SourceBoston 2015 May 27, 2015 to May 28, 2015, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Mike Murray , David Kennedy , Jim Routh N/A
A Swift Teardown Jared Carlson "This talk centers on understanding Swift, Apple's new language for iOS and OS X development. ...
All That Cybers Is Not War Brendan O'Connor , John Linwood Frightened by people saying "the Geneva Conventions don't apply" to the Internet? Confused by vendors ...
iROP - Interesting ROP gadgets Xiaoning Li Today ROP based exploits are still very popular. Security solutions including EMET/KBouncer have designed different ...
Bugged Files: Is Your Document Telling on You? Daniel Crowley , Damon Smith Certain file formats, like Microsoft Word and PDF, are known to have features that allow ...
Using NLP to detect phishing and APT CnC domains Jeremiah O'connor Spoofed branded domain names have been equally used in mass phishing campaigns and as CnC ...
Embedded Insecurity: Can We Fix The Internet of Evil Things? Paul Asadoorian While many have proven the threat of embedded systems, or IoT as "they" say, the ...
Getting the most from your managed security providers Josh Feinblum , Wade Woolwine How can you effectively leverage a third party provider in your incident response program? In ...
Protecting your cloud server with a cloud IDS Josh Pyorre Most cloud providers don't provide any kind of intrusion detection or other advanced security solutions. ...
Rebuilding the Credibility of a Security Team Paul Davis Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced ...
Defending the Enterprise with Evernote Salvador Grec Most people are already familiar with Evernote. It’s easy to just throw all our miscellaneous ...
Selling for Security Professionals Stephanie Losi How can security professionals talk to business executives in their language? Business managers may focus ... IncludeThinkstScapes
Penetration Testing in the Cloud Dan Lambright This talk discusses challenges associated with ensuring your infrastructure is secure in the cloud. Cloud ...
Adversary Profile: Gothic Panda Silas Cutler CrowdStrike has been actively tracking an advanced adversary group known as Gothic Panda. Known for ...
Improving the State of Healthcare Information Security as a Security Investigator Roy Wattanasin The time has begun. You have already heard about these warnings from the news and ...
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols Catherine Pearce MultiPath TCP (MPTCP) is an extension to TCP that enables sessions to use multiple network ...
Quantifying cyber attacks - to optimize and assess your defense Jason Syversen This talk will describe the challenges of quantifying offensive and defensive capabilities and posture. This ...
Growing Up: A Maturity Model and Roadmap for Vulnerability Management Eric W. Cowperthwaite There are differences between each of the high-profile hacks you’ve seen in recent headlines, but ...
Monitoring Social Media in 5 Minutes a Week Dakota Nelson Physical reconnaissance is constantly getting easier - now, your employees are on the attacker's side! ...
Reactive JS Security Testing & Exploitation Matt Wood JavaScript applications continue to become more and more complex. With real-time collaboration in mind and ...
MQTT, CoAP, and Building Secure Things Jack Mannino In this presentation we will explore two of the most commonly used IoT protocols, MQTT ...
iOS App Analytics VS Privacy: An analysis of the use of analytics Guillaume Ross As developers attempt to tailor their applications to customers, obtain more information about how they ...