SkyDogCon 2015 Oct. 23, 2015 to Oct. 25, 2015, nashville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Remarks Skydog N/A
Multirotors for fun and hacking - Ron Foster Have you ever wanted to build a multirotor? lets demystify it for you, it is ...
Title TBD Jp Dunning , Scott , Alex Berta N/A
Punching HunterEK Miscreants Paul Burbage The Hunter Exploit Kit is a available for purchase in underground forums. This talk will ...
Hacking Grain! Jim Manley Ever wondered what the difference is between “whisky” and “whiskey?” Or what makes bourbon different ...
Everything You Know About Security Is a Lie Curtis Koenig Have you ever considered what it means to be secure? Is the concept of security ...
Staring Into the Light Josh Ruppe When you think of someone performing a standard man in the middle attack, what do ...
How to Not Cheat on Your Spouse: What Ashley Madison Can Teach Us About OpSec - l0stkn0wledge Joey Embarrassed spouses everywhere are scurrying for excuses about their infidelity. This refresher will look at ...
Fuzzing Basics Scott M Ever wanted to break software? You know you want to...it's fun! In this talk, I ...
Hacking the Job Market: Socially Engineering Hiring Josh More There is a lot more skill in the security community than is reflected in the ...
The Doorman Project Joel Hart This talk discusses scenarios when being able to remotely administer firewall rules is advantageous, but ...
x = x + 1; # Except when it doesn't Redvers Davies Remember the "good 'ol days" when rendering video took up 100% of your one CPU? ...
Business Email Compromise: The Next Billion Dollar Problem Mac New social engineering techniques driven by business email compromise are costing businesses hundreds of millions ...
TSA Luggage Locks: Details, Flaws & Making The Best Of A Bad Lock - IronGeek Adrian Crenshaw Every lock picker knows that the TSA approved Travel Sentry/Safe Skies locks are garbage, but ...
Security Lessons Learned Sponsoring a Sex Addict Sarah Clarke What happens when someone in your home comes to you and asks you to help ...
Meanignful Measurment: Feeding the Cyber FUD Monster - Phat Hobbit Ian Trump Fear, Uncertainty and Doubt (FUD) has become a staple in the cyber-attack measurement and reporting ...
Out of Denial: A 12-Step Program for Recovering Admins Paul Lee With massive data breaches being announced almost daily, the number of IT professionals moving into ...
Hacking Web Apps Brent White Assessing the security posture of a web application is a common project for a penetration ...
The Politics of Security Failures Tom Ruff A light-hearted comparison of how laser beam focus can result in serious problems. In software, ...