TexasCyberSummit 2019 Oct. 10, 2019 to Oct. 10, 2019, San Antonio, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: "State of the Hack" | Dave Kennedy | N/A | |
The Pentester Blueprint: A Guide to Becoming a Pentester | Phillip Wylie | Pentesting or ethical hacking as it is more commonly known has become a much sought-after ... | |
Regulatory Trends in IoT Security and Coordinated Disclosure and impact on the research community | Amit Elazari | Regulatory Trends in IoT Security and Coordinated Disclosure and impact on the research community | |
Introduction to Information | Lee 'madhat' Heath | High level introduction to Information Security and its broad base of roles. This course will ... | |
The Mission of the Cybersecurity and Infrastructure Security Agency | George Reeves | A discuss on the mission of the Cybersecurity and Infrastructure Security Agency and an overview ... | |
Exploiting Information Leaks for Amazing Network Discovery | Hd Moore | Identifying assets on modern networks is more complicated than ever due to the adoption of ... | |
OWASP API Security Top 10 | Dmitry Sotnikov | In recent years, large reputable companies such as Facebook, Google and Equifax have suffered major ... | |
Be an Inspirational Coach, Not an Oppressive Security Executive | Andrew Hay | Security executives are often seen by employees as oppressive heavy-handed dictators that demand strict and ... | |
Multi-Persona Identity Management | Will Schneider | Organizations from small to large deal with multiple personas for every user. From the way ... | |
Host & Threat Hunting on a Budget | Leo Bastidas | First 100 days, I wanted to make a positive impact on the organization. I get ... | |
Finding and Decoding Malicious PowerShell Scripts | Maria Degrazia | Malicious PowerShell scripts are becoming the tool of choice for attackers. Although sometimes referred to ... | |
Breaking Through the Boundaries of Cyber Security Job Search Challenges | Kathleen Smith | We’ve all heard the old adage that finding a job is a full time job, ... | |
Shining a Light on Shadow IT in the Cloud | Jessica Dyer | We all know about Shadow IT and the risks and dangers that come with that ... | |
Build an Inspiring Company Culture to Get Great Results | Jenny Dufresne | Did you know that a company’s culture is a key defense against cyber threat? Consider ... | |
Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy | Larry Holden | Larry will walk you thorugh the technical details of building nimble Red Team infrastructure thatleverages ... | |
"Exploit” The State of Embedded Web Security in IoT Devices ! | Aditya K Sood | Threats in IOT space are increasing at an exponential scale. One of the stringent issue ... | |
Security Fabric enables customers to reliably manage and consolidate their security infrastructure | Christian Martinez | The Fortinet Security Fabric enables customers to reliably manage and consolidate their security infrastructure. A ... | |
Cybersecurity in Today's Cyber Threat Environment. | Aaron Drake | Cybersecurity in Today's Cyber Threat Environment. | |
The Power of Wedging | Chris Vickery | This talk presents "wedging" as the strategic insertion of one's presence either along or at ... | |
Anatomy of cloud hacking | Dhruv Shah | Hack the Clouds, see it Rain ! | |
DNS over HTTPS | Dr. Paul Vixie | Due to pervasive unpreparedness of users, applications, operating systems, and protocols, DNS has become an ... | |
Threat Modelling : Creating a feedback Model in agile environment | N/a | Threat Modeling is an art of foreseeing the threats associated with an application and getting ... | |
Intro to Web App Pentesting | Phillip Wylie | N/A | |
Red Team Tactics for Pentesters | Samuel Kimmons | What can a Penetration Tester gain from entering into the mindset of an Advanced Persistent ... | |
Red Teaming MacOS Environments | Brandon Dennis | This talk is focused on red teaming techniques and tools against MacOS hosts in enterprise ... | |
Predictive Analytics using Aggregated Threat Intelligence | David Evenden | Talk Details:In this talk I'll discuss how DHS is leveraging classified threat intelligence to monitor, ... | |
Keynote | Shannon "snubs" Morse | N/A | |
Bypassing Python 3.8 Audit Hooks | Leron Gray | In Python 3.8, which is scheduled to be released October 2019, a new security feature ... | |
Learning to Rank Strings Output for Speedier Malware Analysis | Philip Tully | StringSifter: Learning to Rank Strings Output for Speedier Malware AnalysisIn static analysis, one of the ... | |
An application of differential privacy to security monitoring | Paolo Di Prodi | Privacy and security auditing are always seen as opposing forces, but does it have to ... | |
Keeping Threat Intelligence in Pace with Continuous Monitoring | Michael Rodriguez | Cyber Threat Intelligence is a term that gets thrown around allot. But what does it ... | |
Insider Threats: Stories from outside the cubicle | David Balcar | My talk will cover: Real vs. Hollywood insider threats. During the talk, I will show ... | |
Holistic ICS Cybersecurity Assessments | David Grocott | The ICS Cyber Risk Assessment is key to establishing a robust Industrial Control System (ICS) ... | |
Winning Everyday at Threat Intel | Xena Olsen | Winning Everyday at Threat Intel provides information and ideas about attribution vs. TTPs, leveraging tactical ... | |
But how did gamification come into play and in infosec? | Chloé Messdaghi | This interactive talk shares the history of gamification in infosec, how our brains are stimulated ... | |
Cyber Threat Defender; the collectible card game | Dr. Greg White | N/A | |
The ABC’s of CTF’s | Joseph Brinkley | The ABC’s of CTF’s will teach the terminology used in InfoSec/Cyber Security CTF’s at a ... | |
PErfidious: Make PE Backdooring Great Again! | Shreyans Devendra Doshi | PErfidious is a Python3 tool that aims to directly take a benign PE executable and ... | |
The Risk Management Hydra and why you need multiple assessments | Chelsey Donohoe | A risk assessment is a risk assessment is a risk assessment, right? Except that that ... | |
The Rise of Foreign Cybersecurity Threats to Smartphones | Rex M. Lee | Learn about cybersecurity threats posed by Great Power Competition from adversarial countries such as China, ... | |
Web App Pentesting for Bug Hunters | Philip Wylie | N/A | |
The ABCs of Containment, Eradication, and Recovery | Josh Bryant | In the physical realm, a successful hunt ends with either a kill or a capture. ... | |
Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style | Sudheendra Bhat | Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows ... | |
How to Translate Tech Trends to CISO strategy | Jill Orhun | How to translate tech trends to CISO strategy & opsToday's technology industry swims in a ... | |
Calishing: A Red Team Approach to Phishing Google Calendar | Antonio Piazza | On Halloween, October 31, 2018, 2 Black Hills Security Researchers, Beau Bullock and Michael Felch ... | |
Everyone is an investor: A VC’s perspective on how to invest your time with security startups | William Lin | Speaking from a point of authority, Will is involved with 4iQ, Appthority, Attivo Networks, Bayshore ... | |
From Sandbox to SYSTEM | David Wells | Its 2019, Application Containment is all the rage and various vendors implement it in different ... | |
Next-gen IoT botnets - leveraging cloud implementations for shells | Alex Jay Balan | Traditional IoT botnets operate pretty much like shooting fish in a barrel. With an elephant ... | |
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure | Matt Szymanski | GraphQL is a query language for APIs set to replace RESTful architecture. The use of ... | |
Today’s red team isn’t enough | Daniel Lavoie | Today’s red team isn’t enough. Because we want to move our defense and understanding beyond ... | |
Finding the Rogue Node | Donovan Farrow | This presentation is a low-medium level technical break down on how to find a rouge ... | |
Threat Intelligence: How to Focus Fire on the Bad Guys | Kyle Hubert | As a blue teamer or threat hunter, how many times have you been told to ... |