BSidesBoston 2013 May 18, 2013 to May 18, 2013, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Sick Anti-Analysis Mechanisms From The Wild Alissa Torres For those in the trenches of enterprise defense, it appears that malware authors as of ...
The Noob Persistent Threat Allison Nixon , Brandon Levene "You've heard about advanced persistent threats. Huge, organized crime operations and Nation state sponsored spies. ...
Leveraging Memory Forensics During Incident Response and Malware Analysis Andrew Case Memory analysis is the process of investigating the contents of volatile memory (RAM) in order ...
The Future of Drones and the Impact On Infosec Andrew Clare In the future, teams of networked air, land, and sea Unmanned Vehicles (UVs) will be ... IncludeThinkstScapes Unmanned vehicles
NFC: I Don't Think It Means What You Think It Means Ben April "NFC has been getting a lot of press recently. Some good, some bad, most of ...
Malware Automation Christopher Elisan Automation is key when it comes to production. The same is true for malware. Malware ...
Google TV: The Next Generation Cj Heres This presentation will start with an introduction to the Google TV platform, its security protections ...
Identity As Privacy Dan Geer N/A
Cloudy Weather - How Secure Is The Cloud? Dan Stolts Security is a top priority when considering moving applications to the cloud. Does Windows Azure ...
Security 101 for New Security Professionals David Dumas This presentation is for new security professionals and will address how to apply network security ...
Maltego In The Enterprise David Bressler Organizations face an overwhelming number of threats on a day to day basis, the detection ...
Plunder, Pillage and Print Deral Heiland During this presentation i will be discussing details around penetration testing of internal networks by ... Attack IncludeThinkstScapes Embedded Tool
The State Of Privacy & Proper Planning For The Future Jeff Northrop Privacy is a rapidly evolving topic and information security professionals are increasingly being asked to ...
Blucat: Netcat For Bluetooth Joseph paul Cohen TCP/IP has tools such as netcat and nmap to explore devices and create socket connections. ...
'Good Enough' Isn't Anymore; The Value Of Hitting Rock Bottom Josh Corman "As our security challenges grow more personal and beyond our best practices, how can we ...
SCADA/ICS Insecurities of Drinking Water Utilities John Mcnabb The Industrial Control Systems of public drinking water utilities are vulnerable to attack by malicious ...
Malformity Keith Gilbert Malformity is an Open Source project based on the Canari framework for conducting malware and ...
Advancements in Windows Registry Forensics Marc Spencer "The Windows Registry is a complex database containing valuable information related to hardware, software, and ...
Securing Change Call for Volunteers Oliver Day Securing Change has a mission to provide digital security to agents of change (non profits, ... Security
Build Your Own VMWare ESXi and Microsoft Hyper-V lab at Home, Using Affordable and Efficient Hardware Paul Braren Creating a virtualiztion lab in a box is now easier than ever, especially with the ...
Unlucky In Locks Schuyler Towne "A fun, anecdote-filled, patent diving adventure through some of the most interesting locks that failed ...
Feeling Sick? - Healthcare Medical Device Security Roy Wattanasin When was the last time that you visited a hospital or healthcare setting? Medical devices ...