SaintCon 2014 Oct. 20, 2014 to Oct. 23, 2014, ogden,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
SECURITY, WE ARE DOING IT WRONG! Troy Jessup The network security industry started with the highest ideals and pure motives. It has deteriorated ...
PERFECT FUTURE SECURITY Pete Ashdown Last year, Mr. Ashdown detailed his history in dealing with governmental and law enforcement requests. ...
REGULAR EXPRESSIONS:THE LITTLE ENGINE THAT COULD(N'T)? David Oswald Regular expressions have moved well into the mainstream, with supporting libraries for most modern languages. ...
WHY HACK MOBILE? Jerrick Davis Learn Why Mobile Security Is So Important To The World And Why Malicious Hackers Target ...
CREATING PHISH-RESISTANT INTERNET SKEPTICS Bob Bayn Some phish message sneak past spam filters and tempt your user community to give away ...
MISCREANT TRENDS AND TACTICS:A LOT HAS CHANGED Troy Jessup We'll cover the latest thrends and threats from the miscreant community. Discuss the impact of ...
MAKING DATA LOSS PROTECTION/PREVENT (DLP) SEXY Paul Yates Companies are spending significant amounts of time and money securing the systems. This strategy leads ...
HOW TO BITE A BITCOIN Dave Taylor This session deals with the basics of cryptocurreny, including value, usage, production and protection of ...
PENTESTERS TOOLKIT:BUILDING GOOD PENTESTING TOOLS Troy Jessup Let's build your Penetration testing toolkit. We'll cover the tools and resources every pentester should ...
BUILDING A GLASS HOUSE:SECURITY FOR MODERN SOFTWARE PRACTICES Jason Chan DevOps, immutable infrastructure, microservices - these and other modern principles have changed software in many ...
AWS SECURITY TRAINING Jason Chan In this session, we'll discuss practical approaches to security in Amazon Web Services' public cloud ...
SECURITY ZONING:AN IN-DEPTH APPROACH Allen Fox , John Desha Illustrate the problems with a simple inside outside security model. Show and discuss the value ...
DOCUMENT EVERYTHING! DOCUMENTING DURING INCIDENT RESPONSE Daniel Taualii Your site has been hacked! Now what? Do you fix the problem? Or maybe you ...
RASPBERRY PI :GET SOME MORE PI IN YOUR DIET Jonathan M. Smith Get excited about Raspberry Pis!
MOBILE DEVICE AND BYOD IN EDUCATION,CHALLENGES AND THREATS Cory Stokes , Jack Erickson As more students begin to bring personal devices and connect these to an organization's network, ...
INCIDENT RESPONSE:UNDERSTANDING THE FORENSIC PROCESS Jeremy Cox Understanding and following the accepted forensic process is a major part of maintaining the integrity ...
RFID HACKING:ALL YOUR DOORS BELONG TO US Jeremy Cox And you thought those little black boxes next to all your doors were top notch ...
BASIC DISTRIBUTION AND ANALYSIS OF MALWARE Jeff Doty "I just clicked on something and now my computer is acting funny." Said your user/spouse/mother-in-law. ...
ALL THE SEXY OF THE SSL,THE NECESSARY EVIL? Sean Jackson You've always wanted to know just what's happening in the SSL handshake? Why do CAs ...
MEMORY GAMES:HOW TO GET AND ANALYZE MEMORY DUMPS Metacortex In this talk, we will take a look at how a computer uses its memory, ...
ELECTRONIC DATA AND GRAMA:GRAMA'S IMPACT ON YOUR DATA Rosemary Cundiff A discussion about the impact of Open Records Laws on electronic data for public organizations. ...
TOURING THE DARKSIDE OF THE INTERNET:A TOUR OF THE TOR NETWORK Metacortex In this talk we will cover Tor, Bitcoin, and Darknets. You will learn how to ...
VOIP SECURITY:HOW TO PREVENT EAVESDROPPING ON CISCO IP PHONE CALLS Dmitry Dessiatnikov VoIP inherited security issues of the Internet protocol that did not exist in the PSTN ...
DELEGATED VULNERABILITY MANAGEMENT:"YOU BROKE IT, YOU FIX IT!" Corey Roach This presentation will reveal how with a metrics dashboard, a self-service scanning portal, public shaming, ...
GETTING WINDOWS TO PLAY WITH ITSELF:HACKER'S GUIDE TO API ABUSE Brady Bloxham Let's get Windows to play with itself nonstop by analyzing the functionality of seemingly benign ...
WHY SECURITY POLICIES AND PROCEDURES FAIL:AND HOW TO FIX THEM Brady Hogan We all have heard that security policies are important but often they are hard to ...
NMAP IDLE SCAN:MISDIRECTION AND NETWORK RECONNAISSANCE Forrest Barth The idle scan function of Nmap utilizes address spoofing in headers to make a port ...
IPTABLES FOR EVERYONE Scott Nielsen IPTables can be difficult to understand for the inexperienced. This presentation will help demystify how ...
HACKING LIKE A THREE YEAR OLD:A LOOK INTO THE HACKER MINDSET Dan Harper Have you ever wondered what a hacker sees when he looks at a computer? Do ...
BURSTING BUBBLES AND BYPASSING BIG BROTHER Trenton Anderson We'll discuss why privacy is necessary in a free society, threat modelling, the importance of ...
HOBBLED PENETRATION TESTING Jason Wood This presentation will cover how penetration tests are being performed and restricted, how we can ...
CANDY SHELL SECURITY AND THE MESS IT MAKES Aaron Bishop Focusing on external security while ignoring internal security creates as much risk if not more. ...
WHY THE STATIC PASSWORD IS DEAD Aaron Toponce This presentation looks at the weaknesses of static passwords & updates us on the latest ...
THE MATHEMATICS OF PASSWORDS Aaron Toponce This presentation looks at why static passwords are failing in the marketplace, and what can ...
A TOUR OF ISACA Dan Anderson A tour of ISACA will delve into the 5 ISACA certifications including CISA, CISM, CGEIT, ...
WHAT IS THE VALUE OF CERTIFICATION? Dan Anderson What is the value of Certification will talk about IT Certifications in general, some of ...
NO MORE DDOS PLEASE!!KEEPING YOUR IP NETWORK PREFIXES CLEAN Cassidy Larson DNS/NTP DDoS attacks were all the rage recently, but they're still happening. We will detail ...
WHY PUBLIC ENTITIES NEED TO INVEST IN CYBER SECURITY Mark Vanorden We'll discuss the the reasons and benefits to invest in cyper security, even if they ...
ARE YOU FOCUSED ON THE RIGHT THINGS?THE 5 THINGS EVERY SECURITY OFFICER SHOULD BE FOCUSED ON RIGHT NOW! Tim Hastings "What if I am hit with the next big zero-day vulnerability? How do I communicate ...
SANS 20 CRITICAL SECURITY CONTROLS Jason Reverri Using a framework to prioritize security projects and spending is paramount. This talk will give ...
LONG TIME WINDOWS, FIRST TIME LINUX Jason Tracy Weather you're new to Information Security or you've been in IT forever; this presentation is ...
SECURITY ARCHITECTURE OVERVIEW Jason Tracy This is a deeper dive into what it takes to organize and run a security ...
GETTING AD TO BEHAVE WITH THE CLOUD ,TOP 10 TRENDS & MISTAKES Adam Steed From integration with HR systems or Salesforce. Active Directory is being asked to support more ...
SECURITY BY LANGUAGE DESIGN Gavin Howard Our entire software stack is vulnerable to attack. This presentation is about how we can ...
SECURITY COMMUNICATION PLANNING Rich Finlinson The way your organization communicates during and after a critical incident can make the difference ...
TRANSPARENCY: A CASE FOR WEARING THE EMPERORS NEW CLOTHES Chris Henderson Our data is being turned over and controlled by 3rd parties. We've left data security ...
BADGE 101,WHAT HAS BEEN HAPPENING IN #TOPSECRECY Luke Jenkins A quick rundown of this year's badge. Purposefully being obtuse with this one. I might ...
THE 2014 SAINTCON BADGE Luke Jenkins You've [REDACTED] your badge, now learn about the process of creating it. I'll go over ...
SQL INJECTION:SYSTEM ACCESS ON LINUX APACHE MYSQL AND PHP Lance Buttars What to understand SQL injection and how it effects your applications? Ever wanted to know ...
BUILDING APPSEC,PEOPLE VS. TECHNOLOGY Seth Law Strategies, tools, and techniques for implementing an effective application security program. Alternatively, a how to ...
THE INEVITABLE VULNERABILITY Seth Johnson There is one vulnerability common to every system we know of -- humans. Social engineering ...
DRONES BEHAVING BADLY Cuanticosec A review of the past few years of rapid technical progress of the civilian /consumer ...
PSEUDONYMOUS,HOW EVERYONE LEAKS THEIR IDENTITY ONLINE Jesse Harris From incognito mode to a clean machine with Tor, there's many ways you can carelessly ...
HACKERS CHALLENGE REVEAL:SOLVING THE PUZZLES YOU HAVEN'T Jeremy Cox An overview of The Hacker's Challenge game. Game winners will be announced. There will be ...
HACK YOUSELF MOAR! Mike Spicer Many dangerous threats to your infrastructure are simply unknown. This presentation will build on the ...
TEACH THEM TO HACK:TEACH THEM ALL Dan Daggett Last year, SocialGeeks presented with a group of high schoolers. This year we will speak ...
FEEDING THE SHARK:DEEP PACKET INSPECTION WITH WIRESHARK Jeremy Pierson N/A
WIRELESS SECURITY:HOW BAD IS IT? Seth Johnson There are a number of vulnerable points in wireless network security. This presentation will cover ...
SECURITY BY ACCIDENT Kelly Genessy N/A
PRIVACY BADGER AND DNT LETS BUILD A BETTER WEB Cooper Quintin In this talk Cooper will introduce the design and implementation of Privacy Badger, EFF's new ...
ALL KEYED UP!FUNDAMENTALS OF PHYSICAL KEYS Joseph Devereaux You've visited the Lock Pick Village and opened everything (without a key), now learn the ...