BSidesDelaware 2014 Nov. 14, 2014 to Nov. 15, 2014, Delaware,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Pros vs Joes CTF Eric Arnoth The Pros vs Joes CTF is a live combat Capture The Flag event. The Pros ...
IPLOG, ( A beginner's IDS for the WIN! ) Nathan Gibbs @Christ_Media IPLOG provides the beginner level sysadmin with actionable network intelligence, without the deployment and ...
Cook Like A Hacker! Jim Gilsinn @jimgilsinn Cook like a hacker, and I don’t mean Ramen noodles, take-out pizza, and a ...
Being the change, how to create secure end users Michael Spurgeon Learn how to transition employees into secure end users. We'll touch on computer security awareness ...
Compromising the Perimeter Robert Chuvala , Keith Pachulski @sec0ps & @dicipulus The presentation address the common methods and tactics used to physical penetration ...
That awkward moment you find out you're responsible for data preservation. Ray Hawkins Adding a business & legal critical function such as Data Preservation and e-Discovery support to ...
Password Cracking 101: An Introduction to Getting The Keys to the Network Peter Clemenko Iii @aoighost Passwords are the keys to the kingdom in the digital realm. The problem is ...
What Dungeons and Dragons Taught Me About Infosec Joey What can anyone possible learn about working in the information security world from a library ...
SDR ALL THE THINGS Dntlookbehindu , Zero_chaosx , Simonj_dc In this class, we'll review radio theory, antenna design, software defined radios, the tools used, ...
Security Shark Tank Marcus j. Carey As a member of the information security community, I know many smart people who have ...
Give Yourself a Hand 2014 Infojanitor Have you ever wondered what would happen if someone attempted to restrain you against your ...
Cyber Security and other Emergent Features of Self-Organizing Systems Sven Brueckner In the growing "Internet of Things” (IoT), more and more everyday objects are equipped with ...
Increasing Diversity in Tech Women's Cyberjutsu Look around the room and what do you see? A lot of white guys, right? ...
Space Rogue’s Happy Fun Time Hour Space Rogue Do you find yourself bored with most infosec talks and wish the speaker would just ...
Making everybody happy- security and compliance for third party vendors Alex Muentz Are you attempting to do security or compliance, either from a vendor management or vendor's ...
The Hacker Mystique Aunshul Rege The glorification of cybercrimes and cybercriminals in the media and popular culture has helped with ...
Project KidHack - Teaching Kids (and even some adults) Security through Gaming Grecs Wanna teach your kid to be a hacker but don’t know where to start? Security ...
Technology is worth 5% Joshua Marpet Building a startup in an accelerator, especially when connected to an open source project, is ...
Sharing: What the world knows about your network Roy Stephan No man is an island. We need to work better together in order to increase ...
Healthy Hacking Snacking Jillian Goodman Hacking brains are smart brains, but so are healthy brains! So, clearly being a healthy ...
Securing Your Assets from Espionage Stacey Banks Espionage at its root is a security concern. Consider, how many of your competitors are ...
Hacking your way to good eats on the road Shalom 'spam' Silbermintz Don't be reduced to a diet of fast food, powerbars, and energy drinks when on ...
No Matter Where You Go, There You Are - Security answers you may not remember you already know. Bob Stratton General Partner, Mach37 You've all heard the Santayana quote about forgetting the past and being ...
Making the case for encrypted Identity data Karthik Bhat Encrypting the identities of your customers and employees is important. It would seem to be ...