PacificHackers 2019 Nov. 8, 2019 to Nov. 10, 2019, Santa Clara, United States
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Anthony K Giandomenico , Chris Eddings , Lan Jenson | N/A | |
How Political Bots influence Brexit | Zeshan Aziz | As expected, many of the previously useful automated heuristics for bot detection have started to ... | |
Medical Records and Default Passwords | Qasim Ijaz | As a penetration tester with focus on the healthcare industry, I’ve seen patient data in ... | |
Connected World of Devices - Exploiting the Embedded Web Security | Aditya K Sood | Threats in IOT space are increasing at an exponential scale. One of the stringent issue ... | |
From zero to Yara with Volatility Framework | Evan Wagner | Memory analysis can help fill gaps in your coverage if you don't have Sysmon or ... | |
Applying Pareto’s Principle to Securing AWS with SCPS | Ayman Elsawah | In this talk I will walk through the use of Pareto’s 80/20 rule to add ... | |
Finding badness - Using Moloch for DFIR | Elyse Wick | In this presentation, we will share how the Verizon Media Paranoids use Moloch (molo.ch), our ... | |
Cybersecurity Responsibilities | Sam Bowne | As US influence declines, China is rapidly rising to be the next superpower. Russia is ... | |
Ransomware And How It Evades Our Defenses | Rene Kolga | Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach ... | |
Blockchain developments in the state of California | Ben Bartlett | Berkeley City Councilmember and Fmr. Vice Mayor Ben Bartlett is a nationally recognized policy leader. ... | |
How to report and handle security disclosures | Aviv Sasson | In a dynamic environment as the computing world, technology changes rapidly and new CVE's are ... | |
Open-Source tools in Infosec | Marco Palacios | Open-Source tools are becoming popular in the InfoSec industry, and they are replacing commercial products. ... | |
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture | Rod Hernandez | This presentation shows how to use Splunk to provide the analyst with a comprehensive vision ... | |
Designing Automation Playbooks for security teams | Lior Kolknik | Security teams use a variety of different tools and services to handle alerts and investigate ... | |
Serverless Log Analysis on AWS | Georgios Kapoglis | In this talk we will go over traditional log analysis methods for AWS Cloudtrail logs ... | |
WPA3 Is it really broken? | Phil Morgan | Session on WPA3, specifications, operation, implementation. Is it really broken as some researchers say? | |
OWASP top 10 for APIs | Inon Shkedy | The OWASP API project addresses modern threats for API based applications.While traditional vulnerabilities like SQLi, ... | |
Opening Pandora's box with FAIR + ATT&CK + SOAR = An Improved cyber security response strategy | Tyler Rorabough | When I meet with CISOs and Cyber Security Directors, they usually ask what use cases ... | |
Black Phenix | Chris Navarrete | BLACKPHENIX is an open-source malware analysis automation framework composed of services, scripts, plug-ins, and tools ... |