BSidesSLC 2015 March 20, 2015 to March 21, 2015, Salt Lake City,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE BREAKING in BAD! (I'm the one who doesn't knock) | Jayson E. Street | I’ve come to realize that while I may not do a lot of social engineering ... | |
What To Do When "Something Bad" Has Happened | Jason Wood | Someone calls you up and asks you to check out a system. "It's acting weird ... | |
Drones Behaving Badly | Jon | A review of the past few years of rapid technical progress of the civilian & ... | |
Fighting Hardware Attacks With Software | Doktor Unicorn | When a program is executed, it causes subtle changes in the physical state of the ... | |
Bad USB Weaponized | Steve Fink , Dan Anderson | Explore the world of Bad USB. How to build, deploy, and optimize the Bad USB ... | |
Social Engineering: The Good, the Bad, and the Ugly | Stephanie Carruthers | Stephanie will be sharing her experience at DEF CON last year, where she won the ... | |
Building AppSec In | Seth Law | Strategies, tools, and techniques for implementing an effective application security program. Alternatively, a how to ... | |
Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For | Joshua Danielson | Applying security standards consistently across environments has typically been a struggle for security practitioners. Maintaining ... | |
The Secret Lives of Debuggers | Lance Buttars | Binaries are files like any text file or a bitmap. They can be modified and ... | |
Malware Fun | Kenny Long | Common malware techniques will be displayed and discussed | |
Psst, Come Check Out My Lair!! #notacreeper | Justin Larson | Are you a lone wolf pentester or do you run in a pack? Lair will ... | |
You Must Search Before You Destroy | Adam Steed | Its amazing what you can find out about a target using public information from the ... | |
Hey Guys, I'm a Pentester! | Metacortex | It seems like everyone wants to be a pentester. And for good reason...exploitation is sexy ... | |
Infosec, just doing it. | Robert Jorgensen | Want to break into infosec or get out of your current infosec rut? This talk ... | |
The Inception Framework: Cloud Based Targeted Attack Infrastructure | Waylon Grange | During the summer of 2014, we discovered a highly automated and extremely sophisticated framework for ... | |
Asymmetric Warfare and Corollaries in Network Defense | Jason Tracy | Years ago the concept of Asymmetric Warfare was adopted in Military Defense Circles as a ... | |
Feeding The Shark | Jeremy Pierson | How and where to get packets. Let's talk about Linux, Windows, Switches, Firewalls and more. ... | |
Leading Change | John Overbaugh | Change is difficult, especially cultural change. As security leaders, our biggest challenges are often in ... | |
From Vim Muggle to Wizard in 10 Easy Steps | Erik Falor | Vi is more than just a text editor; it has become a way of life ... | |
Fundamentals That Time Forgot | Jup1t3r | We'll discuss the fundamentals of network security that many people continue to ignore as fundamentals. ... | |
Manipulating GUI Elements | Deven Fore | Line of Business applications are often designed without the best security practices in mind. Through ... | |
Cloud Security | Scott Arveseth | The Cloud is here to stay. Organizations are moving to the cloud to reap the ... | |
How to Prevent Eavesdropping on Office VoIP Calls | Dmitry Dessiatnikov | Voice over Internet Protocol (VoIP) allows for the voice and multimedia traffic to be sent ... | |
Authenticode in-depth | Scott Piper | Code signing provides a way for software publishers to identify an executable came from them. ... | |
PlagueScanner: An Open Source Multiple AV Scanner Framework | Robert Simmons | PlagueScanner is an open source framework for organizing any number of AV scanners into one ... | |
Trends In Exploit Kits | Jeffrey Doty | "Exploit Kits" are the software that perform driveby downloads. These kits are sold on hacker ... | |
Take Charge of Your Infosec Career! | Glen Roberts | You spent $5,000, a plane trip, a hotel and a full workweek on your last ... | |
RBAC is Dead. So now what? | Adam Fisher | Role based access control is a key part of any business security implementation. However, in ... | |
Security Onions and Honey Potz | Ethan Dodge | Set up a honey pot, tap your network, and see the script kiddies at work. ... | |
NGINX Can Do That? Test Drive Your Config File! | Jeff Anderson | I have had countless conversations with developers, projects managers, and even executives that end up ... |