Shakacon 2012 June 20, 2012 to June 21, 2012, Honolulu,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Cloud and You: A Love Story Adam Ely Businesses have a love affair with the cloud. We in security love the innovation but ...
What Do You Know You Know, What Do You Know You Don’t Know, and What Don’t You Know You Don’t Know?: An Update on Business Continuity Planning Threats, Vulnerabilities, Impacts, and Risk Anthony Gelish Participants will be exposed to concrete threat and vulnerability examples relevant to Hawaii for each ...
4140 Ways Your Alarm System Can Fail Babak Javadi Alarm systems and panels were designed before the prevalence of wireless technology and communicate with ...
Mobile Exploit Intelligence Project Dan Guido As organizations look to deploy larger numbers of mobile devices over this year, there is ...
So You Want to be the CSO Daniel Blander Do you have a CSO who seems disconnected from his team? Is your Security Manager ...
Keys to the Kingdom Deviant Ollam Would it surprise you to learn that many of the most popular and effective attacks ...
Physical Security on the Front Lines Deviant Ollam This talk gives a look at some of the more novel ways that people can ...
Surfing with Sharks James Ochmann , Dwayne Yuen , Jason Tsang Drive-by-malware sites are the most prevalent attack vector for spreading viruses on the Internet today. ...
iOS Security and Penetration Testing Jason Haddix In contrast to Android applications written in a language like java, Objective-C, the iOS runtime, ...
When Headlines Meet Metrics: Connecting the Dots Jeremiah Grossman We've seen the headlines: Citigroup, Sony, PBS, Sega, Nintendo, Gawker, AT&T, the CIA, the US ...
Web Security Attack and Defense Jim Manico , Matt Johansen This talk will present a fast-paced wide-range of web application security vulnerability categories from both ...
Isn't it all just SMS-sending trojans?: Real advances in Android Malware Jimmy Shah Attackers are starting to move on from simple attacks, mainly because users are starting to ...
Hardware backdooring is practical. Jonathan Brossard This presentation will demonstrate that permanent backdooring of hardware is practical. We have built a ...
The Dalai Lama, Advanced Persistent Threat and the Great Whitehat Taboo. Kent Backman In this talk, Kent will discuss what two years of "ethically sniffing" a Tor exit ...
Practical Personal Computer Security (Turbo Talk) Kris Harms If you deal with any of the following, this turbo talk is for you. 1. ...
Talking Story on Security Kris Harms How can I tell if the malware I found is APT or not? Does that ...
How we tear into that little green man Mathew Rowley Mobile applications are a part of every persons, and every organizations life. The potential for ...
Threat Detection Via MetaCharacteristic Analysis of Machine Data Monzy Merza Meta-Characteristic Analysis is a source agnostic, detection approach for unknown attacks that relies on event ...