BsidesColombus 2016 Jan. 18, 2016 to Jan. 18, 2016, columbus,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Where Did All My Data Go | Deral Heiland | In today's fast paced business world we wheel and deal in information (Personal, intellectual property, ... | |
Developers: Care and Feeding | Bill Sempf | We've all seen it. Perhaps some of us have done it. Pentest report comes in. ... | |
Open Secrets of the Defense Industry: Building Your Own Intelligence Program From the Ground Up | Sean Whalen | Respond proactively to threats like a defense contractor. It’s more realistic than you might think! ... | |
The Economics of Exploit Kits & E-Crime | Adam Hogan | I will discuss how the market for exploit kits has been changing, in techniques, marketing ... | |
Hacking Corporate Em@il Systems | Nate Power | In this talk we will discuss current email system attack vectors and how these systems ... | |
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches | Valerie Thomas , Harry Regan | Each year companies spend thousands of dollars on sophisticated security systems to ensure their secrets ... | |
Establishing a Quality Vulnerability Management Program without Wasting Time or Money | Zee Abdelnabi | • Sell the story to establish your program to management. • Compare Vulnerability Management (VM) ... | |
Practical DLP Deployment for your Organization | Jon Damratoski | A practical, real-world approach to deploying Data Loss Prevention into your organization. How to define ... | |
The Good The Bad and The Endpoint Protection | Joseph Ciaravino | The Good, The Bad, The Endpoint Protection When it comes to the security world we ... | |
Securing Docker Instances | Chris Huntington | Docker instances present an additional threat vector not covered by many security programs. Allowing DevOps ... | |
Better SIEM Notifications - Making Your SIEM Situationally Aware | Jesse Throwe | Tired of coming in every Monday to a slew of false positives from your SIEM? ... | |
Social Media Correlation of Credit Card Fraudsters | Chris Cullison , Cw Walker | Social media gives credit card fraudsters an ideal platform to advertise their wares and monetize ... | |
Removing Barriers of Diversity in Information Security | Connie Matthews , Helen Patton | As the demand grows in InfoSec, how can we attract women and a diverse workforce? ... | |
Panel Discussion: InfoSec Trends, Talent Management, and Retention | Michael Butts , Aj Candella , Megan Wells | TEKsystems is a leader in IT staffing and services. We have a specialized model and ... | |
Indecision and Malformed Conclusions: The things that stifle security improvement and what can be done about them. | Tyler Smith | I often see various forms of dysfunction that have a negative impact on project execution ... | |
Gamify Awareness Training: Failure to engage is failure to secure | Michael Woolard | We call it security awareness training, but all we ever give our employees is regurgitated ... | |
The Long and Winding Road: An InfoSec Career Panel | Valerie Thomas , Lonnie Kelley , Mike Spaulding , Chad White , Israel Arroyo | With a combined InfoSec experience of almost 90 years, the speakers have come a diverse ... | |
The Pineapple is dead..Long live the Pineapple | David Young | This talk will cover using the WiFI pineapple. Now that many sites us HSTS, is ... |