Sparring 101 Nick Jacob As security professionals, we deal with a great deal of misunderstanding around what we do ...
Engagement Zen: Transforming IT & The Business through Security for Fun + Profit Paul R. Jorgensen There is no piece of paper, no policy, and no compliance requirement that will force ...
Roadmap for Success: 20 Critical Security Controls for Effective Cyber Defense Ken Evans Need to roadmap your security plan but don’t have time for a business impact analysis ...
Fix What Matters:Why CVSS Sucks and How To Do Better Michael Roytman Speakers Michael Roytman Converge Conference DetroitVulnerability prioritization is where everybody goes wrong and nobody knows ...
Is software development engineering? Probably not, one reason: testing. Ben Schleis Engineers test their designs to prove that the solution selected will meet requirements. They are ...
Welcome to the blue team! How building a better hacker accidentally built a better defender. Casey Ellis Security practitioners know that the threats that face an organization are always active, and that ...
Building an AppSec Program from Scratch Chris Pfoutz Pen testing being the sexy part of Infosec, the first thing most companies want to ...
Story-Driven Security J wolfgang Goerlich Successful defense occurs when the interests of a security team’s stakeholders intersect with the attackers ...