Search Results for "2015"

Silver Sponsor Feature: Fishnet Security

Fishnet Security

@fishnetsecurity

https://fishnetsecurity.com/

 

FishNet_Security_logo.jpg (505×146)

 

FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support and training. Since 1996, the company has enabled clients to manage risk, meet compliance requirements and reduce costs while maximizing security effectiveness and operational efficiency. FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to over 5,000 clients worldwide.

Register now


Speaker Feature: Robert Stratton

Robert Stratton

@strat

https://www.mach37.com

 

200x200_stratton_Bob.png (200×200)Bob Stratton is a serial security startup guy. He is General Partner at Mach37, a business accelerator for security product startups. He was a pentester before you could buy it in a box, ran security for a tier-1 ISP, and helped launch one of the very first commercial network IDS products. He has been a Director of a major security software company’s research lab, and worked on the investment side to help bring a variety of new technologies to market. When he’s not hacking on ancient hardware, scanning satellites, or coaching startups, he might be flying airplanes, building radios or experimenting with fragrance chemistry.

How Security Products Could Change the World, and Often Don’t.

Many security professionals find themselves wondering how it is that some security products ever made it into the market. If you’ve ever asked yourself that, wondered why the “good” seems to be the enemy of the “best,” or thought you might be able to do it better than the current players, this may be a talk for you. This talk will cover the things that have to happen in order to successfully bring a security product to the market, who is arrayed against it from day 1 (you may not have heard of some of them), and what it takes for a consultant to be in 100,000 places at once. Warning: thin-skinned consultants, bloviating product vendors, and ethereal marketing people may find some aspects of this talk objectionable. Professional discretion is advised.

Register now


Gold Sponsor Feature: Slait Consulting

Slait Consulting

@slaitconsulting

http://www.slaitconsulting.com/

 

slait-logo_400x400.jpg (400×400)

SLAIT Consulting is an Information Technology consulting services company that specializes in delivering customized, creative IT solutions for customers in the commercial and public sector.  SLAIT is headquartered in Virginia Beach, VA, with regional branch offices in Richmond, VA; Greenbelt, MD; Raleigh, NC; and New York, NY.

 

Register now

 


Speaker Feature: Boris Sverdlik

Boris Sverdlik

@jadedsecurity

 

Oscar Insurance

Jaded Security Guy

You’re HIPAA certified and Bob just killed someone from the parking lot

My friend Bob is undergoing Chemo and his wife asked him to get a copy of his medical records for a second opinion. Bob being an obedient husband had to jump through hoops to get copies of HIS records thanks to the monotony that we know as HIPAA.

So one day while Bob is waiting for his treatment he notices that the facility has several blatant physical security issues which could allow someone of a more shady nature to obtain his health records without jumping through hoops. Follow Bob in his adventures..

 

Register now


Speaker Feature: Chris Eng

Chris Eng

@chriseng

 

Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies.

Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.

Security Speed Debates

Match wits in a fast-paced debate covering a handful of topical security issues and customer-revelant subjects. Two teams of volunteers will face off, and the audience will determine which side made the most convincing (or entertaining) arguments. Topics will not be announced in advance, so participants will have to think on their feet!

 

Register now


Gold Sponsor Feature: Trend Micro

Trend Micro

@trendmicro

http://www.trendmicro.com/

 

trend-micro-logo.png (1000×400)

As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security.

Register now


Speaker Feature: Kizz MyAnthia

Kizz MyAnthia

@kizzmyanthia

http://kizzmyanthia.com/

 

200x200_kizz.png (200×200)Infosec specialist whose qualifications include an indepth understanding of security principals and practices; C|EH, MCSE+Security designations; and detailed knowledge of security tools, technologies and development. Seven years of security experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations, with over 10 years overall in the industry.

 

Into The Worm Hole: Metasploit For Web PenTesting

Metasploit is most commonly known for its epic pwnage of network and service level vulnerabilities. What you may not know is that same epic pwnage can be leveraged exploiting web application vulnerabilities. By leveraging the ability to custom build Metasploit modules or tools using the framework the power of Metasploit is only limited by the imagination of the user. “Into The Worm Hole: Metasploit For Web PenTesting” will build on prior knowledge of Metasploit and help elevate the tester’s skills and abilities by working hands-on building a custom scanner, using Metasploit to exploit Web Vulnerabilities, and learn to use Metasploit for phishing, XSS, and other web application vulnerabilities.

 

Register now

 


Speaker Feature: Jason Scott

Jason Scott

@textfiles

http://textfiles.com

 

Jason Scott is an archivist, historian, documentary filmmaker, information collector, and public speaker. He figured you’d be sick of historical computing by now, but it’s not happening.

All Watched Over By Machines of Loving Grace

For over a century, the selling of computers as the inevitable tools of liberation, productivity, and new ways of life has led to some of the most striking images and words in the world of advertising and public relations. Jason Scott, the free range archivist of the Internet Archive, presents a slideshow and tour through some of the most notable excessive and most outlandish promises of the technology industry.

Register now


Speaker Feature: Elissa “#LADYBOSS” Shevinsky

Elissa “#LADYBOSS” Shevinsky

@ElissaShevinsky

http://www.businessinsider.com/author/elissa-shevinsky

 

200x200_shevinsky.png (200×200)Elissa Shevinsky is CEO of JeKuDo Privacy Company. JeKuDo is building the best easy to use privacy tools, and is funded by the Mach37 cyber-security accelerator in Virginia.

Shevinsky is a frequent writer and speaker, and most recently gave talks at ShmooCon, DefCon, Pii2014, SXSW, the Computers Freedom and Privacy conference and various Meetups. Shevinsky is also the author of “Lean Out,” an anthology on Silicon Valley culture, published by OR Books.

 

The Changing Legal Landscape for InfoSec: What You Need to Know

As black hat threat actors attack and embarrass American companies and celebrities, the government seeks to show that it is strong on “cybercrime” by going after the most accessible targets – researchers, journalists and “hackers” like you and me.

Changing government policies and recent court decisions have created a climate where individual infosec researchers could be jailed in the course of doing their jobs. It’s a disturbing trend but there are ways to do our work while mitigating our personal risks.

This talk reviews court cases, policy decisions, and the history of hacker convictions, along with analysis from legal experts, to consider best practices for avoiding getting slammed for your research.

 

Register now


Speaker Feature: Adam Crosby

Adam Crosby

 

Former IDS analyst turned red teamer turned powerpoint jockey née cloud architect. Allergic to alcohol, compensates with Diet Coke.

Embracing the Cloud

It’s inevitable at this point, so rather than fighting, you may as well embrace it – cloud computing is coming to your organization soon (or more realistically, is already there, possibly under the radar!).
This talk covers how to get over the hump of resistance, do so smartly, and possibly enjoy some security benefits in the process. The focus here will be on info sec (or ‘cyber’), rather than the normal DevOps/Agile mumbo jumbo. Vendor selection, indicators of success, net new threat models and mitigations, and net new potential capabilities will be covered.

Register now