BSidesSLC 2014 March 22, 2014 to March 22, 2014, Salt Lake City,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Mobile Application and BYOD (Bring Your Own Device) Security Implications to Your Business Dmitry Dessiatnikov The explosion of the mobile application market coupled with acceptance of "bring your own device" ...
Hardware Level Attacks Doktor Unicorn A running computer program is not a mathematical abstraction, but a physical process taking place ...
Private Cloud and Security Joshua Skains In the cloud computing world, everyone is rushing to services like Amazon Web Services and ...
How I made people angry with Burp: Web app testing in real life D4rkm4tter Come listen to the tail of how I caused some headaches for an unsuspecting web ...
The SANS 20 Critical Security Controls and you. Jason Reverri In today's world, to achieve true information security one must do more than just check ...
NGFW's And You Danny Howerton Next Generation Firewalls (or NGFWs) are all the rage these days and its all you ...
Basic maelware Analysis Jeffrey Doty You have maelware on your network/system. Do you freak out or go about your day? ...
An introduction to back dooring operating systems for fun and trolling. Lance Buttars So you want to setup a back door? Have you ever wondered how it’s done ...
All the Sexy of the SSL Sean Jackson We’ll be discussing the SSL handshake, and what’s really going on under the hood. You ...
2014 - The year in which we cannot ignore SCADA Amol Sarwate This session is the result of a yearlong study of the most recent SCADA vulnerabilities ...
Intro to maelware analysis Kenny Long An intro to windows behavioral maelware analysis. Where to get samples, how to setup an ...
Top 10 Mistakes Made With Using Microsoft As The Foundation Of Your Identity Access Management Systems Adam Steed Every year we ask our Identity Access Managements Systems to do more and support more ...
Hackers vs Auditors Dan Anderson Comparison and contrasting of the traits associated with auditors and hackers and the advantages for ...