BsidesCleveland 2016 June 24, 2016 to June 25, 2016, cleveland,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Morning Keynote | Ian Amit | N/A | |
Ask a CISO | Jamie Murdock | There are a lot of different talks that are on specific topics, but it's not ... | |
Elementary, my dear Watson – A story of indicators | Nir Yosha | A real story of the cyber attack on the Israeli Police Department during 2012 and ... | |
Preventing credential theft & lateral movement after initial compromise. | Cameron Moore | You’ve done the patch work, you have good perimeter defenses, and even application whitelisting, however, ... | |
Fun with One Line of Powershell | Matthew Turner | This talk shows how to use one line of PowerShell in different ways to get ... | |
Crime Prevention Through Environmental Design | Michael Mendez | Learn how to use non-traditional design elements to enhance physical security. Capitalizing on environmental aspects ... | |
Better life through Models | Steven Legg | Models play a major role in our lives - we start using them as an ... | |
Learning From Pirates of the Late 1600s - The first APT | Adam Hogan | "In an effort of general threat intelligence I sought to understand what understanding of other ... | |
AfterNoon Keynote - Chris Roberts TBA | Chris Roberts | CSH and Senior Consultant, Sentinel Global Roberts is credentialed in many of the top IT ... | |
Security Automation in your Continuous Integration Pipeline | Jimmy Byrd | Developers use unit tests and acceptances tests in continuous integration (CI) to find bugs early ... | |
Playing Doctor: Lessons the Blue Team can Learn from Patient Engagement | J wolfgang Goerlich , Stefani Shaffer-pond | At CircleCityCon 2015 in the presentation “Turn Your Head and Cough”, Nathaniel "Dr. Whom" Husted ... | |
The Art of Bit-Banging: Gaining Full Control of (Nearly) Any Bus Protocol | Aaron Waibel | Most buses have dedicated hardware that a system uses to communicate with attached devices. This ... | |
The WiX Toolset, How to Make Your Own MSIs | Charles Yost | A 20 minute crash course on the basics of: Using the WiX Toolset to create ... | |
A Rookie PoV: The Hollywood Fallacy | Raquel Milligan | Most people have seen TV Shows such as CSI Cyber or Scorpion, just to name ... | |
Responder for Purple Teams | Kevin Gennuso | This talk will focus on the tool Responder and how it can be used by ... | |
Port Scanning the Hermit Kingdom: Or What NMAP Can Teach Us About Geopolitics | Thomas Pieragastini | This talk will center on a project that has been active since July 2015, which ... | |
Splunk for IR and Forensics | Tony Iacobelli | Data Analysis: it sucks. Make it not suck with Splunk, a 21st century approach for ... | |
Bridging the Gap or: How I Learned to Stop Worrying, and Love the Developers | Eric Mikulas | The relationship between security professional, and developers often seems adversarial. In this presentation I will ... | |
SafeCracking on a Budget Redux | David Hunt , Zack Nagaich | Lesson learned in applying knowledge from the "SafeCracking on a Budget" presentation. http://2014.ruxcon.org.au/assets/2014/slides/rux-safe-cracking.pdf. We had ... | |
Process Ventriloquism | Spencer Mcintyre | This talk will present and outline various techniques for the manipulation of processes at runtime ... | |
Gamify Security Awareness: Failure to Engage is Failure to Secure | Michael Woolard | We call it security awareness training, but all we ever give our employees is regurgitated ... | |
The Digital Beginning of the Analog End | Brad Hegrat | "Throughout human history, we have been dependent on machines to survive. Fate, it seems, is ... | |
Cleveland Locksport | Jeff ( Dark Tangent ) Moss , Doug Hiwiller | An overview of physical security - How locks work and how we pick them. | |
Cons and Conjurers: Lessons for Infiltration | Paul Blonsky | I will examine how the techniques of con artists and magicians are relevant to physical ... | |
State of Emergency: We're Under "Cyber" Attack | Jeremy Mio | When there is a natural disaster or catastrophic event... who ensures responsibility for recovery or ... |