SAINTCON 2019 Oct. 22, 2019 to Oct. 25, 2019, Provo, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Session N/a N/A
0wn th3 c0n N/a Everything you ever wanted to know about SAINTCON, what to do and what to see. ...
Threat Hunting like a Scientist Kimber Duke As environments become more complex and robust, how do threat hunters stay on their toes ...
Using Docker and Your Shell for Security Spencer Heywood Docker is a versatile and powerful tool. Learn how to use Docker in conjunction with ...
Understanding and Working with Young Hackers in Education Jeremy Cox N/A
Keynote Panel Discussion and Q & A for Leadership Jeff Egly Following the SAINTCON keynote presentations SAINTCON attendees have the opportunity to participate in a keynote ...
Avoid putting yourself in a silver platter for hackers with Security Frameworks 101 Victor Steven Morales We will be covering the types, strategies, benefits and implementation of security frameworks. Giving you ...
Keys to the Kingdom Jonathan M. Smith Building a long range RFID reader capable of stealing badge information from several feet away, ...
Reverse Engineering and Code Emulation with Ghidra Karl Sickendick The NSA recently open-sourced the Ghidra software reverse engineering tool. While it's unlikely to steal ...
Raspberry Pi Experiments Seth Johnson N/A
Meet the CISO Mark Miline A panel of Utah based CISOs will discuss their perspectives on building successful security programs, ...
Exploiting Enterprise Access Control Kaydan/pips RFID-based access control is everywhere in your life. It's at your work, its in your ...
How GDPR nearly made me miss the birth of my daughter & why I'm worried CCPA will make me miss her birthday Jake Bernardes Much has been said about GDPR in the past two years & I am sure ...
SOC It 2 Me Sean Jackson A SOC II attestation is needed for companies offer SaaS. It's a third party letter ...
How to Hashcat Sean Jackson Password cracking is something that Hollywood uses all the time, and makes look easy. Well...it's ...
Top Findings in LEA Security Penetration Tests Troy Jessup We will discuss the Top 10 or so findings we often see in penetration tests ...
Chuck the lockpicks, we still gettin' in! A survey of physical security bypass techniques. Erich Ficker Locksport is cute but if you're not into pin and tumbler science why bother with ...
Developing a Cyber Security Strategy, Tactics come after Sean Mchenry It is easy to get lost in the day-to-day tasks of cyber security. These tasks ...
DevSecOps: Expectations for next-gen AppSec Mick Gomm N/A
Students who Hack (and other Technology Misuses), What the Law Requires, Student Discipline and School Responses Carol Alder In this presentation, presenters/school law attorneys will discuss local and national examples and cases about ...
The Joy of Hacking - with Bob Ross* Matt Lorimer N/A* Due to extenuating circumstances, Matt Lorimer will be filling in for Bob Ross
Gathering All the WiFi: Tales of the WiFiCactus and WiFiKraken Mike Spicer Over the last 3 years Mike has learned a lot about how to effectively capture ...
Legislative Concerns and Direction for Student Data Privacy, Security and Filtering Development and How Data Security Professionals Can Help Senator Todd Weiler In this session, Senator Weiler will discuss and provide his perspective regarding the following tropics:The ...
DevSecOps: Scalable Event-Driven Security Infrastructure for Hybrid Environments Kevin Crook Generally, the effectiveness of any security operations center is largely determined by the level of ...
One man's trash is another man's Home Lab (2019 Edition) Shaun Price We will be going over building your own home lab utilizing low-cost but high-value hardware. ...
What the CTF? Matt Lorimer Come learn why you should play games to get ahead in your career and life. ...
Identity & Access Management Why? Bryan Peterson What is meant by IAM? What is it for? And why should I care about ...
Living off the Land: Come for the living off the land, stay for the memes Kenton Mcdaniel A high level look at how living off the land allows a malicious actor to ...
The Riddle of Ryuk Ryan Otteson Adventures in Post-Intrusion Ransomware. A year ago Ryuk came onto the scene, an adopted version ...
Utah DPS SIAC Cyber Program Hanna Bennett This presentation will provide an overview of the Utah Department of Public Safety (DPS), Statewide ...
Call, text, and even rewrite past text messages: How your phone uses AT commands Jonathon Degn Call, text, and even rewrite past text messages: How your phone uses AT commands
Cloud Security: Do it Right the First Time Shaun Stapley Moving to the cloud can be an intimidating task. With a lot of unknowns and ...
Drone Hacking David Packham how to get your drone to do things better…
Fake News, Real News, and Disinformation: How it works, what to do about it Chris Larsen For the last few years, Fake News has become a buzzword, used in so many ...
Getting over impostor syndrome in INFOSEC Jeremy Cox Impostor syndrome in INFOSEC is more common that you think, yes you can break through
Your SAINTCON network Tristan Rhodes Come learn about the gear powering the SAINTCON network, how it was setup and what ...
eduroam vs Open Access Wifi: a method for the madness Pete Kruckenberg Why should you consider eduroam if you're already providing open-access WiFi for visitors? We'll cover ...
CUES and Cache Phishing Attacks Gavin Womack According to the official Annual Cyber Crime Report, it is estimated to cost upwards of ...
CIS Critical Security Controls Framework Review Troy Jessup We will discuss the importance of having a security framework to plan, implement, and measure ...
RetroMal: Analyzing malware on the earliest computing platforms Andrew Brandt The world of information security spends much of its time focused on looking forward, trying ...
USBE Student Privacy and Data Security Updates David Sallay This session will review updates to policies and procedures that LEAs need to know about ...
CoSN Security Tools and Resources for Educational Technology Leaders Scot Stokes Educational Technology leaders need to protect their networks and information security, analyze their current status, ...
Introduction to Biohacking, and the Implantable Computer Project Doug Copeland ast prototyping an implantable computer from off the shelf parts, there are two phases to ...
Hacking Hackers: Sure you can borrow my clicker! John Pope I have been running security conferences since I was voluntold 5 years ago and have ...
Is Network Monitoring Dead in the Age of Encryption? Dallin Warne There's no question the prevalent adoption of SSL/TLS changes how organizations do network security monitoring ...
Education Strategies around Cyber Security Scot Mccombs Panel Discussion topics include User education / phishing / CEO fraud / gift card fraud, ...
Hands on pwning in the SAINTCON labs Matt Lorimer Come learn the basics of red teaming and get a jump on the SAINTCON labs. ...
How to stop a mean two headed serpent called Hydra Adam Fishre Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very ...
The Badge Talk Michael Whiteley All about the badge. How it was made, what it does, maybe some challenge hints...
Introduction to I2C on the bus pirate Michael Julander Learn more about the communication protocol used by the Saintcon badge to talk to the ...
Policy development for large and complex education organizations Jerry Smith This session will help develop and write an organizational information security policy. The session will ...
The Culture of Filtering: Filtering for Fear vs Filtering for the Student Jeremy Cox N/A
How to Improve the Maturity of Your Organization's Security Seth Johnson A discussion of gauging where your organizational security is today as well as a simplified ...
LTE/5G Wireless Networks - An update on the UETN's pilot Jason Eyre In this session we will discuss, review and provide an update on the UETN LTE/5G ...
Embracing the Dark Web - A Security Community Call to Action Robert Kerby The dark web is often portrayed as a scary, mysterious "place" where drugs, illegal goods ...
How to Complete a Vendor Review: The Right Way Chase Palmer Trusting someone else with your data and your customer's data can be a scary thing. ...
NFC & RFID Bio-Implants: For Fun and Profit Jason Gale NFC/RFID bio-implants are potentially the next disruptive technology. Tiny chips that can communicate in the ...
RFID/NFC use in Game Console Accessories John Galvez Amiibo? Infinity Figurines? Skylanders Figurines? Dimensions Figurines? They all use RFID/NFC, in this community talk ...
Building your first SIEM with the Elastic Stack Daniel Dayley Correctly implemented, a Security Information and Event Manager (SIEM) is one of the best tools ...
Cybersecurity in Schools: How Good is Yours? Ethan Heintzelman In conjunction with DTS and UETN, the Office of the State Auditor has developed a ...
Security Incident Handling for Leaders Seth Johnson Leaders often have to lead in difficult circumstances. Security incidents are always difficult circumstances. This ...
Getting started with KiCad - designing your first minibadge from art to fab Steve Ball Making a minibadge is not as hard as it looks. In this presentation, I'll walk ...
The Secure Socket API Daniel Zappala The Secure Socket API: How to Make Secure Sockets with as little as one line ...
The Evolution of Video Surveillance: using AI and Machine Learning to Leverage Cameras as a Sensor Clint Russell The world of video surveillance has remained largely unchanged since shifting from analog to IP ...
Stuff your pihole with malware and ads Scott Nielsen The Pi-hole is a DNS sinkhole that protects your devices from unwanted content, without installing ...
Cyber Insurance - Claims Trends Jon Petersen A view on Cyber Insurance Claims Trends. Why do these losses happen and tips on ...
Discussing Strategies for helping senior/cabinet level educational leaders focus and better understand data security needs Rick Long This session with be an open dialogue and deep discussion with the educational technology leaders ...
The Four Horsemen of Passwords Chris Mather The rules of passwords have changed, but are you keeping up? Find out about new ...
The Megacortex Mysteries Andrew Brandt In spring, 2019, Sophos detected a widespread ransomware attack using a malware that calls itself ...
Under the hood of SAINTCON labs Matt Lorimer Come peek behind the curtain into this year's SAINTCON labs. This session will cover the ...
Social Engineering and Manage your Risk Jon Petersen The insurance industry's view on Social Engineering. What it is, what losses look like, and ...
Serverless Security 101 Stefanie Tidwell This presentation will cover commonly-used serverless technologies, benefits, drawbacks, security concerns and how to deploy ...
Academic Freedom vs. Data Security Corey Roach Historically, in higher-education, "academic freedom" has often been a phrase used as a trump card ...
Security Assessments Overview Andrew Henne This will be a review of services offered by UETN and USHE in regards to ...
(Active) defense against the dark arts Ryan Burnett This presentation will focus on current countermeasures that a blue-team can/should leverage against motivated attackers ...
Evolving Manipulation: Cracking the Combo Keenan Fessler The presentation goes over the evolution of safe combination locks, and how to manipulate them ...
May the Cloud be with You: Red Teaming GCP (Google Cloud Platform) Bryce Kunz Cloud services are frequently misconfigured due to their rapid adoption and engineers not fully understanding ...
Whose slide is it? Matt Lorimer Come have some fun as a presenter of someone else's slides.
hover craft 101 Jeremiah Christensen Ever want to build a hovercraft? Me too. Come hear what I leared in my ...
DNS and TLS Privacy and Security - Content Security Today and Tomorrow George Bekmezian Are you using DNS for content filtering or for identifying and mitigating risks and attacks ...
Hacking on SAINTCON Badges Mike Weaver Maybe you've been to SAINTCON before and have a box of dusty electronic badges or ...
Private LTE networks - Emerging technologies that promise quality and security. Jason Eyre Wireless networking transformed not just information technology but now is used by almost every person ...
Hacker's Challenge Wrap-up Josh Galvez The rundown of this years Hacker's Challenge
I Got Social Engineered to Speak at SAINTCON Seth Johnson SJ presents social engineering
Roll Your Own Pentest Distro Corey Batiuk What do you do when you're tired of spinning up a Kali instance that's not ...