HouSecCon 2014 Oct. 16, 2014 to Oct. 16, 2014, houston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
ADVANCED ICS & EMBEDDED SECURITY WITH THE BRO PLATFORM Liam Randall The fastest growing network segment on modern networks are various classes of embedded devices- ICS ...
COMPUTER FORENSICS AND INCIDENT RESPONSE IN THE CLOUD Stephen Coty As most experienced security professionals know, effective incident response plans include physical access to servers, ...
STATE OF APPLICATION SECURITY PANEL Dan Cornell , Matt Johansen , Dan Kuykendall , Daniel Miessler , Greg Patton N/A
PARTNERS IN CRIME Andy Bennett This presentation will highlight the unique and expanding relationship between SHSU’s Center of Excellence in ...
PARTNERING PRIVATE INDUSTRY WITH GOVERNMENT FOR INFORMATION SECURITY Jason Gates ___- Background/Overview of the C3 Voluntary Program ___- Background/Overview of the NIST Cybersecurity Framework ___- ...
USING THREAT MODELING TO FIND DESIGN FLAWS Jim Delgrosso Software defects include both implementation bugs and design flaws. This session will give a few ...
MAXIMIZING YOUR TRAINING INVESTMENT Keli Hay You have a product and ideally you have customers giving you money to use the ...
DON’T BE A TARGET: WHERE ARE YOU ON THE THREAT & VULNERABILITY MANAGEMENT MATURITY MODEL? Todd Harris The bad guys have proven that they can go wherever they want, break in to ...
AT ALL COSTS: WALKING THROUGH COMMON HARDWARE ATTACK SCENARIOS Josh 'm0nk' Thomas Be it a corporate high-rise or an industrial control facility, the modern network is quickly ...
FUNDAMENTALS MATTER: A BRIEF INTRODUCTION TO RISK ANALYSIS FOR INFORMATION SECURITY Patrick Florer In this presentation, we provide a brief overview of some of the foundational concepts that ...
DDOS BOTNET: 1000 KNIVES AND A SCALPEL! Josh Abraham This talk will explore the latest DDoS attack techniques. Using recent and high profile DDoS ...
YOU CAN FIND THE MOST ADVANCED MALWARE, EVEN THE SNEAKY NSA STUFF WITH THIS METHOD Michael Gough It took years to discover BlackPos, Stuxnet, Duqu, Flamer and WinNTI. Why isn’t there anything ...
ONE-MAN SHOP: BUILDING AN EFFECTIVE SECURITY PROGRAM ALL BY YOURSELF Tim Mcguffin This talk is geared towards individuals who new to the field of security or have ...
PROFESSIONAL INCIDENT RESPONSE Brooks Garrett You built it; they broke it; now what? In this talk learn how to advance ...
THE INSECURITY OF THINGS Frank Weber Still in its infancy, the Internet of Things (IoT)is experiencing a myriad of growing pains ...
ZERO DAY AND TARGETED ATTACKS: PREPARING FOR THE INEVITABLE Andrew Brandt Advanced Persistent Threats: they are real and more prevalent than ever. The question is not ...
SUCCESSFULLY INTEGRATING WITH SIEM: REAL-WORLD CASE STUDIES Andrew Barnett Having a Security Information and Event Management (SIEM) solution to monitor your network is a ...
THE REAL INTERNET OF THINGS: HOW UNIVERSAL DAEMONIZATION WILL CHANGE EVERYTHING Daniel Miessler The Internet of Things is about online refrigerators the way the printing press was about ...
WHY KIDS CAN BE REALLY GOOD HACKERS? Reuben A. Paul 17 year old Russian teen made software used in Target hack that stole 110MILLION credit ...
Table Talk #1: - Penetration Testing: Beware of Script Kiddies William Bengston Security audits are becoming more frequent and common, whether by choice or required for compliance, ...
Table Talk #2:- Trash Talkin - IT Audit Guide to Dumpster Diving John Liestman One of the easiest and best value exercises in IT audit or security you can ...