Speakers
Jeffery Guy (@jjguy) - KEYNOTE - "The Assumption of Breach"
Jeffrey J. Guy is currently at Carbon Black. Previously, he was an officer in the United States Air Force, including a tour with the Air Force's Information Warfare Center. He spent the most recent years in Washington, DC, providing Computer Network Operations research and development services to a variety of federal clients. J.J. has been a strong advocate for shifting investment from protection to detection and response since 2002. He has a BS in computer engineering from Case Western and a MS in Computer Science from Johns Hopkins. He moved to the Gulf Coast in 2010 with his wife, an Ob-Gyn resident at Ochsner in New Orleans.
Dr. Vassil Roussev & Candice Quates - "sqim-ing for malware"
Vassil Roussev is an Associate Professor in Computer Science at the University of New Orleans, where he leads the Networking & Security Lab. His research is focused on building tools for security and forensics, and he has presented at many venues, including BSidesNOLA. Recent work involves designing and developing (w/ Candice Quates) the sqim, sdhash, and zsniff tools. Vassil is co-founder of dfrws.org, which supports digital forensic research.
Candice Quates is currently a Research Software Engineer at the University of New Orleans and the lead developer of the sqim, sdhash, and zsniff tools. Her recent work involves CUDA development, mass malware classification, and writing portable, scalable tools. She spent many years in the software consulting trenches before becoming a researcher.
Dr. Jean Gourd - "Cyber Storm: The Culmination of an Undergraduate Cyber Security Course"
Dr. Gourd is an Assistant Professor of Computer Science and the Program Chair of Cyber Engineering at Louisiana Tech University. He has an active research program in the areas of cyber security, distributed systems, and software engineering. His research interests include mobile code management and security and intelligent software agents for cyber security. He is involved in numerous ongoing research projects with the DoD and maintains collaborative relationships with members of industry and national research laboratories.
Mark Kikta (@B31tf4c3) - "Seeing Purple: Hybrid Security Teams for the Enterprise"
Mark Kikta is a Security Consultant with VioPoint which is located in Auburn Hills, Michigan. Mark supports a variety of operational security programs that includes vulnerability management security monitoring and incident response. As a former Linux engineer with Secure-24, Mark tries to provide information he wishes he had known when he was starting to work with Linux in the realms of security.
Dr. Wesley McGrew (@McGrewSecurity) - Hands On Training: "Reverse Engineering APT1 Malware - A Guided Tour"
Dr. Wesley McGrew is an assistant research professor at Mississippi State University's Computer Security Research Center, where he recently earned a Ph.D. in computer science for his research in vulnerability analysis of SCADA HMI systems. He also lectures for the MSU National Forensics Training Center, which provides free digital forensics training to law enforcement and wounded veterans. In the spring 2013 semester, he began teaching a self-designed course on reverse engineering to students at MSU, using real-world, high-profile malware samples, as part of gaining NSA CAE Cyber Ops certification for MSU. Wesley has presented at Black Hat USA, three consecutive DEF CON conferences, and is the author of penetration testing and forensics tools that he publishes through his personal/consultancy website, McGrewSecurity.com.
Paul Coggin is an Internetwork Consulting Solutions Architect with Dynetics, Inc in Huntsville, Alabama. Paul is responsible for architecting and securing large complex tactical, critical infrastructure and service provider networks. Paul's expertise includes tactical, service provider and ICS\SCADA network infrastructure hacker attacks and defenses as well as large complex network design and implementation. Paul's experience includes leading network architecture reviews, vulnerability analysis and penetration testing engagements for health care, service providers, utilities, banks, schools and tactical networks. Paul is responsible for developing new innovative cyber security ideas such as cyber modeling and simulation where real world cyber attacks are integrated with kinetics based system models. His efforts today focus on offense and defense issues related to tactical, digital energy and critical infrastructure network architectures and service provider and ICS\SCADA protocols. Paul is a frequent speaker on cyber security offense and defense issues related to service provider and critical infrastructure. He has presented at conferences around the world including Hacker Halted, TakeDownCon, DeepSec, SCADA [in]Security and the DoD Cyber Crime Conference. Paul is a Cisco Systems Certified Instructor # 32230, Certified EC-Council Instructor and a certified SCADA security architect. He has a BS in Mathematics, an MS in Computer Information Systems and is currently pursuing an MS in Information Assurance and Security. In addition he holds a wide array of certifications from Cisco, EC Council, ISC^2 and others.
Andrew Case (@attrc) - "Mac Memory Forensics during Incident Response"
Andrew Case is a digital forensics researcher and practitioner who has conducted numerous large scale investigation across a variety of operating systems and network environments. Andrew's previous
experience includes penetration tests, source code audits, and binary analysis for large corporations and products. Andrew is the co-developer of Registry Decoder, a National Institute of Justice funded
forensics application, as well as a developer on the Volatility memory analysis project. He has delivered trainings in the fields of digital forensics and incident response to a number of private and public organizations as well as at industry conferences. Andrew's primary research focus is physical memory analysis, and he has published a number of peer-reviewed papers in the field. He has presented his research at conferences including Black Hat, RSA, SOURCE, BSides, OMFW, GFirst, and DFRWS.
@SquirrelsNaBrrl - Social Engineering Talk
Bonus: Social Engineering Capture the Flag Contest w/ Shannon Sistrunk (@shannonsistrunk)
Mr. Squirrel in a Barrel is an international man of mystery. He likes squirrels.
Shannon Sistrunk is an expert in human communication, nonverbals, & social engineering techniques. Squirrels are her minions.
Sterling Thomas - Hands On Training: "Capture the Flag"
With over seven years of experience in information security, Sterling has held various positions ranging from Security Analyst on the Security Operations Desk of the nationwide telecommunications infrastructure for the FAA, Security Administrator for a wireless telecommunications provider, and Security Consultant/Penetration tester for a small consulting firm. For the past several years he has provided penetration testing services to clients ranging from Fortune 500 firms to small and medium businesses in various industry sectors including healthcare, manufacturing, and finance.
Planners
- @chrissistrunk - Organizer
- @tomsellers - CFP Reviews
- @russelljordan - CFP Reviews
- @itsthattim - CFP Reviews
Volunteers
- @Kev_In_MS
- add yourself...
Comments (0)
You don't have permission to comment on this page.