PacificHackers 2019 Nov. 8, 2019 to Nov. 10, 2019, Santa Clara, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Anthony K Giandomenico , Chris Eddings , Lan Jenson N/A
How Political Bots influence Brexit Zeshan Aziz As expected, many of the previously useful automated heuristics for bot detection have started to ...
Medical Records and Default Passwords Qasim Ijaz As a penetration tester with focus on the healthcare industry, I’ve seen patient data in ...
Connected World of Devices - Exploiting the Embedded Web Security Aditya K Sood Threats in IOT space are increasing at an exponential scale. One of the stringent issue ...
From zero to Yara with Volatility Framework Evan Wagner Memory analysis can help fill gaps in your coverage if you don't have Sysmon or ...
Applying Pareto’s Principle to Securing AWS with SCPS Ayman Elsawah In this talk I will walk through the use of Pareto’s 80/20 rule to add ...
Finding badness - Using Moloch for DFIR Elyse Wick In this presentation, we will share how the Verizon Media Paranoids use Moloch (molo.ch), our ...
Cybersecurity Responsibilities Sam Bowne As US influence declines, China is rapidly rising to be the next superpower. Russia is ...
Ransomware And How It Evades Our Defenses Rene Kolga Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach ...
Blockchain developments in the state of California Ben Bartlett Berkeley City Councilmember and Fmr. Vice Mayor Ben Bartlett is a nationally recognized policy leader. ...
How to report and handle security disclosures Aviv Sasson In a dynamic environment as the computing world, technology changes rapidly and new CVE's are ...
Open-Source tools in Infosec Marco Palacios Open-Source tools are becoming popular in the InfoSec industry, and they are replacing commercial products. ...
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture Rod Hernandez This presentation shows how to use Splunk to provide the analyst with a comprehensive vision ...
Designing Automation Playbooks for security teams Lior Kolknik Security teams use a variety of different tools and services to handle alerts and investigate ...
Serverless Log Analysis on AWS Georgios Kapoglis In this talk we will go over traditional log analysis methods for AWS Cloudtrail logs ...
WPA3 Is it really broken? Phil Morgan Session on WPA3, specifications, operation, implementation. Is it really broken as some researchers say?
OWASP top 10 for APIs Inon Shkedy The OWASP API project addresses modern threats for API based applications.While traditional vulnerabilities like SQLi, ...
Opening Pandora's box with FAIR + ATT&CK + SOAR = An Improved cyber security response strategy Tyler Rorabough When I meet with CISOs and Cyber Security Directors, they usually ask what use cases ...
Black Phenix Chris Navarrete BLACKPHENIX is an open-source malware analysis automation framework composed of services, scripts, plug-ins, and tools ...