GrrCon 2014 Oct. 16, 2014 to Oct. 17, 2014, grand rapids,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Finding Our Way – From Pwned to Strategy | David Kennedy | The attacks continue to move forward, the INFOSEC industry continues to struggle with how exactly ... | |
Lulz per Employee and Other Key Metrics | J wolfgang Goerlich | What does it take to successfully lead a team of miscreants, misfits, hackers, and troublemakers? ... | |
Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Oddities | Arron 'finux' Finnon | Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ... | |
Securing our Ethics: Ethics and Privacy in a Target-Rich Environment | Kevin Johnson | Security has become a huge conversation, especially when you consider privacy as part of it. ... | |
Hack the Hustle! Career Strategies For Information Security Professionals | Eve Adams | While information security is widely considered a negative-unemployment industry (it’s actually closer to 3%), most ... | |
Full Douchesclosure | Duncan Manuts | Anti-social code savants, profiteering technology companies, shadowy government agencies, and a few well-meaning idiots are ... | |
Look Observe Link (LOL) – How I learned to love OSINT | Ninjasl0th | In this presentation, I will provide an overview of some of my most used OSINT ... | |
$#!T My Industry Says. . . | Kellman Meghu | The Security Industry says allot of ‘stuff’ about allot of things, and most of the ... | |
Bigger Boys Made Us | Mike Kemp | Recently news reverberated about the technical attacks conducted by the NSA and GCHQ (amongst others). ... | |
Glass Homes – The Transparency of Home Automation | Matt Burch , Alain Iamburg | With the growth of mobile devices and availability network connectivity home automation devices and technologies ... | |
Email DLP: Simple concept, often poorly implemented | C0rrup7_r3x | Businesses and organizations have dozens of quality software choices that address email data loss prevention, ... | |
Security Hopscotch | Chris Roberts | As humans we move between the various electronic domains within our lives. We are familiar ... | |
Advanced Breaches of 2013 vs. Behavioral Detection | Charles Herring | Signature detection of attacks require an understanding of what is bad. Advanced attackers craft innovative ... | |
Seeing Purple: Hybrid Security Teams for the Enterprise | Beltface | The militaries of the world conduct wargames early and often in order to increase readiness ... | |
Breach Stains | Matt Johnson | It was a beautiful December day during a particularly calm Michigan winter. My boss called ... | |
Security On The Cheap | Joel Cardella | 110 million credit cards got sold to the card market not due to custom malware ... | |
LEVIATHAN: Command and Control Communications on Planet Earth | Kevin Thompson | This presentation draws a new map of Planet Earth, based not on traditional parameters, but ... | |
Proof That Windows Computer Forensics is Sexy! | Kyle‘chaoticflaws’ Andrus | Forensics is sexy! My goal is to prove this to you by demonstrating a few ... | |
The Security Implications of Software Defined Networks | Shane Praay | SDN technology offers an opportunity to dynamically control traffic, which is useful for service chaining ... | |
Security for the People: End-User Authentication Security on the Internet | Mark Stanislav | Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the ... | |
Emulate SandBox and VMs to avoid malware infections | Jordi Vazquez | The use of virtualization software is widely known by malware researchers. They need a controlled ... | |
CSO’s Myopis | Jordan M. Bonagura | The CSO Myopia: Imagine what it would be like to manage your company without your ... | |
Socioware: Dissecting Online Social Network Worms – Insidious Analysis and Design | Richard Enbody , Aditya K Sood | Online Social Networks (OSNs) have revolutionized the internet and social interactions by giving birth to ... | |
Social Engineering Can Kill Me, But It Can’t Make Me Care | Gavin Ewan | Rumours of my demise have been greatly, well partly, exaggerated. We are losing the battle, ... | |
Advanced Threats and Lateral Movement Protection | Terrance Davis | We hear in the news on a daily basis that the next another corporation was ... | |
BioHacking: Becoming the Best Me I Can Be | Leonard | This is one man’s journey from being fat and exhausted to a fit healthy energetic ... | |
Autonomous Remote Hacking Drones | Phil Polstra | This talk will cover scripting for remote hacking drones. While the focus will be on ... | |
Picking Blackberries | Thomas Richards | Blackberry 10 is the most recent operating system released by Blackberry(formally RIM). This talk will ... | |
Hackers Are People Too | Infosystir | The world and popular culture mostly see hackers as criminals. We should all make it ... | |
Cryptographic backdoors | Chuck Easttom | An introduction to cryptographic backdoors. This will include coverage of the concept, as well as ... | |
ZitMo NoM | David healwhans Schwartzberg | A world without malware is ideal but unlikely. Many of us would prefer *not* to ... | |
Are you a janitor, or a cleaner? | Matthew Hoy , John Stauffacherm | In the wake of several major commercial breaches “DEFENDING” is the new hot topic. The ... | |
Infosec in the 21st century | Tim Crothers | Most organizations are using a security model developed in the 60′s and 70′s and expecting ... | |
Bringing PWNED To You: Interesting Honeypot Trends | Elliot Brink | Honeypots, how much do you know about them? Have you ever run one? I wanted ... | |
Beating the Infosec Learning Curve Without Burning Out | Scott Thomas | So you have made the decision to get into Infosec and you’re going to be ... | |
The Challenge of Natural Security Systems | Rockie Brockway | Static security models and “business as usual” directives have naturally resulted in a collective eyes ... | |
Red Teaming: Back and Forth, 5ever | Fuzzynop | Whether you are on the red team, the blue team, or aspiring to either, you ... | |
Application Pen Testing | Chris Pfoutz | We’re all familiar with network pen testing, and many organizations port those processes and vendors ... | |
Reducing Your Organization’s Social Engineering Attack Surface | Jen Fox | This case study is a journey through the presenter’s experience compromising a Fortune-50 company at ... | |
Vaccinating APK’s | Milan Gabor | Number of mobile applications is rising and Android still holds large market share. As these ... | |
Hacking Android | Godfrey Nolan | This session looks at a variety of techniques for reverse engineering Android APKs as well ... | |
Vulnerable By Design – The Backdoor That Came Through the Front | Matthew ‘mandat0ry’ Bryant | With the popular use of free software developed by inexperienced programmers, security vulnerabilities are becoming ... | |
Lessons from the front lines: Top focus areas for information security leaders | Shogo Cottrell | Content will revolve around 4 strategies to help reduce risk & exposure: Actionable threat intelligence ... | |
How to budget IDS’s | Brian Heitzman | IDS Systems are the bane of all IT budgets. They spit enough information out that ... | |
OAuth2.0 – It’s the Implementation Stupid!! | Tony Miller | Recent media attention around “Covert Redirects” has stirred new concerns over an already identified weakness ... | |
CryptoRush – Rising from the Ashes | King Dragon | So you thought you knew everything about the digital currency world? Think again. CryptoRush, a ... | |
Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data | Todd Bursch | Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, Perimeter and ... | |
Memory Forensics with Hyper-V Virtual Machines | Wyatt Roersma | With the increased demand for Memory Forensics, and more people using Windows Hyper-V as a ... |