BSidesSLC 2014 March 22, 2014 to March 22, 2014, Salt Lake City,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Mobile Application and BYOD (Bring Your Own Device) Security Implications to Your Business | Dmitry Dessiatnikov | The explosion of the mobile application market coupled with acceptance of "bring your own device" ... | |
Hardware Level Attacks | Doktor Unicorn | A running computer program is not a mathematical abstraction, but a physical process taking place ... | |
Private Cloud and Security | Joshua Skains | In the cloud computing world, everyone is rushing to services like Amazon Web Services and ... | |
How I made people angry with Burp: Web app testing in real life | D4rkm4tter | Come listen to the tail of how I caused some headaches for an unsuspecting web ... | |
The SANS 20 Critical Security Controls and you. | Jason Reverri | In today's world, to achieve true information security one must do more than just check ... | |
NGFW's And You | Danny Howerton | Next Generation Firewalls (or NGFWs) are all the rage these days and its all you ... | |
Basic maelware Analysis | Jeffrey Doty | You have maelware on your network/system. Do you freak out or go about your day? ... | |
An introduction to back dooring operating systems for fun and trolling. | Lance Buttars | So you want to setup a back door? Have you ever wondered how it’s done ... | |
All the Sexy of the SSL | Sean Jackson | We’ll be discussing the SSL handshake, and what’s really going on under the hood. You ... | |
2014 - The year in which we cannot ignore SCADA | Amol Sarwate | This session is the result of a yearlong study of the most recent SCADA vulnerabilities ... | |
Intro to maelware analysis | Kenny Long | An intro to windows behavioral maelware analysis. Where to get samples, how to setup an ... | |
Top 10 Mistakes Made With Using Microsoft As The Foundation Of Your Identity Access Management Systems | Adam Steed | Every year we ask our Identity Access Managements Systems to do more and support more ... | |
Hackers vs Auditors | Dan Anderson | Comparison and contrasting of the traits associated with auditors and hackers and the advantages for ... |