• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BSidesJackson 2013

BSidesJackson is the premier security conference in Mississippi!

 

BSidesJackson 2013

 

 

Event Details   |    JXN Links    |     CFP     |     Sponsors     |     Registration     |     Schedule     |     Speakers

 

Event Details

 

When:

 Saturday, November 9, 2013

 

Where:     

Old Mississippi Capitol Museum


Cost:        

 Free (as always!)

 

 

 

 


View Larger Map 

 

Invite your friends by posting this on Twitter:

"#BSidesJXN 9NOV2013: Hacks in Jackson! #HXNJXN"

 

 

 

 

 


 

Jackson Links

 

http://www.visitjackson.com/

http://www.jacksonfreepress.com/

http://www.jmaa.com/JAN/default.htm - Jackson Airport

Follow us on Twitter

    

 

Email us at

bsidesjackson (at) gmail.com

 

 

 


 

Call for Papers/Presentations

 

CFP Opens July 29, 2013

CFP Closes September 2, 2013

Speakers will be announced September 16, 2013

 

Each presentation should be no longer than 1 hour in length, including questions and answers, and the format should consist of:

  • Presentation or
  • Workshop or
  • Hands on Training

 

Please email your presentation proposal to bsidesjackson at gmail.com. When submitting a presentation proposal, include the following:

  • Your Name
  • Contact Information
  • A short biography
  • Title
  • Abstract
  • Supporting Research
  • Format (Presentation/Training/Workshop)

 

If you're from Mississippi, Louisiana, or Alabama, we'd like to hear from folks who are local...here's your chance to make this conference yours!

 

 


Sponsors 

 


  

 

 
 Special thanks to Tenable and Cimation for sponsoring us for 2 years!
 
 

Donors

 
 

Ron can't make it, but follow him anyway for all of your Beer As A Service Needs!

 

 

 

 

If you would like to be a sponsor, please email us for the sponsorship packet.

http://www.securitybsides.com/w/page/12194170/Sponsoring

 

 

 


Registration

 

 


 

Schedule

 

Saturday - November 9, 2013 Talk Track Workshop Track
9:00 AM - 9:50 AM

Keynote Speaker:  Jeffery Guy (@jjguy) - "The Assumption of Breach"

10:00 AM - 10:50 AM

Mark Kikta (@B31tf4c3)

"Seeing Purple: Hybrid Security Teams for the Enterprise" 

Dr. Wesley McGrew (@McGrewSecurity) - Mississippi State University

Hands On Training: "Reverse Engineering APT1 Malware - A Guided Tour" 

 

*bring a laptop with Windows VM

11:00 AM - 11:50 PM

 Dr. Jean Gourd - Louisiana Tech University

"Cyber Storm: The Culmination of an Undergraduate Cyber Security Course"

12:00 PM - 12:50 PM

LUNCH!

 

1:00 PM - 1:50 PM

Paul Coggin (@PaulCoggin) - "Digital Energy - BPT" 

@SquirrelsNaBrrl & Shannon Sistrunk (@shannonsistrunk

Hands On Training: "Social Engineering Techniques"

 

 

2:00 PM - 2:50 PM

Andrew Case (@attrc)

"Mac Memory Forensics during Incident Response"

3:00 PM - 3:50 PM

Dr. Vassil Roussev & Candice Quates  - University of New Orleans

"sqim-ing for malware"

Sterling Thomas - Hands On Training: "Capture the Flag" 

 

*bring a laptop

   
4:00 PM - 5:00 PM Shannon Sistrunk (@shannonsistrunk) - Human Communication & Social Engineering

 

There will be a craft beer homebrew competition going on all day.  If you would like to participate or be a judge, please let us know!

 

Homebrewers

@chrissistrunk - Data Lager

@raptors06 - ???

@jtsylve - ???

 

PRE-PARTY!!!

- Parlor Market

 

AFTER PARTY!!!

- Hal & Mals???

 

 


 

Speakers

 

Jeffery Guy (@jjguy) - KEYNOTE - "The Assumption of Breach"

Jeffrey J. Guy is currently at Carbon Black.  Previously, he was an officer in the United States Air Force, including a tour with the Air Force's Information Warfare Center.  He spent the most recent years in Washington, DC, providing Computer Network Operations research and development services to a variety of federal clients.  J.J. has been a strong advocate for shifting investment from protection to detection and response since 2002.  He has a BS in computer engineering from Case Western and a MS in Computer Science from Johns Hopkins.  He moved to the Gulf Coast in 2010 with his wife, an Ob-Gyn resident at Ochsner in New Orleans.  

 

 

Dr. Vassil Roussev & Candice Quates - "sqim-ing for malware"

Vassil Roussev is an Associate Professor in Computer Science at the University of New Orleans, where he leads the Networking & Security Lab. His research is focused on building tools for security and forensics, and he has presented at many venues, including BSidesNOLA. Recent work involves designing and developing (w/ Candice Quates) the sqim, sdhash, and zsniff tools. Vassil is co-founder of dfrws.org, which supports digital forensic research.

 

Candice Quates is currently a Research Software Engineer at the University of New Orleans and the lead developer of the sqim, sdhash, and zsniff tools.  Her recent work involves CUDA development, mass malware classification, and writing portable, scalable tools.  She spent many years in the software consulting trenches before becoming a researcher.

 

 

Dr. Jean Gourd - "Cyber Storm: The Culmination of an Undergraduate Cyber Security Course"

Dr. Gourd is an Assistant Professor of Computer Science and the Program Chair of Cyber Engineering at Louisiana Tech University. He has an active research program in the areas of cyber security, distributed systems, and software engineering. His research interests include mobile code management and security and intelligent software agents for cyber security. He is involved in numerous ongoing research projects with the DoD and maintains collaborative relationships with members of industry and national research laboratories.

 

Mark Kikta (@B31tf4c3)  - "Seeing Purple: Hybrid Security Teams for the Enterprise"

Mark Kikta is a Security Consultant with VioPoint which is located in Auburn Hills, Michigan.  Mark supports a variety of operational security programs that includes vulnerability management security monitoring and incident response.  As a former Linux engineer with Secure-24, Mark tries to provide information he wishes he had known when he was starting to work with Linux in the realms of security.

 

Dr. Wesley McGrew (@McGrewSecurity) - Hands On Training: "Reverse Engineering APT1 Malware - A Guided Tour"

Dr. Wesley McGrew is an assistant research professor at Mississippi State University's Computer Security Research Center, where he recently earned a Ph.D. in computer science for his research in vulnerability analysis of SCADA HMI systems. He also lectures for the MSU National Forensics Training Center, which provides free digital forensics training to law enforcement and wounded veterans. In the spring 2013 semester, he began teaching a self-designed course on reverse engineering to students at MSU, using real-world, high-profile malware samples, as part of gaining NSA CAE Cyber Ops certification for MSU. Wesley has presented at Black Hat USA, three consecutive DEF CON conferences, and is the author of penetration testing and forensics tools that he publishes through his personal/consultancy website, McGrewSecurity.com.

 

Paul Coggin (@PaulCoggin) - "Digital Energy - BPT"
 Paul Coggin is an Internetwork Consulting Solutions Architect with Dynetics, Inc in Huntsville, Alabama. Paul is responsible for architecting and securing large complex tactical, critical infrastructure and service provider networks. Paul's expertise includes tactical, service provider and ICS\SCADA network infrastructure hacker attacks and defenses as well as large complex network design and implementation. Paul's experience includes leading network architecture reviews, vulnerability analysis and penetration testing engagements for health care, service providers, utilities, banks, schools and tactical networks.  Paul is responsible for developing new innovative cyber security ideas such as cyber modeling and simulation where real world cyber attacks are integrated with kinetics based system models. His efforts today focus on offense and defense issues related to tactical, digital energy and critical infrastructure network architectures and service provider and ICS\SCADA protocols.  Paul is a frequent speaker on cyber security offense and defense issues related to service provider and critical infrastructure. He has presented at conferences around the world including Hacker Halted, TakeDownCon, DeepSec, SCADA [in]Security and the DoD Cyber Crime Conference. Paul is a Cisco Systems Certified Instructor # 32230, Certified EC-Council Instructor and a certified SCADA security architect. He has a BS in Mathematics, an MS in Computer Information Systems and is currently pursuing an MS in Information Assurance and Security. In addition he holds a wide array of certifications from Cisco, EC Council, ISC^2 and others.

Andrew Case (@attrc) - "Mac Memory Forensics during Incident Response" 

Andrew Case is a digital forensics researcher and practitioner who has conducted numerous large scale investigation across a variety of operating systems and network environments. Andrew's previous 

experience includes penetration tests, source code audits, and binary analysis for large corporations and products. Andrew is the co-developer of Registry Decoder, a National Institute of Justice funded 

forensics application, as well as a developer on the Volatility memory analysis project. He has delivered trainings in the fields of digital forensics and incident response to a number of private and public organizations as well as at industry conferences. Andrew's primary research focus is physical memory analysis, and he has published a number of peer-reviewed papers in the field. He has presented his research at conferences including Black Hat, RSA, SOURCE, BSides, OMFW, GFirst, and DFRWS.

 

@SquirrelsNaBrrl - Social Engineering Talk

Bonus:  Social Engineering Capture the Flag Contest w/ Shannon Sistrunk (@shannonsistrunk)

Mr. Squirrel in a Barrel is an international man of mystery.  He likes squirrels.

Shannon Sistrunk is an expert in human communication, nonverbals, & social engineering techniques.  Squirrels are her minions.

 

Sterling Thomas - Hands On Training: "Capture the Flag"
 With over seven years of experience in information security, Sterling has held various positions ranging from Security Analyst on the Security Operations Desk of the nationwide telecommunications infrastructure for the FAA, Security Administrator for a wireless telecommunications provider, and Security Consultant/Penetration tester for a small consulting firm. For the past several years he has provided penetration testing services to clients ranging from Fortune 500 firms to small and medium businesses in various industry sectors including healthcare, manufacturing, and finance.

 

 

Planners


  • @chrissistrunk - Organizer 
  • @tomsellers - CFP Reviews
  • @russelljordan - CFP Reviews 
  • @itsthattim - CFP Reviews

Volunteers


  • @Kev_In_MS 
  • add yourself... 

Participants

 

  • add yourself...

 

Name  Twitter/Email 
   

 

 

 

Task List

(please -cross out- when it's done)

 

Tech

Wifi (venue)

Projector, White Boards (venue)

Photo

Video

Audio (venue)

Streaming or Stickam or Skype or Ustream or Livestream

 

Non-tech

Breakfast

Coffee IEEE Jackson PES

Beverages  VOLATILITY

Tables and chairs (venue)

Venue & Lunch BOMGAR

T-shirts TENABLE

Badges CIMATION

  HackSurfer 

 

Afterparty!

 

Tags for flickr, twitter, blog, etc.

Please use the tag #BSidesJXN for content related to this event

 

Who's blogging?

 

  •  

 

 

Comments (0)

You don't have permission to comment on this page.