SourceDublin 2015 Sept. 7, 2015 to Sept. 8, 2015, Dublin,Ireland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Aqua Vitae: The Water of Life Martin Mckeay Whiskey is just like security. This statement might be a slight bit of hyperbole, but ...
Lessons from the Dojo: The Karate of Software Security Paco Hope We can both learn and teach software security the way we learn and teach martial ...
Supplier Security Risk Assessment - A Practical Guide Marian Ventuneac The success of a business is often linked to identifying reliable and cost-effective services suppliers. ...
It isn't all foggy in the Cloud! Digital Forensic Investigations in the Cloud Neha Thethi There is a considerable amount of research being conducted in the area of cloud forensics. ...
OWASP Security Knowledge Framework Glenn Ten Cate The OWASP Security Knowledge Framework is intended to be a tool that is used as ...
Fun with Exploiting XML External Entity Expansion Georg Chalupar In some cases, XXE (XML External Entity) processing vulnerabilities allow to get directory listings and ...
Secure software, start appreciating your developers! Martin Knobloch Over the years, I have been visiting quite some security conferences and got more and ...
Chasing Uniqueness, Understanding Normal Neil King A presentation that looks at why understanding what is normal for your business helps you ...
3rd Party Applications – A Supply Chain Security Nightmare Matt Bartoldus This talk discusses why the need for both technical and process related assurance activities when ...
The Flaws in the Onion: What does Context-Aware Next-Next Generation Security Look Like? Gary Newe The perimeter has moved to the end device and our current way of protecting the ...
Fast & Secure Application Development - Is it possible to have both? Fabio Cerullo The success of a business is often linked to identifying reliable and cost-effective services suppliers. ...
No one is coming to save us. We are all the Cavalry Claus Cramon Houmann All systems fail; there is no system without flaw. Each connection and dependency exposes the ...
8 Pragmatic Steps to Supply Chain Risk Management Richard Hollis Did you know that over 75% of data breaches are associated with a trusted 3rd ...
Creating REAL Threat Intelligence ... with Evernote Salvador Grec In the presentation that threat intel vendors do not want you to see, threat data ...
Security research should help not hurt Claus Haumann The hack.lu motto of 2014 was: “Within a few months of its availability, new technology ...
Hacking the Machine: From the Outside In Owen Pendlebury This talk will discuss the common pitfalls/security misconfigurations made when deploying physical devices (laptops, tablets ...
Dance Band on the Titanic: The Data Loss Iceberg Principle Richard Hollis What if everything we’re doing to secure our data is for naught? Have you stopped ...
Fifty Shades of Malicious Macros Gianni Gnesa In recent years, malicious documents have been used extensively to break into companies and organizations ...
Security Analytics: Why Mathematics Alone is Not Enough Matthew Hathaway The security industry always has new buzzwords that are quickly adopted by vendors hoping to ...
Keeping secrets: protecting privacy in mental health David O'callaghan Your state of mind is private. You should be in control of what you reveal ...