Saintcon 2015 Oct. 26, 2015 to Oct. 30, 2015, uah,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
PSEUDORANDOM NUMBERS Aaron Toponce I will be discussing random and pseudorandom numbers. I'll talk about how to implement them ...
WHAT IS A BETTER PEN TESTING TO LINKEDIN OR NMAP Adam Steed , David Steeby Detailed Outline: Management Just Assumes We spend more money than our competition does on security ...
MANAGING COMPLIANCE IN A DEVOPS ENVIRONMENT. Adam Wingate This technology-agnostic presentation will highlight key considerations when managing compliance in a DevOps organization. Many ...
IF YOU SEE SOMETHING, SAY SOMETHING - INCIDENT RESPONSE TO PHYSICAL INCIDENTS Andrea Grover An overview of the difficulties of responding to an information security incident stemming from physical ...
STUPID MALWARE TRICKS: THE WEIRDEST WAYS ATTACKERS BYPASS YOUR DEFENSES Andrew Brandt It's easy for security professionals to laugh off malicious spam filled with misspellings, phishing pages ...
EVENTS—WHERE THEY OCCUR AND WHERE YOU FIND THEM Angela Horneman Intuitively we have the understanding that a security event is something bad. However, what does ...
INTRO TO HACKING WEB APPS Brent White Assessing the security posture of a web application is a common project for a penetration ...
PROTECTING END-USERS AND DEVICES: THE EBOLA PROTOCOL Bryan Hendricks The 2014-2015 flare up of the Ebola Virus reportedly killed 11,298 people as of 11 ...
OSX ARCHAEOLOGY: BECOMING INDIANA JONES WITH OSXCOLLECTOR AND STRATA. Chris Henderson , Justin Larson Companies who have large install bases of OSX have had little to worry about with ...
TRACKING GHOSTS THROUGH THE FOG Chris Larsen Digital footprints have always been hard to follow. Now it feels more Like tracking ghosts. ...
HIPAA COMPLIANCE AND THE OCR ENFORCEMENT Dan Anderson Latest trends and key areas that the Office of Civil Rights (OCR) is focused on. ...
UNDERSTANDING MALWARE EVOLUTION USING NEO4J Dan Jones Malware changes so quickly that it can be hard to keep up with current trends ...
ANTI-VIRUS SOLUTIONS SUCK Danny Howerton There are two types of people in this world; those that know Anti-Virus solutions suck ...
RANDOMNESS MATTERS David Oswald We all have some notion that 'rand' is not useful for cryptographic work, but here ...
YOUR MALWARE SUCKS AND YOU KNOW IT. Ethan Dodge Low interaction vs. high interaction honeypots, the debate is timeless -- or as old as ...
CISCO THREAT-CENTRIC SECURITY Gary Halleen , Mike Simone Changing business models, a dynamic threat landscape, and complex, fragmented security solutions call for a ...
OWNING YOUR EMPLOYEES FOR BETTER SECURITY Jake Schroeder Earlier this year, we decided to launch our first social engineering attack against our own ...
FBI CYBER CRIME AND CYBER TASK FORCE. James Lamardric A presentation on the current Cyber criminal trends the FBI Salt Lake City Cyber Task ...
BEYOND PCI : WHY (AND HOW) YOU SHOULD TAKE CONTROL OF YOUR PAYMENTS SECURITY Jason Hall PCI is one of the most common, yet most improperly handed parts of a systems ...
CYBERPATRIOT: HAVE FUN MENTORING THE NEXT GENERATION BLUE TEAM Jason Wood What the heck is CyberPatriot and why would I want to get involved in it? ...
WHAT DO YOU TRUST ON THE INTERNET? Jeff Anderson Come learn about software update systems, what type of attacks they are vulnerable to, and ...
CLOUD DEVICE INSECURITY Jeremy Brown Your data is much safer at home than it is letting some corporation "take care ...
THE HARD FACTS OF INTERNET CONTENT FILTERING Jeremy Cox What does it take to provide adequate internet content filtering. K-12 Institutions, Libraries, & ISPs ...
IT WAS THE BEST OF ENCRYPTION, IT WAS THE WORST OF ENCRYPTION - SSL IN THE REAL WORLD. Jeremy Pierson This presentation aims to provide a high level overview of SSL, PKI, demonstrating common use ...
CYBER INCIDENT RESPONSE MANAGEMENT: BREAKING GLASS Jc Cyber Incident Response Management: Breaking Glass If a fire broke out in your office, chances ...
THE STATE OF HTTPS: SECURING WEB TRAFFIC IS NOT WHAT IT USED TO BE. Jon Jarvis The practice of serving 'non-sensitive' or static websites over HTTPS has long been viewed as ...
VIRTUALIZATION SECURITY 101: BASICS OF SECURING A VIRTUAL INFRASTRUCTURE Joseph Devereaux We're doing Virtualization, but is it secure? We will discuss basic virtual design decisions that ...
OSINT: OH THE PLACES YOU'LL GO Jusitn Brown Open Source Intelligence (OSINT) is what many of us do on a daily basis. We ...
CROSS SITE SCRIPTING AND CROSS SITE REQUEST FORGERY A DANGEROUS COMBINATION Lance Buttars Cross Site Scripting is a vulnerability where an attacker can injecting malicious scripts in web ...
ALL ABOUT THE 2015 SAINTCON BADGE Klint Holmes , Luke Jenkins Are you enjoying that fancy piece of jewelry around your neck at SaintCON 2015? Come ...
WAR WALKING AT BLACKHAT && DEFCON Mike , Spicer , Henry Hill Gathering WiFi from the airwaves around us can be insightful and interesting. This talk will ...
WHAT YOUR CURRENT VULNERABILITY MANAGEMENT PROGRAM WON'T TELL YOU ABOUT YOUR SECURITY. Nate Mcconnell This presentation is on why RedTeam engagements should be part of every vulnerability management program. ...
ROCK YOUR SOCS OFF: NETWORK SECURITY MONITORING VALIDATION Scott Pack Security Operations depends on a stream of events, some provided by IDS, netflow, full packet ...
THE UNPREDICTABILITY OF BYOD Trent Fierro It's inevitable that you'll see a mixture of personal and corporate devices in today’s workplace. ...
BUILDING A SECURITY STRATEGY PERIMETER TO CORE – FIREWALL IS NO LONGER ENOUGH! Troy Roberts Exploring the elements of an advanced threat protection architecture and framework that secures all entry ...
FISHING TO PHISHING: ADVENTURES IN CHASING SLIMY CREATURES Wayne Crowder Fishing at a professional level shares a lot of traits with security professionals. An understanding ...