Event details
The Kansas city bsides event will be held in concert with Kansas City's first managed cyber warfare exercise called Cyber-Raid
When: Friday, September 17th, 2010 10:00 AM to 5:30 PM
Cost: Free!
Slides from the con
Evil Wifi
IDS Apocalypse
Inside Metasploit
Time Stamps in digital forensics
RSVP: If you would like to attend please email your name to bsideskc@gmail.com or edit the wiki below.
Invite your friends by posting this on Twitter: "#BSidesKC September 17th 2010: BBQ, beer and security fun! http://bit.ly/BSidesKC"
Call For Papers (CFP) is closed.
Sponsors
Please email bsideskc@gmail.com for information.
Huge thanks to our sponsors!!!!!
Schedule
Friday September 17
2010
|
Track 1
|
|
Activities
|
9:000 AM - 10:00 AM
|
Brief remarks, thanks sponsors etc.
|
|
Coffee/Breakfeast
|
10:00 AM - 11:00 AM
|
The FBI's response to a computer intrusion.
This presentation will cover the FBI's response to a computer intrusion incident and what to expect. A part of the presentation will cover intrusions as they relates to the financial industry. The presentation will also cover the latest cyber trends and techniques used in cyber crimes. Agents will include examples of local cyber investigations and their outcomes.
|
|
|
11:000 AM - Noon
|
William Metcalf
I Survived IDS Apocolypse '10 and All I Got Was This Stupid T-Shirt.
|
|
|
Noon - 1:00 PM
|
Dave Hull
I see what you did there
Digital forensic practitioners have long included file system time stamps in their analysis. Now Kristinn Gudjonsson's log2timeline has expanded this technique, giving us new evidence to analyze, even when perps are savvy enough to stomp the file system's time stamps.
|
|
|
1:00 PM - 1:30 PM
|
|
|
Break for lunch
|
1:30 PM - 2:30 PM |
Daniel J Molina @DJMolina
Seven Ways IT is enabling Cybercrime
|
|
|
2:30 PM - 3:30 PM
|
ax0n
Evil WiFi: Subversive Wireless & Self Defense
|
|
|
3:30 PM - 4:30 PM |
Bill Swearingen
Automating Metasploit: Pwning hosts while you sleep
|
|
|
4:30 PM - 5:30 P |
Surbo
Things that go bump in the Evite
A Hijacked Evite can not only ruin your party but it can p@wn your friends. Clickjacking, Unfriending, and Exploiting! Oh, my! You're not in Kansas Anymore
|
|
|
5:30 PM - Whenever |
|
|
Drinks/Closing remarks |
Planners
- John Winger bsideskc at gmail dot com
- James Costello james at genesyswave dot com
Volunteers
- John Winger
- James Costello
- jur1st
- Dave Hull
- Cory Kennedy
Participants (aka Campers)
Name
|
Twitter/Email
|
Etc.
|
John Winger
|
@bsideskc / bsideskc at gmail.com
|
|
James Costello |
@n0b0d4 / james at genesyswave dot com |
|
jur1st
|
@jur1st / jur1st at cowtowncomputercongress dot org |
|
Jerry Wilstrand |
|
|
Marc Westbrock
|
|
|
Ryan Simpson |
|
|
hevnsnt |
hevnsnt@cowtowncomputercongress.org |
|
Dave Hull
|
@davehull / dpsides at trustedsignal dot com
|
|
Kevin Riggins |
@kriggins / kriggins at infosecramblings dot com |
|
Noah Dunker |
@ax0n / ax0n (at) h-i-r.net |
|
Jerry Gamblin |
@jgambln |
|
Weston George |
@westongeorge |
|
Brian Sak |
@briansak |
|
Mark Butler |
@mbinc / mbutler at ioactive dot com
|
|
Task List
(please -cross out- when it's done)
Tech
Wifi Provided by CIsco
Projector, White Boards
Photo
Video
Audio
Streaming or Stickam or Skype
Non-tech
Breakfast
Lunch
Coffee/Tea
Tables and chairs
Tags for flickr, delicious, ma.gnolia, technorati etc.
Please use the tag #BSidesKC for content related to this event
Who's blogging?
Comments (0)
You don't have permission to comment on this page.