BSidesOrlando 2015 April 11, 2015 to April 12, 2015, Orlando,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Yo Dog! I got some Regs for your Regs Moses Hernandez This talk is broken into 3 succinct interwoven topics. #1. Culture – (Our Backstory) We ...
Blockchain-as-a-service Vikram Dhillon Seamless integration of connected devices requires a fundamentally new architecture that can support multi-device data ...
Implementing Voice over IP in Security Competitions Anthony Critelli Security competitions are an important part of educating and providing simulated real-world information security experience ...
Take Charge of Your Infosec Career! Glen Roberts You spent $5,000, a plane trip, a hotel and a full workweek on your last ...
Hiding in Plain Sight: Building a Hidden Remotely Accessible Pentesting Platform Ean Meyer What if penetration testing programs went a step further? Once legal and ethical approvals are ...
Application Security Beyond Compliance Scott Arciszewski Every year, software security becomes more complex. New attack strategies are discovered, old ones are ...
Breaking the Speed Limit Josh Ruppe In the past few years digital speed limit signs (VSL, Variable Speed Limit) have began ...
Executive Order: Private Sector Cybersecurity Information Sharing Christopher Martinez This presentation is on the new Presidential Executive Order for promoting private sector information security ...
Threat Intelligence Scott Sattler How to source and gather Threat Intelligence and Integrate Threat intelligence into Enterprise Security Controls. ...
Keynote: Judgement Day Johannes Ullrich If watching hours of Science Fiction has taught us anything, then it is the fact ...
Quadcopter Workshop of DØØM Jonathan Singer Drones are the hot sh*t these days! Yeah, you can go and buy one from ...
Brainstorming Your Brand & Influencing Others Christa Pusateri “Brainstorming Your Brand” will focus on helping IT and Security professionals understand all of the ...
Keynote: The Scope of Cybersecurity – A View Forward Jeremy Epstein Thirty years ago the field of computer security was largely limited to operating systems security ...
National Cyber Range Anne Tall The National Cyber Range (NCR) is an innovative Department of Defense (DoD) resource originally established ...
Defense in Depth – A Mile Wide¸ A Mile Deep Ryan Buenaventura With all the different possible layers of Defense in Depth, security professionals often ask how ...
The NIST Cybersecurity Framework is coming! Are you ready? Michael Brown NIST (National Institute of Science and Technology) recently rolled out the Cybersecurity Framework (CSF) for ...
Attacking Kerberos: Kicking the Guard Dog of Hades Tim Medin Kerberos, besides having three heads and guarding the gates of hell, protects services on Microsoft ...
Getting involved to better the future Tim Krabec We’ve all hard of “I am the Calvary”. The goal is to get involved in ...
Destover: Inside the Malware at Sony Entertainment Vincent Moscatello Get ready to explore the exciting world of malware reverse engineering as we take a ...
Hiding your attacks with misdirection like <REDACTED> Jonathan Echavarria As technology progresses, governments have been using electronic means of attacks more and more to ...
Project KidHack – Teaching the Next Next Generation Security through Gaming Grecs , Pupstrr Wanna teach your kid to be a hacker but don’t know where to start? Security ...
What I know about your Company! Hacking LinkedIn Business Processes Danny Chrastil Business Intelligence is one of the many powerful types of information we can gather on ...
The State of Mobile Malware James Shank A lot of people have talked about the potential of mobile malware. This is real ...
Linux Forensics Hal Pomeranz This hands-on workshop is a rapid introduction to key artifacts and techniques for investigating compromised ...