thotcon 2016 May 5, 2016 to May 6, 2016, Chicago,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attack of the Clichés Robert Graham Increasingly, it appears that infosec professionals are being abducted by aliens and replaced with Markov ...
35 Years of Cyberwar: The Squirrels are Winning Cyber Squirrel 1 Despite years and years of rhetoric concerning the weaknesses in the electronic defenses of the ...
Extrapolating from Billions of Access Security Events Jon Oberheide , Michael Hanley At Duo, we see billions of authentication and access events each year from tens of ...
“Crimewave 101“ Vyrus What is “crimeware”? Crimeware is software designed exclusively to commit crime. Usually (but not always), ...
Cleaning up Magical Crypto Fairy Dust with Cryptanalib and FeatherDuster Daniel Crowley The gap between academic development of cryptanalysis techniques and their practical application is wide. The ...
ARRR Maties! A map to the legal hack-back Natalie Vanatta Defense of the nation (and by extension its citizens) is the only task that the ...
OPSEC on the Darkweb: The good, the bad and the ugly Nick Espinoza , Zach Flom Recorded Future analysts have analyzed how the dark web (TOR) is being used for the ...
Privacy's Past, Present and Future Robert Lei I believe in privacy not paranoia. Come join me on an adventure through the history ...
Hack All the Candidates Jonathan Lampe For the past 18 months, Jonathan Lampe has been explaining how IT security professionals can ...
Security ResPWNses - Do and Donts of security disclosures Daniel Liber In the modern era, breaches have become (unfortunately) a matter of daily news. The recent ...
Real solutions from real incidents: save money and your job! Guillaume Ross , Jordan Rogers This talk will cover scenarios from real incidents and how simple solutions that are very ...
The Complete ESP8266 Psionics Handbook Joel Sandin The ESP8266 SoC has fast become a hugely popular platform for developing IoT applications. The ...
Knox: Dealing with Secrets at Scale Devin Lundberg Key management is a fundamental piece of security infrastructure. As companies scale, the number of ...
Overcoming Imposter Syndrome (even if you’re totally faking it) Jesika Mcevoy Imposter Syndrome has been oft discussed in the context of gender or other minorities and ...
Securitygenic: Fighting User Apathy and Indifference Chris Carlis We, as information security professionals, are not good at convincing people to care about information ...
Playing with Pictures: Adult Coloring on the Internet Rob Weiss , John Eberhardt We approach analytics as an extension of the human brain, rather than trying to make ...
Turning Credential Harvesting Into Credential Clearcutting: Phishing 2FA Systems Jp Smith , Eric Hennenfent Two-factor authentication is being touted by many as the "next big thing" in security, and ...
Prime Time Cyber Heists – Reporting from the Trenches! Jibran Ilyas In this era of Advanced Persistent Threats (APT), organizations have increased spending on IT security, ...
Cyber Vulnerabilities of America's Pipe Lines Paul J. Vann This is Paul Vann(the younger one from Schmoocon) and I just wanted to let you ...
“You sunk my battleship!” David "videoman" Bryan This talk will cover breaking out of a Docker container, and other fun things that ...
Don't be stupd on GitHub Metacortex You may be surprised (you probably shouldn't) at all of the sensitive information people put ...
Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features Ronnie Flathers Passwords are weak, and generally speaking, the less a company relies on them, the better. ...
Improving mobile security with forensics, app analysis and big data Andrew Hoog The velocity of change in the mobile ecosystem requires a new techniques to secure mobile ...
Corporate Espionage Without the Hassle of Committing Felonies John Bambenek Pentesters and corporate spies alike have a desire to get their hands on the secret ...
Social Untrust Vaagn Toukharian Value of the information is stressed enough in concerns of the modern technocrat society. Information ...
Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools Grecs In the presentation that threat intel vendors do not want you to see, open source ...
Mo Money Mo Problems: The Clean(ish) Cashout Benjamin Brown The hardest part of cybercrime is the cashout. The strategy for cashing out needs to ...
A Major New Trend in the Enterprise is Whitelisted Proxies Parker Schmitt , Matt Dyas , John Valin Enterprises (and by enterprise we mean large companies, not java) love their perimeter because, well, ...
Cybersecurity Research: Pushing the Boundaries Anita Nikolich The National Science Foundation (NSF) funds $70M annually across all cybersecurity research areas, including cryptography, ...