BSidesRaleigh 2016 Oct. 20, 2016 to Oct. 20, 2016, raleigh,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Scaling Properties of Software and System Security | Paul A. Vixie | Humanity has been building and programming general purpose computers for about six decades now, with ... | |
Story of indicators - The Democratic National Committee (DNC) Hack | Neal Humphrey | A threat intelligence point of view of the Cyber Espionage Operation on the Democratic National ... | |
The Art of the Jedi Mind Trick | Jeff Man | The hacker/security community continues to struggle with how to get our message across to others. ... | |
CryptoMalware: The Persistent Ubiquitous Threat | Aaron Lancaster | Despite security technologies advancing to keep in-stride with increasingly sophisticated threats, many companies are still ... | |
Threat Hunting Through the Kill Chain | Chris john Riley , Tim Gurganus | Hunting is proactive searching for threats that may go unidentified by intrusion detection, log alerting, ... | |
CTFs - Not Just for Halo | Clayton Dorsey , Ray Doyle | Capture The Flag competitions present a unique opportunity to practice various information security problems and ... |