TexasCyberSummit 2019 Oct. 10, 2019 to Oct. 10, 2019, San Antonio, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: "State of the Hack" Dave Kennedy N/A
The Pentester Blueprint: A Guide to Becoming a Pentester Phillip Wylie Pentesting or ethical hacking as it is more commonly known has become a much sought-after ...
Regulatory Trends in IoT Security and Coordinated Disclosure and impact on the research community Amit Elazari Regulatory Trends in IoT Security and Coordinated Disclosure and impact on the research community
Introduction to Information Lee 'madhat' Heath High level introduction to Information Security and its broad base of roles. This course will ...
The Mission of the Cybersecurity and Infrastructure Security Agency George Reeves A discuss on the mission of the Cybersecurity and Infrastructure Security Agency and an overview ...
Exploiting Information Leaks for Amazing Network Discovery Hd Moore Identifying assets on modern networks is more complicated than ever due to the adoption of ...
OWASP API Security Top 10 Dmitry Sotnikov In recent years, large reputable companies such as Facebook, Google and Equifax have suffered major ...
Be an Inspirational Coach, Not an Oppressive Security Executive Andrew Hay Security executives are often seen by employees as oppressive heavy-handed dictators that demand strict and ...
Multi-Persona Identity Management Will Schneider Organizations from small to large deal with multiple personas for every user. From the way ...
Host & Threat Hunting on a Budget Leo Bastidas First 100 days, I wanted to make a positive impact on the organization. I get ...
Finding and Decoding Malicious PowerShell Scripts Maria Degrazia Malicious PowerShell scripts are becoming the tool of choice for attackers. Although sometimes referred to ...
Breaking Through the Boundaries of Cyber Security Job Search Challenges Kathleen Smith We’ve all heard the old adage that finding a job is a full time job, ...
Shining a Light on Shadow IT in the Cloud Jessica Dyer We all know about Shadow IT and the risks and dangers that come with that ...
Build an Inspiring Company Culture to Get Great Results Jenny Dufresne Did you know that a company’s culture is a key defense against cyber threat? Consider ...
Deploying Cloud Native Red Team Infrastructure with Kubernetes, Istio and Envoy Larry Holden Larry will walk you thorugh the technical details of building nimble Red Team infrastructure thatleverages ...
"Exploit” The State of Embedded Web Security in IoT Devices ! Aditya K Sood Threats in IOT space are increasing at an exponential scale. One of the stringent issue ...
Security Fabric enables customers to reliably manage and consolidate their security infrastructure Christian Martinez The Fortinet Security Fabric enables customers to reliably manage and consolidate their security infrastructure. A ...
Cybersecurity in Today's Cyber Threat Environment. Aaron Drake Cybersecurity in Today's Cyber Threat Environment.
The Power of Wedging Chris Vickery This talk presents "wedging" as the strategic insertion of one's presence either along or at ...
Anatomy of cloud hacking Dhruv Shah Hack the Clouds, see it Rain !
DNS over HTTPS Dr. Paul Vixie Due to pervasive unpreparedness of users, applications, operating systems, and protocols, DNS has become an ...
Threat Modelling : Creating a feedback Model in agile environment N/a Threat Modeling is an art of foreseeing the threats associated with an application and getting ...
Intro to Web App Pentesting Phillip Wylie N/A
Red Team Tactics for Pentesters Samuel Kimmons What can a Penetration Tester gain from entering into the mindset of an Advanced Persistent ...
Red Teaming MacOS Environments Brandon Dennis This talk is focused on red teaming techniques and tools against MacOS hosts in enterprise ...
Predictive Analytics using Aggregated Threat Intelligence David Evenden Talk Details:In this talk I'll discuss how DHS is leveraging classified threat intelligence to monitor, ...
Keynote Shannon "snubs" Morse N/A
Bypassing Python 3.8 Audit Hooks Leron Gray In Python 3.8, which is scheduled to be released October 2019, a new security feature ...
Learning to Rank Strings Output for Speedier Malware Analysis Philip Tully StringSifter: Learning to Rank Strings Output for Speedier Malware AnalysisIn static analysis, one of the ...
An application of differential privacy to security monitoring Paolo Di Prodi Privacy and security auditing are always seen as opposing forces, but does it have to ...
Keeping Threat Intelligence in Pace with Continuous Monitoring Michael Rodriguez Cyber Threat Intelligence is a term that gets thrown around allot. But what does it ...
Insider Threats: Stories from outside the cubicle David Balcar My talk will cover: Real vs. Hollywood insider threats. During the talk, I will show ...
Holistic ICS Cybersecurity Assessments David Grocott The ICS Cyber Risk Assessment is key to establishing a robust Industrial Control System (ICS) ...
Winning Everyday at Threat Intel Xena Olsen Winning Everyday at Threat Intel provides information and ideas about attribution vs. TTPs, leveraging tactical ...
But how did gamification come into play and in infosec? Chloé Messdaghi This interactive talk shares the history of gamification in infosec, how our brains are stimulated ...
Cyber Threat Defender; the collectible card game Dr. Greg White N/A
The ABC’s of CTF’s Joseph Brinkley The ABC’s of CTF’s will teach the terminology used in InfoSec/Cyber Security CTF’s at a ...
PErfidious: Make PE Backdooring Great Again! Shreyans Devendra Doshi PErfidious is a Python3 tool that aims to directly take a benign PE executable and ...
The Risk Management Hydra and why you need multiple assessments Chelsey Donohoe A risk assessment is a risk assessment is a risk assessment, right? Except that that ...
The Rise of Foreign Cybersecurity Threats to Smartphones Rex M. Lee Learn about cybersecurity threats posed by Great Power Competition from adversarial countries such as China, ...
Web App Pentesting for Bug Hunters Philip Wylie N/A
The ABCs of Containment, Eradication, and Recovery Josh Bryant In the physical realm, a successful hunt ends with either a kill or a capture. ...
Rastrea2r: Collecting & Hunting for IOCs with Gusto and Style Sudheendra Bhat Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that allows ...
How to Translate Tech Trends to CISO strategy Jill Orhun How to translate tech trends to CISO strategy & opsToday's technology industry swims in a ...
Calishing: A Red Team Approach to Phishing Google Calendar Antonio Piazza On Halloween, October 31, 2018, 2 Black Hills Security Researchers, Beau Bullock and Michael Felch ...
Everyone is an investor: A VC’s perspective on how to invest your time with security startups William Lin Speaking from a point of authority, Will is involved with 4iQ, Appthority, Attivo Networks, Bayshore ...
From Sandbox to SYSTEM David Wells Its 2019, Application Containment is all the rage and various vendors implement it in different ...
Next-gen IoT botnets - leveraging cloud implementations for shells Alex Jay Balan Traditional IoT botnets operate pretty much like shooting fish in a barrel. With an elephant ...
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure Matt Szymanski GraphQL is a query language for APIs set to replace RESTful architecture. The use of ...
Today’s red team isn’t enough Daniel Lavoie Today’s red team isn’t enough. Because we want to move our defense and understanding beyond ...
Finding the Rogue Node Donovan Farrow This presentation is a low-medium level technical break down on how to find a rouge ...
Threat Intelligence: How to Focus Fire on the Bad Guys Kyle Hubert As a blue teamer or threat hunter, how many times have you been told to ...