A continuación os copio el índice de las charlas:
SecTor 2010 Introduction - Brian Bourne “The Problem with Privacy is Security” - Tracy Ann Kosa “Today’s Face of Organized Cyber Crime: A Paradigm for Evaluating Threat” - Steve Kelly “Attribution for Intrusion Detection” - Greg Hoglund “Involuntary Case Studies in Data Security” - Mike Rothman “SCADA and ICS for Security Experts: How to avoid cyberdouchery” - James Arlen Media File “Starting an InfoSec Company: Three Founder’s Stories” - Robert Beggs, Dave Millier, Brian O’Higgins and Eldon Sprickerhoff “Building the DEFCON network, making a sandbox for 10,000 hackers” - David Bryan and Luiz Eduardo “Dissecting the Modern Threatscape: Malicious Insiders, Industrialized Hacking, and Advanced Persistent Threats” - Brian Contos “Sharingan - A Ninja art to Copy, Analyze and Counter Attack” - Mrityunjay Gautam “CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information Centricity” - Chris Hoff “Google’s approach to malware on the web” - Fabrice Jaubert “IPv6, for worse or better” - Joe Klein “Metasploit Tips and Tricks” - Ryan Linn “Inside The Malware Industry” - Garry Pejski “Malware Freakshow 2010” - Jibran Ilyas and Nicholas J. Percoco “How I Met Your Girlfriend” - Samy Kamkar “Into the Black: Explorations in DPRK” - Mike Kemp “What’s Old Is New Again: An Overview of Mobile Application Security” - Zach Lanier and Mike Zusman “Into the Rabbit Hole” - Rafal Los “Black Berry Security FUD Free” - Adam Meyers “Beyond Exploits: Real World Penetration Testing” - HD Moore “The Four Types of Lock” - Deviant Ollam “Sniper Forensics v2.0 - Target Acquisition” - Christopher Pogue “Web Application Payloads” - Andrés Pablo Riancho “Distributed Denial of Service: War Stories from the Cloud Front” - Michael Smith IT Security Experts Canada Toronto SecTor - Management Track “Gates, Guards, and Gadgets: An Introduction to the Physical Security of IT” - Kai Axford “SDL Light: A practical Secure Development Lifecycle for the rest of us” - Marisa Fagan “Mastering Trust: Hacking People, Networks, Software, and Ideas.” - Pete Herzog “How Many Vulnerabilities? And Other Wrong Questions” - David Mortman “Smashing the stats for fun and profit v.2010” - Ben Sapiro “400 Apps in 40 Days” - Sahba Kazerooni and Nish Bhalla “How do we prevent, detect, respond and recover from CRM failures?” - Kelly Walsh “Cloud definitions you’ve been pretending to understand” - Jack Daniel “64-bit Imports Rebuilding and Unpacking” - Sébastien Doucet “Building your own secure U3 launchable Windows forensic toolkit” - Jason Kendall “Securing your network with open-source technologies and standard protocols: Tips & Tricks” - Nick Owen “Fuzzing Proprietary Protocols - A Practical Approach” - Thomas Pröll “Barcodes: Read it, Write it, Hack it” - Michael Smith “BLINDELEPHANT: Web Application Fingerprinting with Static Files” - Patrick “Microsoft’s cloud security strategy” - Mohammad Akif “Do it yourself - Security Assessments made easy and FREE” - John Andreadis “Crime & Carelessness: Gaps that Enable the Theft of Your Most Sensitive Information” - Ryan Boudreau “Unidirectional Connectivity as a Security Enabler for SCADA and Remote Monitoring Applications” - Lior Frenkel “Beyond Aurora’s Veil: A Vulnerable Tale” - Derek Manky “A Day in the life of APT” - Adam Meyers “Realize More Value From Your Existing security Tools” - Dave Millier “Metasploit Pro - An HD Moore Production” - HD Moore “Culture Shift: Social Networking and Enterprise Environments (Security Risk vs Reward)” - John W. Pirc “Today’s Reality: Living in Compromise to Advanced Persistent Threats” - Charlie Shields “By The Time You’ve Finished Reading This Sentence, ‘You’re Infected’” - Eldon Sprickerhoff “Emerging Threats, The Battle for the Access edge” - Mark Townsend
Las podéis descargar desde este enlace
