BSidesDelaware 2014 Nov. 14, 2014 to Nov. 15, 2014, Delaware,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Pros vs Joes CTF | Eric Arnoth | The Pros vs Joes CTF is a live combat Capture The Flag event. The Pros ... | |
IPLOG, ( A beginner's IDS for the WIN! ) | Nathan Gibbs | @Christ_Media IPLOG provides the beginner level sysadmin with actionable network intelligence, without the deployment and ... | |
Cook Like A Hacker! | Jim Gilsinn | @jimgilsinn Cook like a hacker, and I don’t mean Ramen noodles, take-out pizza, and a ... | |
Being the change, how to create secure end users | Michael Spurgeon | Learn how to transition employees into secure end users. We'll touch on computer security awareness ... | |
Compromising the Perimeter | Robert Chuvala , Keith Pachulski | @sec0ps & @dicipulus The presentation address the common methods and tactics used to physical penetration ... | |
That awkward moment you find out you're responsible for data preservation. | Ray Hawkins | Adding a business & legal critical function such as Data Preservation and e-Discovery support to ... | |
Password Cracking 101: An Introduction to Getting The Keys to the Network | Peter Clemenko Iii | @aoighost Passwords are the keys to the kingdom in the digital realm. The problem is ... | |
What Dungeons and Dragons Taught Me About Infosec | Joey | What can anyone possible learn about working in the information security world from a library ... | |
SDR ALL THE THINGS | Dntlookbehindu , Zero_chaosx , Simonj_dc | In this class, we'll review radio theory, antenna design, software defined radios, the tools used, ... | |
Security Shark Tank | Marcus j. Carey | As a member of the information security community, I know many smart people who have ... | |
Give Yourself a Hand 2014 | Infojanitor | Have you ever wondered what would happen if someone attempted to restrain you against your ... | |
Cyber Security and other Emergent Features of Self-Organizing Systems | Sven Brueckner | In the growing "Internet of Things” (IoT), more and more everyday objects are equipped with ... | |
Increasing Diversity in Tech | Women's Cyberjutsu | Look around the room and what do you see? A lot of white guys, right? ... | |
Space Rogue’s Happy Fun Time Hour | Space Rogue | Do you find yourself bored with most infosec talks and wish the speaker would just ... | |
Making everybody happy- security and compliance for third party vendors | Alex Muentz | Are you attempting to do security or compliance, either from a vendor management or vendor's ... | |
The Hacker Mystique | Aunshul Rege | The glorification of cybercrimes and cybercriminals in the media and popular culture has helped with ... | |
Project KidHack - Teaching Kids (and even some adults) Security through Gaming | Grecs | Wanna teach your kid to be a hacker but don’t know where to start? Security ... | |
Technology is worth 5% | Joshua Marpet | Building a startup in an accelerator, especially when connected to an open source project, is ... | |
Sharing: What the world knows about your network | Roy Stephan | No man is an island. We need to work better together in order to increase ... | |
Healthy Hacking Snacking | Jillian Goodman | Hacking brains are smart brains, but so are healthy brains! So, clearly being a healthy ... | |
Securing Your Assets from Espionage | Stacey Banks | Espionage at its root is a security concern. Consider, how many of your competitors are ... | |
Hacking your way to good eats on the road | Shalom 'spam' Silbermintz | Don't be reduced to a diet of fast food, powerbars, and energy drinks when on ... | |
No Matter Where You Go, There You Are - Security answers you may not remember you already know. | Bob Stratton | General Partner, Mach37 You've all heard the Santayana quote about forgetting the past and being ... | |
Making the case for encrypted Identity data | Karthik Bhat | Encrypting the identities of your customers and employees is important. It would seem to be ... |