Material de la SecTor 2010 disponible
SecTor es otra de las tantas conferencias sobre seguridad que se celebran alrededor del mundo, en este caso en Toronto (Canadá). La edición de este año se celebró los días 25 y 26 de Octubre. Las charlas tienen muy buena pinta y a juzgar por alguno de los conferenciantes, seguro que merecen la pena echarles un vistazo.A continuación os copio el índice de las charlas:
SecTor 2010 Introduction - Brian Bourne “The Problem with Privacy is Security” - Tracy Ann Kosa “Today’s Face of Organized Cyber Crime: A Paradigm for Evaluating Threat” - Steve Kelly “Attribution for Intrusion Detection” - Greg Hoglund “Involuntary Case Studies in Data Security” - Mike Rothman “SCADA and ICS for Security Experts: How to avoid cyberdouchery” - James Arlen Media File “Starting an InfoSec Company: Three Founder’s Stories” - Robert Beggs, Dave Millier, Brian O’Higgins and Eldon Sprickerhoff “Building the DEFCON network, making a sandbox for 10,000 hackers” - David Bryan and Luiz Eduardo “Dissecting the Modern Threatscape: Malicious Insiders, Industrialized Hacking, and Advanced Persistent Threats” - Brian Contos “Sharingan - A Ninja art to Copy, Analyze and Counter Attack” - Mrityunjay Gautam “CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information Centricity” - Chris Hoff “Google’s approach to malware on the web” - Fabrice Jaubert “IPv6, for worse or better” - Joe Klein “Metasploit Tips and Tricks” - Ryan Linn “Inside The Malware Industry” - Garry Pejski “Malware Freakshow 2010” - Jibran Ilyas and Nicholas J. Percoco “How I Met Your Girlfriend” - Samy Kamkar “Into the Black: Explorations in DPRK” - Mike Kemp “What’s Old Is New Again: An Overview of Mobile Application Security” - Zach Lanier and Mike Zusman “Into the Rabbit Hole” - Rafal Los “Black Berry Security FUD Free” - Adam Meyers “Beyond Exploits: Real World Penetration Testing” - HD Moore “The Four Types of Lock” - Deviant Ollam “Sniper Forensics v2.0 - Target Acquisition” - Christopher Pogue “Web Application Payloads” - Andrés Pablo Riancho “Distributed Denial of Service: War Stories from the Cloud Front” - Michael Smith IT Security Experts Canada Toronto SecTor - Management Track “Gates, Guards, and Gadgets: An Introduction to the Physical Security of IT” - Kai Axford “SDL Light: A practical Secure Development Lifecycle for the rest of us” - Marisa Fagan “Mastering Trust: Hacking People, Networks, Software, and Ideas.” - Pete Herzog “How Many Vulnerabilities? And Other Wrong Questions” - David Mortman “Smashing the stats for fun and profit v.2010” - Ben Sapiro “400 Apps in 40 Days” - Sahba Kazerooni and Nish Bhalla “How do we prevent, detect, respond and recover from CRM failures?” - Kelly Walsh “Cloud definitions you’ve been pretending to understand” - Jack Daniel “64-bit Imports Rebuilding and Unpacking” - Sébastien Doucet “Building your own secure U3 launchable Windows forensic toolkit” - Jason Kendall “Securing your network with open-source technologies and standard protocols: Tips & Tricks” - Nick Owen “Fuzzing Proprietary Protocols - A Practical Approach” - Thomas Pröll “Barcodes: Read it, Write it, Hack it” - Michael Smith “BLINDELEPHANT: Web Application Fingerprinting with Static Files” - Patrick “Microsoft’s cloud security strategy” - Mohammad Akif “Do it yourself - Security Assessments made easy and FREE” - John Andreadis “Crime & Carelessness: Gaps that Enable the Theft of Your Most Sensitive Information” - Ryan Boudreau “Unidirectional Connectivity as a Security Enabler for SCADA and Remote Monitoring Applications” - Lior Frenkel “Beyond Aurora’s Veil: A Vulnerable Tale” - Derek Manky “A Day in the life of APT” - Adam Meyers “Realize More Value From Your Existing security Tools” - Dave Millier “Metasploit Pro - An HD Moore Production” - HD Moore “Culture Shift: Social Networking and Enterprise Environments (Security Risk vs Reward)” - John W. Pirc “Today’s Reality: Living in Compromise to Advanced Persistent Threats” - Charlie Shields “By The Time You’ve Finished Reading This Sentence, ‘You’re Infected’” - Eldon Sprickerhoff “Emerging Threats, The Battle for the Access edge” - Mark Townsend
Las podéis descargar desde este enlace
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec