CircleCityCon 2017 June 9, 2017 to June 11, 2017, Indianapolis,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The Art of the Jedi Mind Trick: Learning Effective Communication Skills | Jeff Man | The hacker/security community continues to struggle with how to get our message across to others. ... | |
Level Up Your Leadership Stefanie Shafer-Pond, | Wolfgang Goerlich | Leading IT security or CyberSecurity? It’s hard, right? We ask them to go left, and ... | |
The Basics Power of PI Jeff Weaver, | Sunil Peddakotla | Course Description: Want to learn about a low cost low energy consumption platform for pen ... | |
Car Hacking Hands-On | Robert Leale | Learn how to connect to vehicle systems, send and receive messages, control and audit vehicle ... | |
A Pen Tester's Guide to Linux | Joey Maresca | This course is designed to be an introduction to Linux with a bit of a ... | |
Opening Keynote: Words Have Meanings | Dan Tentler | Getting your point across is important. Clear communications are essential. Why is the information security ... | |
And the Clouds Break: Continuity in the 21st Century | Wolfgang Goerlich | The promise of cloud computing was a utility; always up, always on, just a click ... | |
DNS Dark Matter Discovery – There’s Evil In Those Queries | Jim Nitterauer | DNS is the engine that drive the Internet, converting recognizable names into IP addresses behind ... | |
Intro to Ham Radio | Justin Herman | Interested in getting your FCC license but don't know where to start? This class will ... | |
Understanding the Computer Fraud and Abuse Act - a Legal Primer for Hackers | Fred Jennings | The Computer Fraud and Abuse Act, or CFAA, is the primary legal tool used to ... | |
DNS Blackholing with Pi-Hole (aka How To Block Unwanted Ads & Malware on your network for cheap) | Arden Meyer | This training will cover the basics of DNS and how it can be manipulated for ... | |
The 31337 Power of Pi | Sunil Peddakotla , Jeff Weaver | Course Description: The course will provide hands on labs for putting together attack kits Using ... | |
Building and Running Security Exercises | Wolfgang Goerlich | Everyone is talking about threat modeling. And a few are talking about security exercises. But ... | |
Better Security Through DNS Logging Using Open Source Tools | Jim Nitterauer , Lennart Kooperman | Security is difficult, especially budget and time are limiting factors. We have learned from experience ... | |
Detecting DNS Anomalies with Statistics | Jamie Buening | N/A | |
Password Cracking Like a Pro | Jeremi Gosney | Learn how to crack passwords like the professionals with a full day of instruction and ... | |
Effective Report Writing for Security Practitioners | Benjamin Robinson | Say more with less! Improve your report writing through tools and technical writing to succinctly ... | |
Application Security Metrics | Caroline Wong | What's your current level of confidence in your application security program? Are you tracking any ... | |
What a former Repo man can teach about OSINT and SE | Michael James | Attendees will learn the basics of Social engineering and OSINT. What makes SE/OSINT practices such ... | |
Network manipulation on video games. | Alex C. Kot | I will go over common misnomers of online cheating methods. Explain the realistic side of ... | |
Ph'ing Phishers | Jae | Credential phishing is super lame. Sadly it's one of the main workhorses behind financing so ... | |
Trials and Tribulations of setting up a Phishing Campaign - Insight into the how | Haydn Johnson | Phishing for clicks is like the VA portion of a Pentest. It feels nice being ... | |
Fuzzing with AFL | Adam Dc949 | Fuzzing is easy to learn, but hard to master. This will give you an overview ... | |
Open Sesamee | Max Power | Resettable combination locks are popular because they can be set to user-chosen codes. Multiple locks ... | |
The Decision Makers Guide To Managing Risk | Joel Cardella | How do you arrive at the IT decisions you make? What factors do you use ... | |
Network Security? What About The Data? 0ddj0bb | 0ddj0bb | The data is the ultimate prize for threat actors. Bypassing the firewall is not their ... | |
Threat Intelligence: Zero to Basics | Chris rattis J | This is an audience participation talk, on going from having DFIR with no Threat Intelligence ... | |
The State of Security in the Medical Industry Cannibal | Billy | Bringing awareness to the pain felt in the healthcare industry from a security standpoint, what ... | |
Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation | Jason Beatty | Attacks are more and more likely to come from internal network sources, possibly being allowed ... | |
Cybersecurity for real life: Using the NIST Framework to protect your critical infrastructure | Ryan Koop | Convince the suits why an industrial level of security is right for you. The C-level ... | |
Why is the Internet still working? | James Troutman | I have noticed that most InfoSec folks, even those coming from a network engineering background, ... | |
Security Training: Making Your Weakest Link The Strongest | Aaron Hnatiw | It is a common joke amongst security professionals that the weakest link in any organizations ... | |
It's A Disaster! | Cheryl Biswas | You don’t know what you don’t know. There are things we have no control over. ... | |
The Kids Aren't Alright: Security and K-12 Education in America | Vivienne Pustell | "Stupid users!" is a common lament. But users aren't stupid, they're just following their training. ... | |
How To Be Curious | Bret Mattingly | Curiosity. It’s not just for killing cats. In fact, it’s the heart of the hacker ... | |
Beginning Android App Reverse Engineering | David healwhans Schwartzberg | This hands-on training is focused on introducing Android APK reverse engineering to begin students with ... | |
Intro to Windows Forensics Using Free Tools | Marcus Thompson | This course introduces participants to the fundamentals of digital forensics for Windows-based systems. You will ... | |
OSINT For Pen Testers: Maximizing Your Efficiency | Joe Gray | Have you ever spent too much time in the reconnaissance phase of a pen test ... | |
Closing Keynote: Lectures or Life Experiences - Awareness Training that Works! | Tottenkoph | At some point in our careers, we’ve been subjected to user awareness training. Most of ... | |
Finding Your Way to Domain Admin Access and Even So, the Game Isn’t Over Yet. | Keith Lee | In this presentation, we discuss the tricky scenarios we faced during internal penetration test engagements ... | |
Ichthyology: Phishing as a Science | Karla Burnett | Many companies view phishing as a given: employees will click links and enter credentials, and ... | |
Peakaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet | Amit Serper | Imagine that you've purchased your small a cheap ip security camera to feel just a ... | |
See beyond the veil: Automating malicious javascript deobfuscation | Chad Robertson | Exploit kits use javascript to direct victim browsers to hosted exploits. These javascript are highly ... | |
You're not old enough for that: A TLS extension to put the past behind us Falcon | Darkstar Momot | TLS evolves rapidly. We don't all have the luxury of upgrading with it, unfortunately; new ... | |
Ye Olde Hacking | Johnny Xmas | Since the Second Industrial Revolution, technology has been advancing at a rate beyond anyone’s estimates. ... | |
Changing our future with 3D Printing | Emily Peed | 3D Printing represents the last tool that will be necessary is shifting into our new ... | |
We Don't Always Go Lights and Sirens | Kendra Cooley | One of the most critical steps to Incident Response is the initial triage phase. The ... |