grrcon 2017 Oct. 26, 2017 to Oct. 27, 2017, grand rapids,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
STRATEGIES ON SECURING YOUR BANKS & ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS & ENTERPRISES FOR A LIVING!)- Thursday Keynote | Jayson E Street | Most people who work on the defensive side of computer security only see the landscape ... | |
10 Cent Beer Night: The World we now Live In- Friday Keynote | Johnny Xmas | June 4th, 1974: A bench-clearing brawl in response to some extremely “dirty” baseball a week ... | |
The Black Art of Wireless Post-Exploitation | Gabriel Ryan | Wireless is an inherently insecure protocol. Most companies recognize this, and focus their resources on ... | |
The Credentials in the High Castle | Kyle Shattuck , Kyle Eaton | Account takeover (ATO) incidents can be obfuscated from an analyst in a magnitude of ways. ... | |
3rd Party Data Burns | Arron "finux" Finnon | Data-Loss via 3rd party data-breaches is a subject that most have a little time for, ... | |
Population Control Through The Advances In Technology… | Chris Roberts | The Future…. :) Will we end up with a hierarchical system of digital existence? At ... | |
Morphing to Legitimate Behavior Attack Patterns | David Kennedy | Let’s face it, the industry is getting better at detection. Not everyone, but it’s getting ... | |
We got it wrong | J wolfgang Goerlich | This session is on all the things we all say all the time, about all ... | |
Duncan Vs the Internet! | Duncan Manuts | Enjoy the show as Duncan debates the internet on a variety of topics. With some ... | |
The Shuttle Columbia Disaster: Lessons That Were Not Learned | Joel Cardella | When the shuttle Challenger was destroyed in 1986, poor NASA culture was significant in the ... | |
Cyber, Cyber, Cyber – Using the killchain to accomplish something | Infosystir | Everyone talks about the cyberkill chain(tm). I want to show you how to map some ... | |
Shadowcrew: A history and future of cybercrime | Brett Johnson | Presenter will detail a representative history of cybercrime, concentrating on Shadowcrew, Carderplanet, and its members ... | |
Those Phishing Guys: TA530 In-Depth | Joe Petroske , Rachel Giacobozzi | Successful financially-motivated adversary groups play the long game. They evolve, adapt, and change tactics to ... | |
Embedding Security in Embedded Systems | Jared Demott | If security were easy, we’d have solved it 20 years ago. Unfortunately for complex systems, ... | |
TBA | Atlas of D00m | More info to be announced shortly | |
I’ve got a (Pocket) Bone to pick with you | Phil Polstra | This talk will demonstrate several attacks that can be performed using the new open-source PocketBone ... | |
The Need for Speed – Benefits of Speed Driven Incident Response | Joe Petroske , Aaron Shanas | Threat actors, like your IR team, need time to complete their mission. By short-circuiting the ... | |
Building a Usable Mobile Data Protection Strategy | David healwhans Schwartzberg | Mobile smart devices from the consumer perspective are easy to activate for a enriched user ... | |
Oops! Was that your pacemaker? | Charles Parker | Medical devices have become more prevalent as the population has aged. The earlier applications included ... | |
Tales From The Trenches: Practical Information Security Lessons | Michael Belton | In this talk, Michael Belton discusses his past experiences delivering penetration testing services. The format ... | |
Red Team Yourself | Thomas Richards | So your organization conducts regular tests with $automated tool. Want to bring your security testing ... | |
Identity theft through OSINT/social engineering | Zee Abdelnabi | This talk will demonstrate how easy identity theft has become because of OSINT and the ... | |
The Future of Cyber Security | Anothony Sabaj | Trends, Threats and Solutions from the Data Center to the The Cloud for tomorrow and ... | |
vAp0r and the Blooming Onion | Justin Whitehead , Jim Allee | vAp0r is a Linux distro that brings together a specific set of tools to allow ... | |
Software Defined Segmentation | Shaun Muller | Acquisitions, partnerships, BYOD, IoT are just some business demands that increase security headaches for businesses ... | |
A Reporter’s Look at Open Source Intelligence | Hilary Louise | Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies ... | |
Infosec State of Affairs: Too much Kim Kardashian – not enough Malcolm Gladwell | Jim Wojno , Dan Kieta | In security we obsess about vulns, exploits and attacks with headline grabbing names like Petya ... | |
Vulnerability Disclosure | Bat | Bat will give a brief overview of vulnerability disclosure policies and their importance in both ... | |
An Attack Pathway Into Your Organization? Reducing risk without reducing operational efficiency | David Adamczyk | Despite the increased understanding in the importance of locking down privileged account access, the fact ... | |
Realizing Software Security Maturity: The Growing Pains & Gains | Mark Stanislav , Kelby Ludwig | Software security maturity is often diluted down to the OWASP Top 10, leaving organizations with ... | |
Infrastructure Based Security | Chris Barnes | As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the ... | |
Change is Simply an Act of Survival: Predicting the future while shackled to the past | Bil Harmer | This presentation will briefly review the history and development of the corporate network, it’s interaction ... | |
Skiptracing for fun and profit | Rhett Greenhagen | This talk will be somewhat humorous, taking real world examples from my work that are ... | |
How do you POC? Are you really testing a product? | Ken Donze | We have all read the reports from the successful breaches from Target to Equifax. Have ... | |
Critical Incident: Surviving my first layoff by applying BCP/DRP Principles | Tom Mead | The day before my 30th birthday will be forever ingrained in my mind. It was ... | |
Dissecting Destructive Malware and Recovering from CatastropheDissecting Destructive Malware and Recovering from Catastrophe | Bryan York | An in depth look into the NotPetya malware outbreak from a boots-on-ground incident responder with ... | |
Pen Test War Stories – Why my job is so easy, and how you can make it harder | Aaron Herden | As a Pen Tester and security professional, I get it. You are faced with a ... | |
Staring into the Abyss: The Dark Side of Security and Professional Intelligence | Richard Thieme | Nothing is harder to see than things we believe so deeply we don’t even see ... | |
Skills For A Red-Teamer | Tim Roberts , Brent White | Want to incorporate hybrid security assessments into your testing methodology? What does going above and ... | |
Learning from InfoSec Fails | Derek Milroy | This presentation will highlight some of the reasons why InfoSec either fails or is perceived ... | |
Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis | Deral Heiland | The “Internet of Things” (IoT) is taking over our lives, so we should be constantly ... | |
Eye on the Prize – a Proposal for Legalizing Hacking Back | Adam Hogan | The myriad objections to legalizing hacking back all agree that an undisciplined horde of skids ... | |
Defending The De-funded | Keith Wilson | There is a cyber poverty mark that plagues the Cyber Security Industry. The global 2000 ... | |
You Got Your SQL Attacks In My Honeypot | Andrew Brandt | Among the many automated attacks that target the honeypots hosted on my lab network, one ... | |
Hidden Treasure: Detecting Intrusions with ETW | Zac Brown | Today, defenders consume the Windows Event Log to detect intrusions. While useful, audit logs don’t ... | |
A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense) | Ernest Wong | Since the origins of the Republic, the American people have shown a strong speculative knack ... | |
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF) | Jerod Brennen | With global information security spending rapidly approaching $100 billion, you’d think we’d have a pretty ... | |
An Employee, their Laptop and a Hacker walk into a Bar | Shannon Fritz | If one of your company laptops were lost, what might an attacker be able to ... | |
Threat Intelligence: Zero to Basics in presentation | Chris rattis J | This is an audience participation talk, on going from having DFIR with no Threat Intelligence ... | |
National Guard for Cyber? How about a Volunteer Cyber Department? | Ray Davidson | Increased public awareness of “hacking” activities has led to an increase in calls for organized ... | |
ProbeSpy: Tracking your past, predicting your future | Stumblebot | As infosec enthusiasts and professionals, may of us are acutely aware that our devices may ... | |
Real-World Red Teaming | Spartan | Anyone who has been doing pentesting for any length of time knows that there’s a ... |