BSidesSeattle 2014 Dec. 13, 2014 to Dec. 13, 2014, seattle,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Identifying the Insider Threat Duane Blanchard Some 97% of people are going to behave prosocially just because they're well adjusted, or ...
How to Grow A Hacker David Shaw It’s hard to break into information security, but it can be even harder to improve ...
Shoulda, Woulda, Coulda Birgit Mullen We read about breaches all the time in the news. They’re getting harder and harder ...
Council of Internet Wizards Panel Come discover what mysteries will be unfolded. The council convenes to discuss the important internet ...
YOU CAN FIND THE MOST ADVANCED MALWARE, EVEN THE SNEAKY NSA STUFF WITH THIS METHOD Hackerhurricane It took months to years to discover BlackPoS/BackOff, Stuxnet, Duqu, Flamer and WinNTI. Why isn’t ...
ShellForth - Shell-code cross-compiler for Forth Dave Weinstein Forth. One of the oldest computer languages. Once a stalwart of the embedded software development ...
Attack ships on fire, C-beams glittering in the dark, and other things you people wouldn't believe Andy Robbins We've... seen things... you people, may not believe. In this talk, we will share stories ...
Defensive talks NOT “sexy”? What’s sexier than catching an attack like Target, APT, SET or your Pen Tester? Let me show you some sexy logging Hackerhurricane Lack of defensive talks at Cons and the misconception they are not “sexy” is why ...
WTFPGA Joe Fitzpatrick You can probably whip up to print “Hello World” or program a micro controller to ...
Intro to Arduino Matt Duharte Have you heard about Arduino and wondered if it is right for you maker and ...