BSidesOrlando 2015 April 11, 2015 to April 12, 2015, Orlando,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: Yo Dog! I got some Regs for your Regs | Moses Hernandez | This talk is broken into 3 succinct interwoven topics. #1. Culture – (Our Backstory) We ... | |
Blockchain-as-a-service | Vikram Dhillon | Seamless integration of connected devices requires a fundamentally new architecture that can support multi-device data ... | |
Implementing Voice over IP in Security Competitions | Anthony Critelli | Security competitions are an important part of educating and providing simulated real-world information security experience ... | |
Take Charge of Your Infosec Career! | Glen Roberts | You spent $5,000, a plane trip, a hotel and a full workweek on your last ... | |
Hiding in Plain Sight: Building a Hidden Remotely Accessible Pentesting Platform | Ean Meyer | What if penetration testing programs went a step further? Once legal and ethical approvals are ... | |
Application Security Beyond Compliance | Scott Arciszewski | Every year, software security becomes more complex. New attack strategies are discovered, old ones are ... | |
Breaking the Speed Limit | Josh Ruppe | In the past few years digital speed limit signs (VSL, Variable Speed Limit) have began ... | |
Executive Order: Private Sector Cybersecurity Information Sharing | Christopher Martinez | This presentation is on the new Presidential Executive Order for promoting private sector information security ... | |
Threat Intelligence | Scott Sattler | How to source and gather Threat Intelligence and Integrate Threat intelligence into Enterprise Security Controls. ... | |
Keynote: Judgement Day | Johannes Ullrich | If watching hours of Science Fiction has taught us anything, then it is the fact ... | |
Quadcopter Workshop of DØØM | Jonathan Singer | Drones are the hot sh*t these days! Yeah, you can go and buy one from ... | |
Brainstorming Your Brand & Influencing Others | Christa Pusateri | “Brainstorming Your Brand” will focus on helping IT and Security professionals understand all of the ... | |
Keynote: The Scope of Cybersecurity – A View Forward | Jeremy Epstein | Thirty years ago the field of computer security was largely limited to operating systems security ... | |
National Cyber Range | Anne Tall | The National Cyber Range (NCR) is an innovative Department of Defense (DoD) resource originally established ... | |
Defense in Depth – A Mile Wide¸ A Mile Deep | Ryan Buenaventura | With all the different possible layers of Defense in Depth, security professionals often ask how ... | |
The NIST Cybersecurity Framework is coming! Are you ready? | Michael Brown | NIST (National Institute of Science and Technology) recently rolled out the Cybersecurity Framework (CSF) for ... | |
Attacking Kerberos: Kicking the Guard Dog of Hades | Tim Medin | Kerberos, besides having three heads and guarding the gates of hell, protects services on Microsoft ... | |
Getting involved to better the future | Tim Krabec | We’ve all hard of “I am the Calvary”. The goal is to get involved in ... | |
Destover: Inside the Malware at Sony Entertainment | Vincent Moscatello | Get ready to explore the exciting world of malware reverse engineering as we take a ... | |
Hiding your attacks with misdirection like <REDACTED> | Jonathan Echavarria | As technology progresses, governments have been using electronic means of attacks more and more to ... | |
Project KidHack – Teaching the Next Next Generation Security through Gaming | Grecs , Pupstrr | Wanna teach your kid to be a hacker but don’t know where to start? Security ... | |
What I know about your Company! Hacking LinkedIn Business Processes | Danny Chrastil | Business Intelligence is one of the many powerful types of information we can gather on ... | |
The State of Mobile Malware | James Shank | A lot of people have talked about the potential of mobile malware. This is real ... | |
Linux Forensics | Hal Pomeranz | This hands-on workshop is a rapid introduction to key artifacts and techniques for investigating compromised ... |