Security B-Sides Las Vegas 2011 Aug. 3, 2012 to Aug. 4, 2012, Las Vegas, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
OODA and General Predator/Prey theory Tim Keanini\tboyd N/A Security
How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault) Wendy Nather N/A Security
Exploiting Management For Fun and Profit - or - Management is not stupid, you are Adam Ely N/A Security
Are There Still Wolves Among Us? Val Smith N/A Security
Planes Keep Falling on my Head Chris Roberts N/A Security
Weaponizing The Smartphone: Deploying The Perfect WMD Nicholas Donarski N/A Security
Using the Teensy for so much more... David Kelley N/A Security
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it David Rook N/A Security
A study of what really breaks SSL Ivan Ristic N/A Security
Vulnerability Research Circa 1851 Schuyler Towne N/A Security
2011: A Cloud Odyssey Davi Ottenheimer N/A Security
Distributed Denial of Service Attacks for Whitehats Will Vandevanter N/A Security
Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget) Rafal Los N/A Security
All about the Benjamins -- Google's vulnerability reward programs Adam Mein N/A Security
Sounds Like Botnet Itzik Kotler N/A Security
Hacking Google Chrome OS Kyle Johansen N/A Security
Smile for the Grenade! Camera go Bang! Joshua Gostom N/A Security
Anti Anti Forensics Dave Cowen N/A Security
When Zombies Attack - a Tracking Love Story Ashkan Soltani N/A Security
How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career Grecs N/A Security
Tell Me Your Secrets - Tales of Social Engineering and The Human Mind Steven f. Fox N/A Security
Walking the Green Mile: How to Get Fired After a Security Incident Brian Baskin N/A Security
How to Hide Your Pr0n Josh Sokol , Orlando barrera Ii N/A
Fuck the Penetration Testing Execution Standard (PTES) Charlie Vedaa N/A Security
Cyber Fast Track Mudge Zatko N/A Security
Transparent Botnet Command and Control for Smartphones over SMS Georgia Weidman N/A Security
Living the Dream! - Info Sec Style James Baker N/A Security
Long Beard's Guide to Exploit Dev Egyp7 and Bannedit N/A Security
Wireless dirty sisters The other RF (wireless) you arent looking at and why you are going to get hurt! Warezjoe N/A Security
Cognitive Intelligence and Network Analysis Deepak Jr N/A Security
Siemens / SCADA 0day Dillon N/A Security
InfoSex Sells: The Impact Of The Media And Public Opinion On Security Tim Wilson , Mike Mimoso , Michelle Schafer , Mc Petermann N/A
Cultural Cues from High Risk Professions Gal Shpantzer N/A Security
Advanced data exfiltration - the way Q would have done it Ian Amit N/A Security
Hacking webapps is more fun when the end result is a shell! Joshua Abraham N/A Security
Info Sec Institute: What College Never Will Teach You Rick Deacon N/A Security
Empirical Exploitation Hd Moore N/A Cyberwar IncludeThinkstScapes Scan Vulnerability Survey
Better to burn out than to fade away? Jack Daniel , Martin Mckeay , Josh Corman , Gal Shpantzer , Stacy Thayer N/A
THE 99 HEART SURGEON DILEMMA (How to fix penetration testing.) Stefan Friedli N/A Security
How to pass audits with non-compliant systems Jay , Shane N/A
(Panel): How (not) to run a Bsides Jack Daniel , Jason Ross , Chris john Riley , Mark Manning , Janice Paulson N/A