|
BsidesSeattle2012
Registration is FULL!!
When: Saturday, December 15th, 2012
Where:
Doors open at: 8:00 am - 5:30 pm
Call for Papers is CLOSED!
CFP OPEN: October 2nd
CFP Close: October 26th
Acceptance Notification/Schedule Complete: November 2nd
Invite your friends by posting this on Twitter: #BSidesSeattle
Follow @BsidesSeattle for updates!
Questions?
hit up:
@BsidesSeattle
or
bsidesseattle@gmail.com
Sponsors
Want to show your support for an awesome even? Details found here: SeattleBsides-Sponsor
Engage the Audience
|
|
|
|
|
|
|
|
|
Above & Beyond
|
|
|
|
Black Lodge Research |
|
|
Core Supporters |
|
Schedule
Subject to change! Temporary image here, while we build the schedule.
|
|
|
|
|
0800
|
Badging/Breakfast |
*** Denotes a course requiring additional registration |
|
|
0845
|
Keynote Speaker |
|
|
|
0930
|
Hacking Non-Traditional Systems -Luis "connection" Santana
|
Arduino Class
***
|
Intro to crypto attacks - David Marshall
***
|
|
|
|
1030
|
Hacking the Industry: From Hacker to Consultant -Sean Malone and Noah Beddome
|
|
|
|
1130
|
SSL++ : Tales of Transport Layer Security at Twitter -jim oleary @jimio
|
|
1200
|
|
|
1230
|
Lunch |
|
|
Lunch Panel |
|
1330
|
Getting Shit Done -Lori Woehler @msftlori
|
OWASP ZAP Tutorial - Yvan Boily
***
|
Lock Pick 101
***
|
|
|
Lock Pick Village open |
|
1430
|
Fuzzing 101 -Andy Renk
|
|
|
|
1530
|
Advanced Programming for Penetration Testers -Benson Kalahar and Tom Steele
|
Who's coming after the cookies in your cookie jar? -@wepIV |
|
1600
|
Privacy for Security: Dancing with Lawyers - Jason Shirk |
|
1630
|
Panel: Security: Past, preseent and where the fucks my hoverboard? -Noid + Crew |
Offensive Defense
-Stephan Chenette
|
|
1700
|
Lock Pick Village Closed |
|
1730
|
Closing statements ( 10 minutes) |
|
|
|
|
|
|
After Party Happy Hour Details:
Tags for flickr, twitter, blog, etc.
Please use the tag #BsidesSeattle for content related to this event
Topics I would like to hear about
Planners
- Josh M (@nerd_monkey)
- Mike A (@ma)
- Don A. (so cool I don't send my tweets)
- Dave W. (so cool I don't send my tweets)
- Mike P. (so cool I don't send my tweets)
- Matt J . (so cool I don't send my tweets)
Volunteers
Full out yo.
Task List
(please -cross out- when it's done)
Tech
Non-tech
Who's blogging?
Offensive Defense |
|
|
Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.
|
BsidesSeattle2012
|
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
|
|
|
Comments (0)
You don't have permission to comment on this page.