HackMiami 2015 May 15, 2015 to May 17, 2015, Miami,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Securing The IoT World Aaron Guzman The notion of “secure by design” or “privacy by design” for IoT devices has been ...
We Can Do Better Than Bitcoin: Digital Currency as a Cure Blake Cornell Why shouldn’t we use the financial greed of the criminal underworld to cure neuroblastoma?Why shouldn’t ...
EgressAssess and Owning Data Exfiltration Chris Truncer , Steve Borosh Every organization with IT infrastructure wants to believe they have a firm grasp on the ...
Paying To Be P0wned! Dave Chronister Over the past year companies that have been breached have stayed in the headlines. One ...
KEYNOTE SPEAKER Dave Monnier N/A
DemonSaw: File Sharing Without Consequences Eijah We are at war. Governments and corporations continue to support legislation that revokes our personal ...
Malware Analysis: n00b To Ninja In 60 Minutes Grecs Knowing how to perform basic malware analysis can go a long way in helping infosec ...
Emergence of Hardware Botnets Jeremiah Talamantes The computing world has seen an explosion in the open source hardware project space. Companies ...
Introduction to IoT Security Michael Brown In the last few years, a wide range (and growing wider) of microcontrollers and single-board ...
Attacking Internet of Things Telemetry Michael Bennewitz In this hour long (20 min talk + 20 min demo + 10 min questions ...
IDS + Honeypots Making Security Simple Mobmane Everything you really need to know about IDS (Intrusion Detection Systems) Combining with HoneyPots. Deployment ...
Are “Branded” Vulnerabilities Helping Make the Internet a Better Place? Omar Santos If the vulnerability is sexy enough, it gets a name. If the vulnerability can make ...
Is Your Third Party Service Provider Vendor Management Program Good Enough? Patrice Coles TSP diligence is under increased scrutiny by regulators. Traditional programs have not been proactive, assured ...
Security of the First World & Espionage Rafael Fontes After all these scandals revealed on NSA agency, and espionage that plagues our privacy, we ...
Exploiting the Mind, Body, and Spirit: Welcome to the Matrix Rev. Dr. Proxy Rev. Dr. Proxy will take us into the true art of bio-hacking with new insight ...
OSINT for the Enterprise: Taking Action with Public Threat Intelligence Sam Kassoumeh This presentation will cover numerous ways that enterprises are able to leverage threat intelligence in ...
BioHacking: Implantable Chip Attack Vector Seth Wahle , Rod Soto Implantable electronic devices will allow hackers to breach the security of networks, infrastructure and personal ...
Modern Mobile Attacks: A Seismic Shift in Cyber Theft Yair Amit , Sharabani Do you connect to networks with your mobile device? If so, tune into this session. ...
Introduction to Hardware Hacking Tom Morris An introduction to electronic troubleshooting and repair techniques to help you keep your equipment running, ...
Moments in Tme (Pr0wnl1ng 0ld 5k00l) Sean M. Bodmer In this session attendees will revisit a series of assignments and missions supported by the ...