Converge 2014 July 10, 2014 to July 11, 2014, Detroit,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hackers: Super Heroes of a Slightly Dark Future Nicholas J. Percoco Speakers Converge Conference Keynote 1 Nicholas PercocoWhat if you could transport yourself to the year ...
Everything’s Gone Green: A Reflection on “Growing Up” in “The Industry” Zach Lanier Speakers Zach Lanier Duo Security Converge Conference It (almost) goes without saying that the “infosec ...
How the Surveillance State Changes IT Security Forever Richard Stiennon Speakers Converge Conference Keynote 3 Richard StiennonThe rapid rise of surveillance by the NSA and ...
Do the Hard Things Jose Nazario Cybersecurity challenges remain unsolved, and problems only get worse. The speaker will discuss some possible ...
#scrappysec Chris Raethke Any organization can adopt simple strategies to be more secure, to know when something has ...
Business Impact Analysis on the Corporate R.A.D.A.R. Steven Aiello We are pleased to release the first open source BIA workflow that is actionable and ...
The Challenge of Natural Security Systems Rockie Brockaway Static security models and “business as usual” directives have naturally resulted in a collective eyes ...
Security Omnipresence: Infiltrating Every Level of a Mature Development Lifecycle Marion Nepomuceno It’s easy for a security professional to feel like he’s alone, especially when there are ...
iOS URL Schemes: From Dangerous to Hilarious Guillaume K. Ross URL Schemes are becoming the most common and practical way to share information between apps ...
Securing Windows Store Apps Dustin Kingen Everyone says security is hard. It is true that the adventure is not simple, but ...
We’re All In This Together: Turning Adversaries Into Allies Robert Keefer Speakers Robert KeeferHow many people are on your Security team? The answer can be: “everybody ...
Back To Basics Joel Cardella With the large proliferation of increasingly advanced threats on the landscape, and the media attention ...
Imparting Awareness At Every Level Joel Cardella Security awareness is a key security measure. The problem with awareness is we’re never quite ...
No Such Thing as Free Wi-Fi Paul Melson Security issues with wireless networks are well known and understood. However, the explosion of mobile ...
Build it, they will come: The importance of local infosec communities Ed Rojas Summary: You are either a lone wolf or are part of a pack. Most probably, ...
Security for the People: End-User Authentication Security on the Internet Mark Stanislav Speakers Mark Stanislav Converge Conference DetroitDespite the continued success by attackers to brute-force accounts, phish ...
Check Yo’self ‘fore you Wreck Yo’self: What Ice Cube Taught Me About Incident Response Metrics Dave Trollman Speakers David Trollman Converge Conference DetroitExec’s and PTB’s love theyselves some charts and graphs. People ...
Man-In-The-Front: Modifying the Android OS for Mobile Application Testing Ray Kelly Speakers Ray Kelly Converge Conference DetroitMost penetration testers know the headaches of testing mobile applications. ...
Security from Inception Matt Konda Speakers Matt Konda Converge Conference DetroitIn this talk, we will explore case studies that illustrate ...
Looking for the Weird Charles Herring Speakers Charles Herring Converge Conference DetroitSignature detection of attacks require an understanding of what is ...
Enterprise Malware Hunting Chris Payne Speakers Chris Payne Converge Conference Detroit The development and distribution of malicious software has become ...
What the Heck Just Happened? Ken Evans Your network security department just called to follow-up on an event they found in the ...
Free to Play Security – or, How I Built My Security Infrastructure Like a Hearthstone Deck Richard Cassara The popular Free to Play (F2P) model of mobile game development can also be used ...
The Business Value of Security through Story Mapping Fred Estabrook , Dan Davis Speakers Fred Estabrook Converge Conference DetroitSecurity is far too often an after thought during a ...
Encryption works: a look at Tor and SecureDrop Runa a. Sandvik Over the past year, reporters have written countless stories about how the NSA tried to ...
Practical PowerShell Programming for Professional People Ben0xa The best hackers are those that can write their own tools or modify existing ones. ...
ZitMo Dave S. , Ninjasloth Not another mobile malware security talk! We all know malware on mobile platforms is a ...
Let’s Go CSRF’n Now! Phil Grimes In a discussion focused on Cross Site Request Forgery (CSRF), explore the trust vulnerability and ...
Operationalizing Security Intelligence Raf Los Security intelligence is only worthwhile if a relevant piece of information is obtained and analyzed ...
This is Why We Can’t Have Nice Things: JavaScript Bridging on Android Dawn Isabel Android applications use in-app browsers called WebViews to load and present HTML-based interfaces within the ...