BSidesDetroit 2015 July 18, 2015 to July 18, 2015, Detroit,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Information Security Reconciliation: The Scene and The Profession Mark Stanislav Whether people want to admit it or not, there's a strong, concerning segmentation that's more ...
Level One: How To Break Into The Security Field Aaron Moffett I will be discussing tips on how to get employed in the InfoSec environment. I ...
Hacker High - Why We Need To Teach Computer Hacking In Schools Ron Woerner The latest studies show that we need more people with cyber smart skills, but many ...
Getting Started - Help Me Help You David Trollman You're pwnt. It's a Friday afternoon and you just got some sketchy email, some reporter ...
From Blue To Red - What Matters and What (Really) Doesn't Jason Lang Attention Blue Team! Have you ever been curious about making the jump to penetration testing? ...
Clear as F.U.D.: How fear, uncertainty, and doubt are affecting users, our laws, and technologies Christopher Maddalena Our technology is becoming easier to use and friendlier towards users who would struggle to ...
Data Breaches: Simply The Cost Of Doing Business Joel Cardella We've seen some pretty hefty data breaches since 2012, hundreds of millions of records from ... IncludeThinkstScapes
Eating the SMB Security Elephant - An ITSEC framework for small IT shops Austen Bommarito Small or one person IT shops don't have a large amount of resources to put ...
Enterprise Class Vulnerability Management Like A Boss Rockie Brockway A fluid and effective Vulnerability Management Framework, a core pillar in most Enterprise Security Architectures ...
Building a sturdy foundation - a program-based approach to IT Operations, Application Development, and Information Security in business Steven Legg Businesses today face challenges of many types: technical, strategic, interpersonal, the list could go on ...
Moving past Metasploit: Writing your first exploit Calvin Hedler So you want to be more than a script kiddy? Metasploit is useful, but it's ...
Does Education Improve Security in K-12 Daniel Falk Over the past several years, security training has become more prevalent in all industries as ...
Wielding BurpSuite: quick-start your extensions and automation rules Marius Nepomuceno This presentation is aimed at anyone who has used BurpSuite and knows the basics of ...