• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BsidesSeattle


 

When: Saturday, December 13th, 2014 

 

Where: 

Microsoft City Center

600 108th Ave NE 

Bellevue, Wa 

 

Doors open at: 8:00 am - 5:30 pm

 

CFP:  (Closed)

TICKETS:

 

http://bsidesseattle2014.eventbrite.com

 

Invite your friends by posting this on Twitter: #BSidesSeattle 

Follow @BsidesSeattle for updates! 

 

Questions?

hit up:  

@BsidesSeattle

or

bsidesseattle@gmail.com

 

 Schedule  (abstracts here)

 

 

    Speaker Room Tactical Room Class Room
8:15:00  
Reg opens/Breakfast
   
9:30:00  
Attack ships on fire, C-beams glittering in the dark, and other things you people wouldn't believe
 
Introduction to
Arduino Magic
    LockPick Brief #1
10:30:00  
YOU CAN FIND THE MOST ADVANCED MALWARE, EVEN THE SNEAKY NSA STUFF WITH THIS METHOD
LockPick Brief #2
     
11:30:00  
Identifying the Insider Threat
So you think you can pick? Part 1
12:00:00   So you think you can pick? Part 2
12:30:00  
Lunch
   
13:30:00  
Defensive talks NOT “sexy”? What’s sexier than catching an attack like Target, APT, SET or your Pen Tester?
Let me show you some sexy logging
Attacking USB -
Lets get the Hands Dirty
WTFPGA -
Demystify FPGAs
   
14:30:00   Shoulda, Woulda, Coulda
15:00:00   How to Grow A Hacker
15:30:00  
ShellForth - Shell-code cross-compiler for Forth
   
16:30:00  
Council of Internet Wizards - Hack the Planet, Save the World, Surf the Tubes.
   
17:30:00   Closing, give away all the things

 

 

Sponsors

 

Want to show your support for an awesome event?  Details found here: Seattle Bsides - Sponsor

 

Core Supporters
Community Supporters

 

Black Lodge Research

 

 

 

 

Tags for flickr, twitter, blog, etc.

Please use the tag #BsidesSeattle for content related to this event 

 

Planners

 

  • Josh M (@nerd_monkey)
  • Mike A (@ma)

 

Volunteers

 

Coming Soon!

 

 

 

Offensive Defense Print E-mail

Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.

Comments (0)

You don't have permission to comment on this page.