BSidesIOWA 2015 April 4, 2015 to April 4, 2015, Iowa,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Intro to Web App Testing with Mutillidae, Andrew Freeborn This presentation will introduce web application testing to aspiring security professionals as well as assist ...
Security Metaphors, Josh More There is a divide between the so-called "security/technical" people and the "business" people. We've all ...
Deconstructing the Catalog, Kenneth Johnson This talk will focus on the deconstructing the FileHistory Catalog that has been introduced in ...
Tricks, tips, and techniques to Exploit Kit/DRIVEBY analysis, hunting, protection, Will Metcalf A how-to guide for detection, analysis, replay, and protection from Drive-by downloads and Exploit kits. ...
Anatomy of a Full Scale Social Engineering Attack, Dave Nelson This session will show how to perform a full scale social engineering attack against an ...
Zombies on the Airwaves, Evan Davison 50 years of obsolescence hasn't taught us anything apparently! Get prepared for a modern day ...
Security by Design in a Continuous Deployment Shop, Nathan Gibson, Alex Hart, Nick Starke Continuous deployment is a practice used in software development to automate and improve the process ...
Hacking the Job Market, Josh More There is considerably more skill in the IT and security communities than is reflected in ...
Integrating Vulnerability Scanning into the SDLC, Eric Johnson The Agile and DevOps software development lifecycles present interesting challenges for application security. How can ...
Assessing Automated Malware Analysis, Jared Mclaren It seems that no network security model is complete without the addition of an automated ...
Adversarial Testing through Unconventional Offensive Breach Techniques, Dan Kottmann Traditional vulnerability scanners and pentests, although useful and valuable in an overall security program, generally ...