BsidesColombus 2016 Jan. 18, 2016 to Jan. 18, 2016, columbus,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Where Did All My Data Go Deral Heiland In today's fast paced business world we wheel and deal in information (Personal, intellectual property, ...
Developers: Care and Feeding Bill Sempf We've all seen it. Perhaps some of us have done it. Pentest report comes in. ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program From the Ground Up Sean Whalen Respond proactively to threats like a defense contractor. It’s more realistic than you might think! ...
The Economics of Exploit Kits & E-Crime Adam Hogan I will discuss how the market for exploit kits has been changing, in techniques, marketing ...
Hacking Corporate Em@il Systems Nate Power In this talk we will discuss current email system attack vectors and how these systems ...
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches Harry Regan , Valerie Thomas Each year companies spend thousands of dollars on sophisticated security systems to ensure their secrets ...
Establishing a Quality Vulnerability Management Program without Wasting Time or Money Zee Abdelnabi • Sell the story to establish your program to management. • Compare Vulnerability Management (VM) ...
Practical DLP Deployment for your Organization Jon Damratoski A practical, real-world approach to deploying Data Loss Prevention into your organization. How to define ...
The Good The Bad and The Endpoint Protection Joseph Ciaravino The Good, The Bad, The Endpoint Protection When it comes to the security world we ...
Securing Docker Instances Chris Huntington Docker instances present an additional threat vector not covered by many security programs. Allowing DevOps ...
Better SIEM Notifications - Making Your SIEM Situationally Aware Jesse Throwe Tired of coming in every Monday to a slew of false positives from your SIEM? ...
Social Media Correlation of Credit Card Fraudsters Chris Cullison , Cw Walker Social media gives credit card fraudsters an ideal platform to advertise their wares and monetize ...
Removing Barriers of Diversity in Information Security Helen Patton , Connie Matthews As the demand grows in InfoSec, how can we attract women and a diverse workforce? ...
Panel Discussion: InfoSec Trends, Talent Management, and Retention Michael Butts , Aj Candella , Megan Wells TEKsystems is a leader in IT staffing and services. We have a specialized model and ...
Indecision and Malformed Conclusions: The things that stifle security improvement and what can be done about them. Tyler Smith I often see various forms of dysfunction that have a negative impact on project execution ...
Gamify Awareness Training: Failure to engage is failure to secure Michael Woolard We call it security awareness training, but all we ever give our employees is regurgitated ...
The Long and Winding Road: An InfoSec Career Panel Valerie Thomas , Lonnie Kelley , Mike Spaulding , Chad White , Israel Arroyo With a combined InfoSec experience of almost 90 years, the speakers have come a diverse ...
The Pineapple is dead..Long live the Pineapple David Young This talk will cover using the WiFI pineapple. Now that many sites us HSTS, is ...