• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BsidesSeattle2012

Registration is FULL!!

 

When: Saturday, December 15th, 2012

 

Where:

Microsoft City Center Building
555 110th Ave NE
Bellevue, WA 98004 

 

Doors open at: 8:00 am - 5:30 pm

 

Call for Papers is CLOSED!

CFP OPEN:  October 2nd

CFP Close:  October 26th

Acceptance Notification/Schedule Complete: November 2nd

 

 

Invite your friends by posting this on Twitter: #BSidesSeattle 

Follow @BsidesSeattle for updates! 

 

Questions?

hit up:  

@BsidesSeattle

or

bsidesseattle@gmail.com

 

Sponsors

 

Want to show your support for an awesome even?  Details found here: SeattleBsides-Sponsor

 

  

  

Engage the Audience

 

 

 

 
   
 

  

  

  

  

  

Above & Beyond 

   
   Black Lodge Research
   
Core Supporters

 

 

Schedule

 

Subject to change! Temporary image here, while we build the schedule.

 

         

0800 

 

 

 Badging/Breakfast ***  Denotes a course requiring additional registration

 

 

 

 

0845

 

 

   Keynote Speaker  

 

 

 

 

0930 

 

 

 

Hacking Non-Traditional Systems -Luis "connection" Santana
 

Arduino Class 

***     

 

Intro to crypto attacks - David Marshall

 

*** 

 

 

     
 

 

 

 

 

1030

 

 

  Hacking the Industry: From Hacker to Consultant -Sean Malone and Noah Beddome
 

 

 

 

 

1130

 

 

  SSL++ : Tales of Transport Layer Security at Twitter -jim oleary @jimio
 

1200

 

 

   

1230

 

 

Lunch         

 

 

 

Lunch Panel            

1330

 

 

  Getting Shit Done -Lori Woehler @msftlori
  

OWASP ZAP Tutorial - Yvan Boily

 


 ***

   
 

Lock Pick 101

 

*** 

     

 

 

 

 

Lock Pick Village open        

1430

 

 

  Fuzzing 101 -Andy Renk
 

 

 

 

 

1530

 

 

  Advanced Programming for Penetration Testers -Benson Kalahar and Tom Steele
Who's coming after the cookies in your cookie jar? -@wepIV   

1600 

 

 

Privacy for Security: Dancing with Lawyers - Jason Shirk   

1630

 

 

Panel: Security: Past, preseent and where the fucks my hoverboard? -Noid + Crew
 

Offensive Defense

-Stephan Chenette
 

 

1700

 

 

Lock Pick Village Closed   

1730

 

 

Closing statements  ( 10 minutes)             
         

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

After Party Happy Hour Details:

 

Tags for flickr, twitter, blog, etc.

Please use the tag #BsidesSeattle for content related to this event 

 

Topics I would like to hear about

 

  • add a topic...

 

 

Planners

 

  • Josh M (@nerd_monkey)
  • Mike A (@ma)
  • Don A. (so cool I don't send my tweets)
  • Dave W. (so cool I don't send my tweets)  
  • Mike P. (so cool I don't send my tweets) 
  • Matt J . (so cool I don't send my tweets) 

 

Volunteers

 

Full out yo.

 

Task List

(please -cross out- when it's done)

 

Tech

 

Non-tech

 

 

 

Who's blogging?

 

 

 

 


Offensive Defense Print E-mail

Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.

Comments (0)

You don't have permission to comment on this page.