Anycon 2017 June 16, 2017 to June 17, 2017, new york,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments | Ronny L. Bull | Cloud service providers and data centers offer their customers the ability to deploy virtual machines ... | |
Red Team Yourself | Thomas Richards | So your organization conducts regular tests with $automated tool. Want to bring your security testing ... | |
Noob 101: Practical Techniques for AV Bypass | Jared Hoffman | The shortcomings of anti-virus (AV) solutions have been well known for some time. Nevertheless, both ... | |
OWASP Top 10: Hacking Web Applications with Burp Suite | Chad Furman | A fast-paced intro to the world of web application security. Briefly, I will summarize OWASP, ... | |
DIY Spy: Roll-Your-Own Covert Channels With Scapy & Python | Jennifer Allen | This is an educational track to teach newcomers to covert channels the concept of stealthy ... | |
Jumping the Fence: Comparison and Improvements for Existing Jump Oriented Programming Tools | John Dunlap | In this talk I will compare ROP compiler support for Jump Oriented Programming (“JOP”) across ... | |
The Stuffer | Ronny L. Bull , Sean Drzewiecki , Aaron Gudrian | The Stuffer is a utility which exploits the reserved bits and padding space of multiple ... | |
Jedi Mind Tricks: People Skills for Security Pros | Alex | People skills for security professionals but WAY MORE FUN! | |
Sniffing Sunlight | Erik Kamerling | Laser listening devices (laser microphones) are a well understood technology. They have historically been used ... | |
Bringing Home Big Brother: Personal Data Privacy in the Surveillance Age | Todd , Michele | Have you ever purchased something online and then seen an ad for a related item ... | |
Measuring the Efficacy of Real-Time Intrusion Detection Systems | Jeffrey Richard Baez | To solve the problem of attack detection in the cloud, Artificial Intelligence (AI) techniques can ... | |
Incident Response Evolved - A Preventative Approach to Incident Management | Aaron | The current threat landscape has been in a state of evolution that presents a significant ... | |
Making Friends for Better Security | Alex | Doing security well is difficult enough. Without internal allies, it can be damn well impossible. ... | |
To SIEM or not to SIEM: an Overview | Chris Maulding | In this talk, we will visit the questions I hear from clients and others, is ... | |
Thinking 1nside-the-B0x: Cyber Defense and Deterrence via How Hackers Think | Ernest Y. Wong | Since our Republic’s origins, Americans have demonstrated a speculative knack and considerable optimism that have ... | |
Problems With Elliptic Curves In TLS and SSH | Joe Testa | This presentation examines the elliptic curve parameters standardized by NIST in FIPS 186-2, which are ... | |
Let's Play Defense at Cyber Speed | Duncan Sparrell | Cyber-attacks are increasing in terms of sophistication, speed and dynamics. Advanced cyber actors (and even ... | |
Does DoD Level Security Work in the Real World? | Jeff | After spending nearly 13 years working for the Department of Defense, I ventured out into ... | |
Ermahgerd: Lawrs | Robert Heverly | When do you – and other coders, hackers, developers, and tinkerers – think or worry ... | |
Real Security Incidents, Unusual Situations | Adam Dean | The pace of databreaches has reached epic proportions. Organizations large and small, in every industry ... | |
Breaking is Bad: Why Everyone at This Conference Will be Unemployed | Reg Harnish | The truth is hard to swallow sometimes, but the reality is this: PENTESTING IS DEAD. ... | |
Top 10 Issues in Cybersecurity & Data Privacy Law | Antony Haynes | For anyone interested in protecting data privacy or providing cybersecurity, what are the leading issues ... | |
Big Data's Big Problems | Jeanna Neefe Matthews | The data that we record daily about ourselves through our cell phones, credit card purchases, ... | |
Hacking Politics: Infosec in Public Policy | Shahid Buttar , Jonathan Capra , Rashida Richardson | In recent times, the issues of the InfoSec community have arguably become synonymous with those ... | |
New York State's New College of Emergency Preparedness, Homeland Security and Cybersecurity: Training a New Generation of Leaders | Brian Nussbaum | This presentation will describe the creation, rapid growth, structure, and function of the new College ... | |
The Road to Hiring is Paved in Good Intentions | Tim O'brien | The information security field is in desperate need of people with the technical skills and ... | |
Hold my Red Bull: Undergraduate Red Teaming | Jonathan Gaines | In this talk Jon covers the pros and cons of Undergraduate Cyber Security Programs, including ... | |
Whose Idea Was That? Comparing Security Curriculums and Accreditations to Industry Needs | Chaim Sanders , Robert Olson | Security is hard but security education may be harder. Few academic institutions have the skills ... | |
So You Want To Be A H6x0r, Getting Started in Cybersecurity | Doug White , Russ Beauchemin | Russ and Doug, co-hosts of Secure Digital Life and with a combined, MANY years working ... | |
Hacks, Lies, & Nation States | Mario | A hilarious and non-technical skewering of the current state of Cybersecurity, the Cybersecurity "industry", the ... | |
InfoSec Career Building through Reserve Military Service | Dan Van Wagenen | While not often thought of as a fast track to building a career in Information ... | |
Career Advice From an Awesome Tech Woman | Devi Momot | Join Devi Momot, CISSP, GISP, GSLC, CEO of Twinstate Technologies and some friends to discuss ... |