Bsidesorlando 2016 March 12, 2016 to March 13, 2016, orlando,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote :: Fade from Whitehat… to Black Beau Bullock Internet of Things has become the biggest buzzword to come out from 2015. But there ...
This talk focuses on some recent attacks on IoT technologies and what we have learned from them. More interestingly, what kind of attacks do the experts speculate will happen when IoT is more prevalen Iot Security N/A Internet of Things has become the biggest buzzword to come out from 2015. But ...
Goodbye Data, Hello Exfiltration Itzik Kotler Penetration testing isn’t about getting in, it’s also about getting out with the goodies. In ...
Dox Yourself Samuel Greenfeld This talks starts out by looking at how companies have tried to authenticate people using ...
Advanced Persistent Awareness John K. Smith This talk describes how/why system owners need to start taking responsibility for their own security. ...
Third Party Tracking: How it works and how to stop it for good Cooper Quintin Almost everything you do on the web is being read and tracked. The web is ...
Red Team Yourself Thomas Richards So your organization conducts regular tests with $automated tool. Want to bring your security testing ...
Jailbreaks and Pirate Tractors: Reverse Engineering Do's and Don'ts Mitch Stoltz Taking things apart to figure out how they work is great fun at any age. ...
Pwning pwners like a n00b Jonathan Echavarria Cybercrime, blackhat hackers and some Ukrainians. If that doesn’t catch your attention, then stop reading. ...
Simulated Physics And Embedded Virtualization Integration Sk4ld The Simulated Physics And Embedded Virtualization Integration (SPAEVI, rhymes with gravy) methodology is designed for ...
Deconstructing The Cyber Kill Chain of Angler Exploit Kit Artsiom Holub N/A
Resume Building for Security Professionals Emori Medeiros Do you ever feel like your resume is holding you back? I can help you ...
Data Privacy: Legal Alphabet Soup Adamy Losey CFAA, CAN-SPAM, HIPPA, and CADRA are just a few of the many alphabet-soup acronyms that ...
The Wizarding World of SELinux Paul Arnold Dissolving the stigma surrounding SELinux and discussing how important SELinux is to hardened and trusted ...
History of Ransomware Dodi Glenn A recent study titled, “Battling the Big Hack” by IT professional network Spiceworks found that ...
Dress for the Job You Want (to fake) not the One You Have Ean Meyer Billions of dollars are spent globally on technical controls for information security. Most, if not ...
Cloud & Control: Where do we go from here? Caleb And Evan With so many people taking advantage of the cloud, no one really thinks about how ...
Custom Digital Forensics Tools in Python Evan Dygert In digital forensics, sometimes you get a case where the standard tools do not provide ...
Introduction to Custom Protocol Fuzzing Sanders Diaz Hunting for vulnerabilities in custom protocols can be shrouded in mystery to the novice. While ...
How to Social Engineer your way into your dream job Jason Blanchard This talk will cover how to social engineer or persuasively position yourself to be the ...
Network Forensics 101: N00b to Ninja 60 Minutes Grecs Knowing how to perform basic network forensics can go a long way in helping infosec ...
Wifi Tracking: Collecting the (probe) Breadcrumbs David Switzer Wifi probes have provided giggles via Karma and Wifi Pineapples for years, but is there ...