Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, August 4
 

07:30

Breakfast
Tuesday August 4, 2015 07:30 - 08:30
Chill-Out Room Florentine C/D

08:30

Coffee
Tuesday August 4, 2015 08:30 - 09:45
Chill-Out Room Florentine C/D

08:30

Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
In this workshop we will present an overview of the current state of the art of leveraging open source tools to build a novel intrusion detection system inside the enterprise. We will discuss the pros/cons and ins/outs of several major open source honeypots as well as how to manage and deploy these sensors using the Modern Honey Network, Splunk, as well as integration into other systems such as ArcSight.

Speakers
NA

Nicholas Albright

Nicholas grew up in the BBS era he developed an unhealthy interest in the digital underground, further fueled by books and movies like Wargames, Hackers, Sneakers, Cuckoos Egg, he quickly became one of the security problems plaguing telecom giant US West, Colorado University and other business in the Colorado Area. | After the tragic loss of his father in 2004, and subsequently finding his fathers machine had been fully compromised by a... Read More →
JT

Jason Trost

VP of Threat Research, ThreatStream
Jason Trost is Director of Research at ThreatStream and is deeply interested in network security, DFIR, big data and machine learning. He has worked in security for almost ten years, and he has several years of experience leveraging big data technologies for security data mining. He is currently focused on building highly scalable systems for processing, analyzing, and visualizing high speed network/security events in real-time as well as systems... Read More →


Tuesday August 4, 2015 08:30 - 12:25
Training Ground I Siena

08:30

Pentesting PLCs 101
There is a lot of talking about ICS, SCADA and such nowadays, but only few people have the opportunity to get their hands dirty and understand how it works. The goal of this workshop is to give the knowledge required to start attacking SCADA networks and PLCs, and give hands-on experience on real devices and have fun hacking a model train !

Speakers
avatar for Arnaud Soullie

Arnaud Soullie

Senior consultant, WAVESTONE
Arnaud Soullié (@arnaudsoullie) is a senior security auditor working at Wavestone. In five years, he performed 100+ penetration tests and security audits. His topics of interest include Industrial Control Systems and Windows Active Directory security, two topics that tend to collide nowadays. His hobbies include motorbike riding and drinking (french) wine (not at the same time fortunately).


Tuesday August 4, 2015 08:30 - 12:25
Training Ground II Siena

08:30

Registration Open
Tuesday August 4, 2015 08:30 - 18:00
Conference Center Foyer Conference Center Foyer

09:45

Opening Remarks
Tuesday August 4, 2015 09:45 - 09:55
Chill-Out Room Florentine C/D

10:00

(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”

Hacking isn’t just reindeer games any more. The ones and zeros are turning into real-world, kinetic consequences, and lives are at stake. How do we get the world to take security seriously — on both sides?

For one thing, by having a grownup conversation about it. “Errata Rob” Graham, CEO of Errata Security and creator of BlackICE, the first IPS, will take on “WendyLady” Nather, former CISO/analyst and now research director of the Retail Cyber Intelligence Sharing Center (R-CISC). To make sure things stay civil, security patriarch and Infosec Hall of Famer Jack Daniel will referee.

Join us for what is sure to be an epic conversation about research, critical infrastructure and stunt hacking.


Speakers
RG

Robert Graham

Robert Graham is the CEO of Errata Security, a pentest/consulting | firm. He's known for creating the first IPS, the BlackICE series of | products, sidejacking, and masscan. In his spare time, he scans the | Internet. He has been speaking at several conferences a year for the | past decade. He may have some patents, but they'd anger you if you ever read them.
avatar for Wendy Nather

Wendy Nather

Research Director, R-CISC
Wendy Nather is Research Director at the Retail Cyber Intelligence Sharing Center (R-CISC), where she is responsible for advancing the state of resources and knowledge to help organizations defend their infrastructure from attackers. She was previously Research Director of the Information Security Practice at independent analyst firm 451 Research, covering the security industry in areas such as application security, threat intelligence... Read More →


Tuesday August 4, 2015 10:00 - 10:55
Chill-Out Room Florentine C/D

10:00

Pros vs. Joes CTF and SECTF
What is the Pros V Joes CTF?

This event is an opportunity for average users (Joes) to try their hand at both the offensive and defensive side of computer security. For the Pros, it’s a chance to hone and show off their skills, helping others to learn and better themselves. It’s also a lot of fun.

Joes are split up into teams, each with a Pro captain, and given their own network to defend against the other Pros in our Red Cell. Each team’s network is full of servers and desktops running Windows, Linux, your standard services like DNS, Web, Mail, and others. Of course, there will be more than a few surprises…

Pros V Joes is linking up with SE CTF!

This year, the Pros V Joes CTF will be working together with the Social Engineering CTF at BSides LV. This will add a new and exciting dimension to the classical bits and bytes hacking of PvJ. Now, Pros and Joes alike will have to also handle their physical security and their OPSEC. Social Engineering players will have the challenge of trying to deal with a live organization of defenders that are trying to protect their information. Red Cell players of PvJ will have to choose a side (or not…


Tuesday August 4, 2015 10:00 - 18:00
Chill-Out Room Florentine C/D

11:00

I Am The Cavalry Track Introduction and Overview
We will provide a brief overview of I Am The Cavalry, as well as outline the day's activities. Participants who have yet to be introduced to the initiative will be; those who are very familiar will be updated on activities and progress over the last year. And we will describe the vision for the day's activities. Even if you miss this first session, you can join for any of the others.

Speakers
avatar for Joshua Corman

Joshua Corman

CTO | Founder | Founder, Sonatype | I am The Cavalry | Rugged
Joshua Corman is a Founder of I am The Cavalry (dot org) and Director of the Cyber Statecraft Initiative for the Atlantic Council. Corman previously served as CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The 451 Group and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing... Read More →
avatar for Nicholas J. Percoco

Nicholas J. Percoco

Vice President, Rapid7
Nicholas J. Percoco is vice president of strategic services at Rapid7. In his role he leads a team that advises customers on how to mitigate and respond to threats using data driving analysis to empower more relevant, timely, and impactful decisions. Over the past decade, Nicholas has presented security research with a focus on custom malware, mobile devices, and data breach trends to audience all over the world including a Keynote at RSA... Read More →


Tuesday August 4, 2015 11:00 - 11:25
I Am The Cavalry Florentine B

11:00

A Security/Usability Review of Wordpress 2FA Plugins
So 2FA was supposed to save the world from passwords, huh? This review of a wide range of 2FA plugins looks at issues within security, usability, scalability, and administrative features.

Speakers
avatar for Per Thorsheim

Per Thorsheim

CEO, God Praksis AS
Per is an independent security adviser and the founder of PasswordsCon. He was a finalist for the annual Rosing IT security award in 2012, and was awarded the Commanding General of the Norwegian Armed Forces Cyber Defence Coin in spring 2014 for his contributions to information security. He is certified CISA, CISM, CISSP & ISSAP.


Tuesday August 4, 2015 11:00 - 11:25
Passwords Tuscany

11:00

Speaking Metrics to Executives
Just as strong CIOs have moved from talking about processors and routers, leaders in information security are bridging discussions of business risk and competitive landscapes with understandable metrics. During this session, some model metrics will be discussed taking typical "geek numbers" into CxO presentations by appropriate transformation and interpretation. Participants are invited to discuss presenting additional executive metric models.

Speakers
MS

Michael St. Vincent

Michael St. Vincent (@JustOnePing) is an InfoSec professional with over two decades of security and risk management experience. His work includes developing, implementing, and leading security programs in financial, defense industry, and ISP organizations. He currently serves the Metro Nashville Mayor's Information Security Advisory Board, the Middle Tennessee Chapter of ISSA, and BSides Nashville. During downtime, he supports youth development... Read More →


Tuesday August 4, 2015 11:00 - 11:25
Proving Ground Florentine E

11:00

Underground Wi-Fi Hacking for Web Pentesters
There is an ever-increasing trend with Internet Service Providers of all sizes providing open wireless hotspots nationwide, many of which are bridged off of existing customers personal access points and others are made available through restaurants, hotels, and other businesses. Many of these guest networks have recently spurred discussion within the security community over the insecurity of open access points in general and the ethics of their deployment methods. The talk will cover the many gaping insecurities of wireless hotspots and dive in to how these can be leveraged to attack clients, gain free Internet access, hijack accounts, steal sensitive information, and more. This will progress into how web penetration testers can leverage their existing skill-sets to design, build, and deploy malicious targeted access points. All of the attacks that will be demonstrated live during the talk can be deployed on various platforms, making it easy for the audience to reproduce regardless of hardware available.

Speakers
avatar for Greg Foss

Greg Foss

Head of Global Security Operations, LogRhythm Labs
Greg Foss is LogRhythm’s head of Global Security Operations and a Senior Researcher with Labs – tasked with leading both offensive and defensive aspects of corporate security. He has just under a decade of experience in the information security industry with an extensive background in ethical hacking and penetration testing, focusing on Web application security and red teaming. Greg holds multiple industry certifications including the OSCP... Read More →


Tuesday August 4, 2015 11:00 - 11:55
Above The Ground Plane Copa Showroom (1st Fl)

11:00

Injection on Steroids: Code-less Code Injections and 0-Day Techniques
We expose additional new user- and kernel-mode injection techniques. One of these techniques we’ve coined as “code-less code injection” since, as opposed to other known injection techniques, does not require adding code to the injected process. We also reveal an additional kernel-mode code injection which is a variation to the technique used by the AVs. However, as we demonstrate, malwares can actually simplify this process.

Speakers
TB

Tomer Bitton

Tomer Bitton has more than 12 years of experience in security research. Tomer focuses on original research such as malware reversing, hostile code and extreme packers. In his prior role, Tomer served as a low-level security researcher at the National Electronic Warfare Research & Simulation Center of Rafael Advanced Defense Systems. There, he won excellence and innovation awards for complex security projects. Before that, Tomer managed the... Read More →
avatar for Udi Yavo

Udi Yavo

CTO, enSilo
Udi Yavo has more than 15 years of experience in security with a proven track record in leading cutting edge cyber-security R&D projects. Prior to enSilo, Udi spearheaded the direction of the cyber-security unit at the National Electronic Warfare Research & Simulation Center of Rafael Advanced Defense System and served as its CTO. Additionally, he developed and led Rafael’s cyber training programs. Udi’s achievements at Rafael have been... Read More →


Tuesday August 4, 2015 11:00 - 11:55
Breaking Ground Florentine A

11:00

Verum - How Skynet Started as a Context Graph
Now that we've all seen an 'intelligence' stream, we can safely say it's not doing much. Rather than provide the statistical evidence of just how much it's not doing, this talk will discuss how to combine intelligence data with other data sources to answer questions such as "Is this new IP not in my intelligence data malicious?" and "Is this domain admin evil or just misguided?"

Speakers
GB

Gabriel Bassett

The Infosec Graph Guy. Based on his history in DoD and Healthcare, Gabriel currently researches methods for using large data sources to algorithmically detect malice ... instead of working on the DBIR like he should be.


Tuesday August 4, 2015 11:00 - 11:55
Ground Truth Florentine F

11:00

Practical Application Whitelisting Evasion
Organizations continue to tout Application Whitelisting as one of the best counter-measures to deploy. We have developed several evasion techniques that put organizations at risk that use Application Whitelisting. We would like to share these techniques, and engage in dialogue about ways to improve or expand our research.

Speakers
CS

Casey Smith

Casey is an Information Security Analyst in the Financial Industry.


Tuesday August 4, 2015 11:00 - 11:55
Underground The Tuscany

11:00

Barely Legal: the Hacker’s Guide to Cybersecurity Legislation
Cybersecurity is a hot topic in DC, and everyone is building an agenda on it. That’s only going to increase as more high profile breaches and vulnerabilities hit the headlines, and technology becomes more pervasive in our lives. This legislation impacts our community, and as experts in a field that is complex and often misunderstood, we have an important role to play in educating law makers and helping them reach positive outcomes, and mitigate negative ones.

This talk will provide an overview of the legislative landscape for cybersecurity, and investigatd how it really affects our industry and community. We will cover current proposals likely to pass, as well as law that is already impacting the security community, such as the CFAA and DMCA. We will also discuss how you can get involved.

Speakers
JE

Jen Ellis

Jen Ellis is the senior director of Community and Public Affairs at Rapid7 and spends most of her time trying to build productive collaboration between those in the security community and those operating outside it. Much of this revolves around educating the Government on security issues to try to positively shape legislation and other initiatives that may impact the security community. She also works extensively with security researchers to help... Read More →


Tuesday August 4, 2015 11:00 - 12:25
Common Ground Florentine G

11:30

Hack the Future
This talk is about inspiring hackers to be the change agents of the future, with practical things hackers can do to create a positive impact. It’s about being a good hacker while staying out of jail and making the world a better place – with things like community outreach projects, crypto parties, voluntary red teams, responsible disclosure and stopping the spread of FUD.

Speakers
KE

Keren Elazari

Keren Elazari brings years of experience in the international cyber security industry to BSIDES . Since 2000, Keren has worked with leading Israeli security firms, government organizations, Global Big 4 and Fortune 500 companies. Keren holds a CISSP security certification, a BA in History and Philosophy of Science, MA in Security Studies and is currently a senior research fellow with the prestigious Security & Technology workshop at Tel Aviv... Read More →


Tuesday August 4, 2015 11:30 - 11:55
I Am The Cavalry Florentine B

11:30

Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
This talk is focused on how to better interface with the business leaders of your organization. Having great technical skills will only carry you so far in your career, at some point you need to develop the skillset to work with the business and further your value and your opportunities.

Speakers
EJ

Elliot Johnson

IT professional with 16 years experience, the last 5 in Information Security. Outside of work I can talk about beer or professional wrestling for hours on end. Preferably while drinking a beer. Also enjoy homebrewing and watching the dreaded sportsball. Also while drinking a beer.


Tuesday August 4, 2015 11:30 - 11:55
Proving Ground Florentine E

11:30

Unspeakable Passwords: Pronounceable or Diceware
Jeff Goldberg from AgileBits (1Password) will discuss the pros and cons of pronounceable random passwords versus Diceware passphrases. 

Speakers
avatar for Jeffrey Goldberg

Jeffrey Goldberg

Chief Defender Against the Dark Arts, AgileBits
Jeffery Goldberg is the Chief Defender Against the Dark Arts at AgileBits, creators of the password manager 1Password.


Tuesday August 4, 2015 11:30 - 12:25
Passwords Tuscany

12:00

Getting the data out using social media
You’ve made it into the network - but can you get data out? Today’s Internet provides a dazzling array of legitimate upload sites to hide your traffic in - Twitter, Flickr, SoundCloud, YouTube, Dropbox, and more - but each channel requires a different tool or custom code, and endless troubleshooting. Sneaky-creeper is a new open source framework for exfiltrating (or infiltrating) data using any of the backchannels the Internet provides, with a minimum of effort. Modules are easy to create and share, enabling covert communications over more channels than ever before.

Speakers
GB

Gabriel Butterick

Gabriel grew up in Tampa, Florida. He attended the University of Florida for two semesters taking a variety of courses on software, writing, and biology. After, he transferred to Franklin W. Olin College of Engineering where he has completed 2 semesters with his focus being in software design.
avatar for Dakota Nelson

Dakota Nelson

Intern, Black Hills Information Security
Dakota is an engineering student at Olin College in Boston, and an intern at Black Hills Information Security. He has previously developed software for DoD, DOE, and DARPA, and is heavily involved in the Boston startup community, including as a Student Fellow at .406 Ventures, a security-heavy venture capital firm in Boston. He has a diverse software development background, but has mostly focused on creating novel web applications while at... Read More →
BW

Byron Wasti

Byron Wasti is studying electrical and computer engineering at the Olin College of Engineering in Boston. He has a background in both programming and electronics. Byron is also a strong supporter of the Open Source community.


Tuesday August 4, 2015 12:00 - 12:25
Breaking Ground Florentine A

12:00

When steganography stops being cool
The art and science of concealing stuff inside other stuff is what we know as steganography. People have used it for ages to keep adversaries from looking at their secret information. In this presentation, we look specifically at malware writers and how they are using steganography to hide malicious data in strange places.

Speakers
DS

David Sancho

David Sancho joined Trend Micro in 2002, having fulfilled a variety of technical security-related roles. Currently, his title is Senior Anti-Malware Researcher, and he specializes in web threats and other emerging technologies. In his more than 12 years of experience in the security field, David has written and published a number of research papers on malware tendencies, has been featured in the media, and has participated in customer events... Read More →


Tuesday August 4, 2015 12:00 - 12:25
Ground Truth Florentine F

12:00

Leading in a "Do"-ocracy
What is a "do"-ocracy, and what does it take to lead one? While some people stand back and gawk at problems, others jump in to do something about what they see. Explore some common traits of do-ocracies, why they inspire others, and how leaders emerge. Learn from the successes and the failures of our panelists, and hopefully spark ideas within yourself that you can bring to a do-ocracy of your choosing or making.

Moderators
TK

Tim Krabec

Over the years Tim's passion for Information Technology has taken him from Programming to System Administration, Consulting and into Information Security.  Tim has been an active member of the South Florida Chapter of ISSA since he was introduced to the group back nearly 10 years ago. Tim's passion has let him to giving talks at his local ISSA Chapter, as well as Skytalks. Tim enjoys the problem solving aspect of Information... Read More →

Speakers
TB

Tod Beardsley

Tod Beardsley is the Principle Security Research Manager at Rapid7. He has over twenty years of hands-on security knowledge, reaching back to the halcyon days of 2400 baud textfile BBSes and in-band telephony switching. Since then, he has held IT Ops and IT Security positions in large footprint organizations such as 3Com, Dell, and Westinghouse. Today, he is passionate (some might say militant) about open source software development, open... Read More →
avatar for Chris Nickerson

Chris Nickerson

IDS Administrator, DNC
Born on an off-shore drilling platform, autonomous country, know as Sealand, he didn't hold a recognized citizenship until 23yo. Convicted of selling black market ASCII porn he was sentenced to 10 years of binary data entry, carpal tunnel became his reality. Which sparked a career change and a return to school to become a proctologist although he really had a foot fetish. An avid apiarist, he insists on only using locally-sourced, organic... Read More →


Tuesday August 4, 2015 12:00 - 12:25
I Am The Cavalry Florentine B

12:00

Practice Safe Cyber: The Miseducation of American Students on Internet Safety
What students are told to watch out for online: sexual predators. What they should actually be watching out for online: basically everything else. Contemporary American education relies heavily on the notion of “technology is everywhere and kids are clever, so we don't need to teach them about technology!” To certain extents, this is true. But like any user, the average American kid is actually pretty clueless. This talk will discuss what isn't being in taught in classrooms, what is actively being incorrectly taught, and what you can do about it. Come because you fear what the next generation of users will do to your blood pressure and subsequent health insurance premiums, stay for the snark and weird slides.

Speakers
VP

Vivienne Pustell

Vivienne Pustell is a graduate student at the Stanford University School of Education. A former high school teacher, she attempted to nurture the next generation of social engineers and infosec-savvy citizens, but would rather not incriminate herself with specifics.


Tuesday August 4, 2015 12:00 - 12:25
Proving Ground Florentine E

12:30

Lunch
Tuesday August 4, 2015 12:30 - 13:55
Chill-Out Room Florentine C/D

14:00

State of Medical Device Cyber Safety
Beau and Scott will give an overview of the medical device space and talk about the things that have gone on in the past year. This will be a revealing talk where we can give more details of what has been happening around the industries, how the security community has engaged, and what the road ahead looks like. They'll also introduce and walk through the Medical Device workshop.

Speakers
SE

Scott Erven

Scott Erven is an Associate Director at Protiviti. He has over 15 years of information security and information technology experience with subject matter expertise in medical device and healthcare security. Scott has consulted with the Department of Homeland Security, Food and Drug Administration and advised national policymakers. His research on medical device security has been featured in Wired and numerous media outlets worldwide. Mr. Erven... Read More →


Tuesday August 4, 2015 14:00 - 14:25
I Am The Cavalry Florentine B

14:00

Check That Certificate
Why are developers frequently disabling certification validation in their software? Is it because they are lazy or just plain imbecile? We decided to find out by writing examples to demonstrate certificate checking in as many languages as possible. We found that it was difficult to do properly in the best of libraries, and had catastrophic failure in anything less. There are even a few instances of the libraries built in functions getting it horribly wrong.

Speakers
JJ

Jacob Jernigan

Jacob Jernigan works for DigitalOcean on the support team where he ensures customers have the best support experience possible. Previously, he worked as a system administrator at a small information security consultancy. Outside of work, you will find him researching information security, learning programming, | and cycling around the City of Seattle.
AS

Andrew Sorensen

Andrew lives in Seattle, WA and works as a Security Consultant at Leviathan Security Group. Andrew is the creator of WLNet and LocalCoast, under which he develops software. Andrew holds a Bachelor's of Science in Computer Science and is most interested in new methodologies for solving computer security problems. In his spare time, Andrew researches different areas of security, works on his data and automation platform (WLNet Dataview) and tinkers... Read More →


Tuesday August 4, 2015 14:00 - 14:25
Proving Ground Florentine E

14:00

#radBIOS: Wireless networking with audio
Wireless comms nearly always focus on the EM spectrum- RF, microwave, even laser. But what about sound? Motivated by Dragos's badBIOS work, richo sat down to reimplement a subset of the original capabilities at a high level in userland.

Having already produced the Groundstation framework for distributed communications, the next logical step was to produce an audio bridge, the result of which is that nodes with working sound hardware can communicate structured data when physically proxmiate, without any other shared state.

Speakers
avatar for Richo Healey

Richo Healey

Security Engineer, Stripe
richo likes his ducks flat and his instruction sets reduced. He breaks things at Stripe, works on Rust, and will hopefully update his bio before the con.


Tuesday August 4, 2015 14:00 - 14:55
Above The Ground Plane Copa Showroom (1st Fl)

14:00

An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
Kobra is a kernel level client that provides mitigation against malware by blocking access to USB devices, preventing process forking, and blocking access to disk.

Speakers
AF

Ahmed Fawaz

Ahmed Fawaz is a Ph.D candidate at the Coordinated Science Laboratory | (CSL), University of Illinois at Urbana Champaign. He received his | B.E. in Electrical and Computer Engineering in 2011 from the American | University of Beirut. Currently, he is working on trust issues in | monitoring data during cyber incidents and intrusion resilience in the | future smart grid through automated response and recovery using | control theory, game... Read More →
ER

Edmond Rogers

Edmond 'bigezy' Rogers | Edmond Rogers is a Security Engineer for the University of Illinois Information Trust Institute. Previously, Rogers worked at a fortune 500 Investor Owned Utility | in the United States where he was responsible for the cyber security of SCADA systems that operated the bulk electric system. Rogers has also previously been | responsible for critical infrastructure security in the financial and telecom industries.
WR

William Rogers

William Rogers is a student and developer of the Badger. Released at Blackhat in 2014. He resides in Urbana Illinois.


Tuesday August 4, 2015 14:00 - 14:55
Breaking Ground Florentine A

14:00

Pentesting with Docker
Docker allows us to run processes in "isolated" containers. Logically, we can think of containers synonymously to VM's, but they're very different. Docker allows us to create reproducible and sharable images, which can then run anywhere. No more dependencies, no more clutter. Finally your host OS can stay clean. This talk will provide an overview of Docker, how to build and run your own images, how to share data and network services across containers and with your host, and how I use it to run all my tools (Including BurpSuite). Lots of demos, very few slides.

Speakers
avatar for Tom Steele

Tom Steele

Tom Steele is a principal security consultant at Optiv Security with more than 5 years of penetration testing experience. He writes a lot of code and contributes to many open source projects.


Tuesday August 4, 2015 14:00 - 14:55
Common Ground Florentine G

14:00

Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
The gap between the effort needed to withstand online and offline password guessing attacks is enormous, and there's a large gap where increasing cracking resistance leads to no change in outcomes. On many networks there's also a snowball effect, where an attacker with x% of credentials controls much more than x% of network resources; this also gives a large region where increasing cracking resistance accomplishes nothing. This talk examines the administrator's task of defending a population of users from password cracking, what does and doesn't make sense, and where we are wasting our time (spoiler alert: almost everywhere.)

Speakers
CH

Cormac Herley

Principal Researcher, Microsoft
Cormac is a Principal Researcher at Microsoft Research, where he has been since 1999. He has published widely in information theory,and networking and security. He is an inventor of 70+ US patents, and has shipped technologies used by hundreds of millions of users. He holds a PhD from Columbia University, an MSEE from Georgia Tech, and a BE from the National University of Ireland.


Tuesday August 4, 2015 14:00 - 14:55
Passwords Tuscany

14:00

The Internet of ... Mainframes?! WTF?
In early 2013 Soldier of Fortran had an idea. What if there were mainframes on the internet? He knew, of course, there had to be, the internet is just full of all kinds of weird stuff. But what if there’s also mainframes on there, what would that mean? What would they look like? Using some google fu he started the hunt, easily finding a handful, then later moving on to SHODAN and finally masscan. Having grown up in the BBS era he was happy to find hundreds of ‘green’ screens up and running with their beautiful EBCDIC art for all the world to see. This talk will walk through the story of how he found the mainframes, first by himself and later with the help of others. He’ll go through the growth process he went through to find the mainframes and how he helped augment tools like SHODAN to make the hunting easier. He’ll detail the tools he wrote specifically to hunt internet mainframes, the troubles he’s gotten in to for looking for them (like when someone came up to me after a talk to tell me it was one of theirs) and then provide MANY examples of the the kind of (scary) things he’s encountered on the web. He’ll also delve into some of the alarming statistics of mainframe security using what he’s seen as an example. There may even be some live examples of some of those mainframes.

Speakers
avatar for Soldier of Fortran

Soldier of Fortran

Supreme Commander, Zed Security
Soldier of Fortran is a mainframe hacker. Being a hacker from way back in the day (BBS and X.25 networks) he was always enamored by the idea of hacking mainframes. Always too expensive and mysterious he settled on hacking windows and linux machines, until 2010 when he finally got his very own. Not worrying about system uptime he dove in head first and was surprised by what he found. He’s spoken both domestically (DEFCON, BlackHat) and... Read More →


Tuesday August 4, 2015 14:00 - 14:55
Underground The Tuscany

14:00

Analogue Network Security
In 1973, the Bell-Lapadula security model was introduced and is fundamentally still how security is implemented: with static fortress mentality,

In 1987, the U.S. Department of Defense published the Red Book; the Network Interpretation of the lauded Orange Book that set forth many of the principles for information security. The results were, essentially, ‘we have no earthly idea how to secure a network’.

Today, we now assume our networks are ‘P0wn3d’ - already infiltrated by hostiles. We ‘know’ that by adding more technology, our security problems will go away. We think of ‘the network’ as a single ‘thing’ and attempt to protect it as such. It isn’t and we can’t.

TCP/IP. It was just an experiment. Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where's the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate deja vu epic fail of security.

Is this any way to run a business? Or a planet? I hope to offer a corrective view. Analogue Network Security. Geeky. Interdisciplinary. Exciting, emerging security model to fix our woes. Finally, three Memes for your consideration.

1. ROOT is the root of all cyber-evil.

2. Passwords will be the downfall of us all. The game is really about IdM.

3. Security requires a single, interdisciplinary metric for the cyber, physical and human domains.

C’mon, 50 years of practice and we're still…? Well, screw it. You’ll see. I have a few ideas.

Speakers
WS

Winn Schwartau

http://winnschwartau.com/biography/


Tuesday August 4, 2015 14:00 - 15:55
Ground Truth Florentine F

14:00

Exploit Kit Shenanigans: They’re Cheeky!
The “Exploit Kit Shenanigans: They’re Cheeky!” workshop will consist of attendees pulling apart a few exploit kits to understand how they work at a low level. This will be an intermediate-level workshop, developed for people familiar with running Linux commands (we’ll be using REMnux) and those whom can learn new tools quickly (we’ll be using a bevy of tools, including the likes of Immunity Debugger).

I LOVE analyzing exploit kits, and I cannot wait to show others how to review an exploit kit’s real intent. We would begin by grabbing some samples off VirusTotal (pre-selected of course), work to deobfuscate the threats, cover how the actual exploits work, and then analyze the relevant shellcode in a debugger.

Speakers
avatar for Ryan Chapman

Ryan Chapman

Computer Incident Response Analyst, Bechtel Corporation
Ryan Chapman works as an incident response analyst for Bechtel Corporation. Ryan enjoys the challenge of handling incidents, reversing malware, and automating tasks for the security operations center. He also loves public speaking and has presented at venues such as BSides, CactusCon, Splunk .Conf, and others. Ryan has a fondness for doing stand-up comedy, retro gaming, and plays plenty of Street Fighter. Hadouken!


Tuesday August 4, 2015 14:00 - 17:55
Training Ground I Siena

14:00

Violent Python
Even if you've never programmed before, you can quickly learn how to make simple hacking tools in Python.
Students will make and customize tools that perform these tasks:

Port scanning
Login brute-forcing
Port knocking
Cracking password hashes
Sneaking malware past antivirus engines

Speakers
avatar for Sam Bowne

Sam Bowne

City College San Francisco, City College San Francisco
Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks at DEFCON, HOPE, BayThreat, LayerOne, and Toorcon, and taught classes and many other schools and teaching conferences. He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign. Industry certs: CISSP, CEH, CCENT, WCNA, and more.


Tuesday August 4, 2015 14:00 - 17:55
Training Ground II Siena

14:30

The Journey To ICS
The goal of the talk is to provide a starting point for security professionals that want to migrate towards ICS Security.

Speakers
avatar for Larry Vandenaweele

Larry Vandenaweele

Security Consultant
Larry works for a consulting firm in Belgium. He’s been active in the security industry for over five years. Until two years ago, he mainly performed penetration tests on IT environments, but has now made the shift toward OT environments. Before beginning his professional career, he did charity work in the Philippines as part of an internship.


Tuesday August 4, 2015 14:30 - 14:55
Proving Ground Florentine E

14:30

How can we ensure safer Medical Devices?
The goal is to identify 2-3 good projects with strong support and leadership in the Medical Device area. We will ideate individual initiatives, then break into groups to flesh those out, identify outcomes, constraints, output, and methods. Each team will present their ideas in a lightning talk and facilitate a short discussion. After the ideas are laid out, participants will elect to get involved in making them come to reality, leaders will emerge to manage the initiatives, and others will pledge to support their actions.

Speakers
SE

Scott Erven

Scott Erven is an Associate Director at Protiviti. He has over 15 years of information security and information technology experience with subject matter expertise in medical device and healthcare security. Scott has consulted with the Department of Homeland Security, Food and Drug Administration and advised national policymakers. His research on medical device security has been featured in Wired and numerous media outlets worldwide. Mr. Erven... Read More →


Tuesday August 4, 2015 14:30 - 15:55
I Am The Cavalry Florentine B

15:00

What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
KoreLogic will demonstrate how one enterprise was able to dramatically minimize their risk posed by password cracking attacks -- from 85% cracked down to only 50% cracked -- through regular password auditing.

Speakers
DC

Dale Corpron

Dale is a Security Consultant with KoreLogic, where he performs penetration testing and password audits for Fortune 500 companies and developed KoreLogic's Password Recovery Service. An avid password cracker, Dale also helps run the annual "Crack Me If You Can" contest at DEF CON.
avatar for Rick Redman

Rick Redman

Senior Security Consultant, KoreLogic
Rick, aka Minga, has over 16 years of experience as a penetration tester, and runs KoreLogic's Password Recovery Service. He also runs the annual "Crack Me If You Can" contest at DEF CON. He has provided numerous contributions to the password-cracking community, and has previously presented at DEF CON, DerbyCon, ShmooCon, PasswordsCon, Bsides, OWASP, ISSA, and ISSW.


Tuesday August 4, 2015 15:00 - 15:25
Passwords Tuscany

15:00

Catching Linux Post-Exploitation with Auditd
Many Linux administrators are required to deploy Auditd in order to meet government or industry security compliance requirements. In this talk we will dive into common Linux Audit configurations and determine their value when responding to successful attacks. Finally by examining real world attacks, we can create Auditd rules that can alert us following the successful exploitation of a service.

Speakers
EG

Eric Gershman

Eric Gershman is currently working on the security team for a group that manages large systems that enable researchers to do "Big Science". Prior to working in security Eric pursued a bachelors degree in Information Technology at the University of Central Florida. During his time at UCF, he worked as a technician on a large help desk, research intern for an Anti-Virus company and finally as a Linux Systems Administration for several Department of... Read More →


Tuesday August 4, 2015 15:00 - 15:25
Proving Ground Florentine E

15:00

I Amateur Radio (And So Can You!)
Ham radio: it’s the 100 year-old technology that refuses to die. Whether you’re a wireless enthusiast, electronics tinkerer, or just someone who wants to be able to communicate during the zombie apocalypse, having a ham radio license can open a new world of possibilities for any hacker. Come learn how and where to get your license, what you can expect to study, how you can work radio into your everyday hacking, and anything else you ever wanted to know about ham radio but were afraid to ask.

Speakers
avatar for Kat Sweet

Kat Sweet

Kat Sweet wrote her first line of code in her mid-twenties and never looked back. Now she’s a network security student at Madison Area Technical College, where she also serves as president of her school's IT student organization. Outside of class, you can find her fixing other people's computers, teaching, and wielding pointy objects (mainly lockpicks and knitting needles). She has a ham radio Extra class license, and organizes ham exams... Read More →


Tuesday August 4, 2015 15:00 - 15:55
Above The Ground Plane Copa Showroom (1st Fl)

15:00

NSA Playset: Bridging the Airgap without Radios
This talk introduces a new entrant into the NSA Playset: BLINKERCOUGH.  BLINKERCOUGH is a C&C and data-exfiltration implant embedded in a seemingly innocuous cable.  It uses optical means to jump the air-gap, having zero radio footprint.  BLINKERCOUGH can be used in radio monitored or radio-denied settings.

Speakers
JH

J.R. Hacker

Michael (@r00tkillah) has done hard-time in real-time. An old-school computer engineer by education, he spends his days championing product security for a large semiconductor company. Previously, he developed and tested embedded hardware and software, dicked around with strap-on boot roms, mobile apps, office suites, and written some secure software. On nights and weekends he hacks on electronics, writes BSides CFPs, and contributes to the NSA... Read More →


Tuesday August 4, 2015 15:00 - 15:55
Breaking Ground Florentine A

15:00

Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
Good information security policy requires addressing a myriad of complicated, inter-related issues, while still adhering to the Hippocratic principle of "First, Do No Harm." Rather than new regulation, one approach is to bring those that understand the issues and have a stake in the game together to find common ground.

This talk will present the US Department of Commerce's new initiative on vulnerability research disclosure, and explain the multistakeholder process that builds on community experience to build trust between security researchers and software and system vendors. The goals are to identify and promote common principles and best practices that all parties agree will promote  We'll translate DC buzzwords, and ask for your feedback on how we can make this process better.

Speakers
avatar for Allan Friedman

Allan Friedman

Director of Cybersecurity, US Department of Commerce
Dr. Allan Friedman is the Director of Cybersecurity Initiatives at National Telecommunications and Information Administration in the US Department of Commerce. Prior to joining the Federal government, Friedman was a noted infosec and technology policy researcher at a range of institutions, including George Washington University, the Brookings Institution, and Harvard University. Wearing the hats of both a technologist and a policy scholar... Read More →


Tuesday August 4, 2015 15:00 - 15:55
Common Ground Florentine G

15:00

What's New Pussycat: Recent Improvements to Powercat
Powercat allows testers to accurately replicate a variety of sophisticated command and control techniques used by skillful attackers. Attendees will learn; core functionality, the latest developments, and help determine future project plans.

Speakers
LB

Luke Baggett

Luke Baggett is a computer science student working as an intern for Black Hills Information Security, where he does penetration testing, and works on various development projects. In his spare time Luke has worked on powercat, a powershell dnscat client, and some currently unreleased projects. He holds the GSEC, GPEN, and GCIH certifications from GIAC.
MD

Mick Douglas

Mick Douglas is the DFIR Practice Lead at Binary Defense Systems, where he assists companies in every phase of recovery from information security incidents. He is also an instructor for SANS where he teaches several different classes at the community level. In his spare time, Mick works on powercat and other PowerShell projects.


Tuesday August 4, 2015 15:00 - 15:55
Underground The Tuscany

15:30

Breachego
This presentation will demonstrate a large number of Maltego Remote Transforms that achieve a significant reduction with password cracking that leverage the APIs from Abusix, haveibeenpwned, and BreachAlarm of compromised credentials posted to Pastebin.

Speakers
avatar for Daniel Cuthbert

Daniel Cuthbert

Chief Operating Officer, SensePost
Daniel Cuthbert is the Chief Operating Officer at SensePost and has been a penetration tester since the mid 90's. He has an obsession with tracking down Internet Jihadi's, is the original author of the OWASP Testing guide, now is the author of the OWASP ASVS and holds two masters degrees.
avatar for Christian Heinrich

Christian Heinrich

Maltego Developer, cmlh.id.au
Christian Heinrich has presented at OWASP conferences on three continents, and has also presented at ToorCon, Shmoocon, SecTor, CONFidence, Hack In The Box, SyScan, RUXCON, and AusCERT.


Tuesday August 4, 2015 15:30 - 15:55
Passwords Tuscany

15:30

Adding +10 Security to Your Scrum Agile Environment
Scrum agile development is one of the many methodologies in which software can be developed. The resulting metrics produced from a scrum agile team can help to provide accurate timelines associated with project completion. In many organizations security teams are separated from scrum agile development teams which until a security issue occurs, and then both teams come together. This separation can cause multiple issues that negatively impact both parties rippling across the organization thus affecting the business. If security issues arise and are not fixed in a proper manner, this can leave an organization vulnerable. Furthermore, taking development time to fix issues violates the rules of scrum agile and will further impact the project timeline. The problem exists because each team has its own priorities and agenda. The security team should be more closely integrated and have representation that actively participates as a functional member of an agile team, and not as the enemy. The result of their full integration could help to change a developer’s mentality towards security, begin to address security needs as they are happen with a legacy or active application, and help satisfy both teams’ timelines and agendas.

Speakers
JL

Josh Louden

Josh Louden started writing, decompiling, and modifying VB applications in middle school in his spare time. He has continued his curiosity through college, and immersed himself into the developer realm while diving into security with undergraduate research projects in cryptography, and risk assessment. He continues use his security knowledge with developing applications in his career as a senior application developer.


Tuesday August 4, 2015 15:30 - 15:55
Proving Ground Florentine E

16:00

How to WCTF
Ever wanted to compete in the Wireless Capture the Flag but didn't know
if you were up to it?  Compete every con and want to up your game?  Come
learn the tips and tricks from the designers of the true to life
simulated pen-test Wireless Capture the Flag.

Speakers
RH

Russell Handorf

Russell has been in the information security realm for 15 years. He | built and sold a wireless ISP, worked info sec in the financial services | industry and now is a public servant of sorts. His hobbies and interests | have always involved radio in some sort of fashion. When he has spare | time, he is completing his PhD, teaches, create mischief, and is working | on his dad jokes. | | Flowers, red and blue, | Russell loves SDR toys. | This is a... Read More →
RH

Russell Handorf II

Russell is the Chief Security Officer for Signals Defense in Owings | Mills, MD, and has been a security architect for multiple US Government | agencies and corporations. Mr. Handorf specializes in designing and | testing wireless networks with non-traditional strategies, using | offensive techniques. He has over 17 years of IT and security | experience, is a builder and breaker of RF signals, and inventor of the | Wireless Capture the Flag... Read More →
RI

Russell_Handorf III

After an unsuccessful adult film career under the pseudonym "Chubby | Cox", Russell has settled comfortably into his backup career of Wireless | Security. Specializing in Wifi security, he has also branched out into | bluetooth, radio, and sdr. Currently, he is working on the best Linux | distro to ever grace the face of the earth, Pentoo. This bio is entirely | unbiased.


Tuesday August 4, 2015 16:00 - 16:55
Above The Ground Plane Copa Showroom (1st Fl)

16:00

Happy Hour
Tuesday August 4, 2015 16:00 - 16:55
Chill-Out Room Florentine C/D

17:00

State of Automotive Cyber Safety
Josh and Craig will give an overview of the Automotive space and talk about the things that have gone on in the past year. This will be a revealing talk where we can give more details of what has been happening around the industries, how the security community has engaged, and what the road ahead looks like. They'll also introduce and walk through the Automotive workshop.

Speakers
avatar for Joshua Corman

Joshua Corman

CTO | Founder | Founder, Sonatype | I am The Cavalry | Rugged
Joshua Corman is a Founder of I am The Cavalry (dot org) and Director of the Cyber Statecraft Initiative for the Atlantic Council. Corman previously served as CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The 451 Group and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing... Read More →


Tuesday August 4, 2015 17:00 - 17:25
I Am The Cavalry Florentine B

17:00

Tell Me Who You Are, and I Will Tell You Your Lock Pattern
You are predictable, your passwords are predictable, and so are your PINs. This simple fact is often exploited by hackers, as well as the agencies watching you. But what about your Android lock patterns? Can who you are reveal what patterns you create? This talk will present the results from a study of 3400 users and their selected lock patterns. Will being left-handed and having experience with security affect the way you create your lock patterns? Full Disk Encryption won't save you if your lock pattern is L - as in "loser".

Speakers
avatar for Marte Løge

Marte Løge

Technology Analyst, Itera ASA
Marte has recently obtained a Masters in Computer Science from the Norwegain University of Science and Technology (lol NUTS), and is currently employed as a full-time as a software developer for a Norwegian consulting firm. She likes passwords and colors, resulting in a special interest in graphical passwords. She is probably the only person that has survived after studying the Android Pattern Lock for a whole year.


Tuesday August 4, 2015 17:00 - 17:25
Passwords Tuscany

17:00

Fight back – raising awareness @infosec
Why do we need security awareness? Apps/tools/services are under constant research (read: hacking) every day. Researchers are looking for fascinating problems to be solved, which are created accidentally by developers. It’s hard to admit but researcher evolution, motivation and attitude is currently more up-to-date than your ability to fight back to prevent them.

There are real life examples about this matter. Current security breaches with eg. Target, Home Debot, Anthem has opened this area to the wide public, but there will be surely many more to come.

Knowledge increases pain, doesn’t it? Developers cut corners with their trendy “agile” processes or pressure from customers and don’t really know or understand the basics of information security. There are certain infosec areas that need to exist in to your daily work, which will remove you to be the weakest link in the chain. When researcher comes for a visit, maybe you cannot prevent the intrusion to your system, you CAN prevent the exit with stolen data.

Speakers

Tuesday August 4, 2015 17:00 - 17:25
Proving Ground Florentine E

17:00

How Portal Can Change Your Security Forever
When used correctly gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for taking security training. In this talk Kati Rodzon will discuss how games like Portal and Candy Crush were able to make millions and how those same techniques can be used to change security as we know it.

Speakers
KR

Katrina Rodzon

Katrina Rodzon has over 12 years of experience and a diverse set of skills that she has applied to creating, implementing and evaluating innovative behavior change programs. She is currently the Security Program Manager for Bugcrowd. Whether she is collecting resources from the web, working with experts to create new content, or collaborating with the dev team to implement and update features on the Bugcrowd platform her focus is Crowd quality... Read More →


Tuesday August 4, 2015 17:00 - 17:55
Common Ground Florentine G

17:00

Crema: A LangSec-inspired Language
We discuss the potential for significant reduction in the size and complexity of verification tasks for input-handling software when such software is constructed according to LangSec principles, i.e., is designed as a recognizer for a particular language of valid inputs and is compiled for a suitably limited computational model no stronger than needed for the recognition task. We will demo Crema, an open-source programming language and restricted execution environment of sub-Turing power.

Speakers
avatar for Jacob Torrey

Jacob Torrey

Advising Engineer, Assured Information Security, Inc.
Jacob Torrey is an Advising Research Engineer at Assured Information Security, Inc. where he leads the Computer Architectures group and acts as the site lead for the Colorado branch. Jacob has worked extensively with low-level x86 and MCU architectures, having written a BIOS, OS, hypervisor and SMM handler. His major interest is how to (mis)use an existing architecture to implement a capability currently beyond the limitations of the... Read More →


Tuesday August 4, 2015 17:00 - 17:55
Ground Truth Florentine F

17:00

Hacking Our Way Into Hacking
It may seem like everyone in infosec has always been a hacker. However, many of us have come to hacking from other industries, and as we make our way through the infosec community it’s often hard to find others like us. This is a conversation for every hacker who started as a mechanic, a kindergarten teacher, or a gender studies major: let’s talk about where we came from, how we got here, and some of the unique challenges we’ve come across as hackers with “past lives”.

Speakers
avatar for Kat Sweet

Kat Sweet

Kat Sweet wrote her first line of code in her mid-twenties and never looked back. Now she’s a network security student at Madison Area Technical College, where she also serves as president of her school's IT student organization. Outside of class, you can find her fixing other people's computers, teaching, and wielding pointy objects (mainly lockpicks and knitting needles). She has a ham radio Extra class license, and organizes ham exams... Read More →


Tuesday August 4, 2015 17:00 - 17:55
Underground The Tuscany

17:30

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
This presentation discusses a strategy for reverse-engineering router firmware to analyze algorithms used to generate default WPA2 PSKs, and demonstrates how such passwords can be recovered within minutes. Further, we describe a procedure that can instantly gather a complete wireless authentication trace, which enables an off-line password recovery attack.

Speakers
avatar for Eduardo Novella

Eduardo Novella

Student at Radboud Nijmegen, Security Analyst at Riscure
Eduardo is a Security Analyst who specializes in embedded device security. He is known for messing around with wireless routers, and has published research on EMV-CAP and WirelessHART during his studies. He holds a BS in CS from Universitat Politécnica de Valencia (Spain), and a Masters in Computer Security from The Kerckhoffs Institute at Radboud University Nijmegen (The Netherlands).



Tuesday August 4, 2015 17:30 - 17:55
Passwords Tuscany

17:30

What the heck is this radio stuff, anyway?
This talk will give the basics of radio frequency communication, to provide a foundation upon which more complex RF topics can be built.

Speakers
NK

Nick Kartsioukas

Nick has been a ham radio operator for over 15 years, and has been interested in radio and electronics since he could hold a screwdriver.


Tuesday August 4, 2015 17:30 - 17:55
Proving Ground Florentine E

17:30

How can we ensure safer Automobiles?
The goal is to identify 2-3 good projects with strong support and leadership in the Automotive area. We will ideate individual initiatives, then break into groups to flesh those out, identify outcomes, constraints, output, and methods. Each team will present their ideas in a lightning talk and facilitate a short discussion. After the ideas are laid out, participants will elect to get involved in making them come to reality, leaders will emerge to manage the initiatives, and others will pledge to support their actions.

Speakers
avatar for Joshua Corman

Joshua Corman

CTO | Founder | Founder, Sonatype | I am The Cavalry | Rugged
Joshua Corman is a Founder of I am The Cavalry (dot org) and Director of the Cyber Statecraft Initiative for the Atlantic Council. Corman previously served as CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The 451 Group and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing... Read More →


Tuesday August 4, 2015 17:30 - 18:55
I Am The Cavalry Florentine B

18:00

Poppin' (Digital) Locks
This presentation demonstrates how open source tools can be used to bypass modern digital locks found in smart phone applications and other PIN interfaces.

Speakers
avatar for Devin Egan

Devin Egan

Co-founder & CTO, LaunchKey
Devin is the Co-Founder and CTO of LaunchKey, a multi-factor authentication company. Devin released phpmyaudit, a MySQL password auditing tool, at DEF CON 12 and gave a talk at BsidesLV/#PasswordsCon15.


Tuesday August 4, 2015 18:00 - 18:25
Passwords Tuscany

18:00

SIEMple technology
This talk will go through the steps that should be considered when implementing a solution to make that SIEM solution work in your business.

Speakers
avatar for Bill Davison

Bill Davison

Bill has been in the IT/security industry for 9 years crawling his way up from call center to helpdesk, and now a security engineer.


Tuesday August 4, 2015 18:00 - 18:25
Proving Ground Florentine E

18:00

Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
Border searches are an exception to the Fourth Amendment’s warrant requirement. The border search exception allows government officials to search, review, copy, and detain cell phones, computers, and other electronic devices at the border without a warrant, probable cause, or any suspicion. In early 2013, the Ninth Circuit reviewed the issue of whether or not any type of suspicion was required at the border, and unlike previous courts, held reasonable suspicion is needed to conduct a forensic examination of electronic storage devices when entering the United States. This standard is currently the most protective in the U.S. This talk will discuss searches of electronic devices at the U.S. Border as well as the recent developments since the Ninth Circuit case. Specifically, it will examine the United States Supreme Court's denial of the petition for Certiorari and the Supreme Court's ruling in Riley v. California, narrowing another exception to the warrant requirement with regards to the search of electronic devices. Riley held that the police cannot search a cell phone seized incidental to the arrest of an individual without a warrant. This talk will help answer the question, "What is the potential impact of this decision on the future of searches of electronic devices at the border?"

Speakers
avatar for Whitney Merrill

Whitney Merrill

Attorney, Federal Trade Commission
Whitney Merrill is an attorney at the Federal Trade Commission in San Francisco, California where she works on consumer protection issues involving technology. She received her Masters in Computer Science from the University of Illinois at Urbana-Champaign and her law degree from the University of Illinois College of Law. She specializes in information security, computer crime, privacy, surveillance, and Internet law. Her recent research... Read More →


Tuesday August 4, 2015 18:00 - 18:55
Breaking Ground Florentine A

18:00

Angler Lurking in the Domain Shadows
A new technique has been discovered being leveraged by Angler Exploit Kit in the wild. This technique, domain shadowing, involves using hacked registrant accounts to create subdomains. This is the next evolution in evasion techniques for hackers and takes advantage of the fact that most people don't log in to their accounts except to renew or make a change. This allows attackers to evade traditional blacklisting technologies easily increasing the attack window. The talk will discuss the scope and details of this new technique as well as cover both the potential detection challenges and solutions.

Speakers
avatar for Nick Biasini

Nick Biasini

Nick Biasini’s interest in computers and technology started at a young age when he tore apart his parents brand new 486SX PC. Ever since he has been tinkering with computers in one way or another. | | Nick started down the path of information systems in college and has spent his professional career working in information security. Nick has spent time in most roles in a SOC including analyst, engineer, and managing teams. Nick has a... Read More →


Tuesday August 4, 2015 18:00 - 18:55
Common Ground Florentine G

18:00

Making & Breaking Machine Learning Anomaly Detectors in Real Life
Machine learning techniques used in network intrusion detection are susceptible to 'model poisoning' by attackers. We dissect this attack and analyze some proposals for how to circumvent these attacks, then consider specific use cases of how machine learning and anomaly detection can be used in the web security context.

Speakers
avatar for Clarence Chio

Clarence Chio

Software Engineer, Shape Security
Clarence recently graduated with a B.S. and M.S. in Computer Science from Stanford University, specializing in data mining and artificial intelligence. He currently works at Shape Security, a startup in Silicon Valley building a product that protects its customers from malicious bot intrusion. At Shape, he works on the system that tackles this problem from the angle of big data analysis. Clarence is a community speaker with Intel, traveling... Read More →


Tuesday August 4, 2015 18:00 - 18:55
Ground Truth Florentine F

18:00

Stress, Burnout, Rinse, Repeat
Stories of burnout in tech professionals are not rare, particularly in security pros. Building on the earlier work of the stress and burnout project team which presented at BSidesLV 2011 and RSA USA 2012 and adding new voices, perspectives, and research this panel will explore what we have learned about warning signs, prevention, support, and recovery- and what remains to be done. This will be a highly personal and conversational discussion. While this topic needs public discussion, we are submitting to the Underground track to encourage candid discussions which might be stifled by public exposure.

Speakers
avatar for Joshua Corman

Joshua Corman

CTO | Founder | Founder, Sonatype | I am The Cavalry | Rugged
Joshua Corman is a Founder of I am The Cavalry (dot org) and Director of the Cyber Statecraft Initiative for the Atlantic Council. Corman previously served as CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research & strategy roles for The 451 Group and IBM Internet Security Systems. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing... Read More →
MM

Martin McKeay

Trouble Maker
Martin McKeay is bad at getting his bio to the panel moderator, and feasts on unicorns. Clearly he's been in Britain too long. Martin is a Senior Security Advocate at Akamai, joining the company in 2011. As a member of Akamai's Security Intelligence Team, he is responsible for researching security threats, customer education and industry intelligence. With over fifteen years of experience in the security space and five years of direct Payment... Read More →
avatar for Tenable Network Security

Tenable Network Security

Recruiting, Tenable Network Security
At Tenable, we are all about innovation, creativity and purpose, with a passion for designing solutions that change people’s lives and make a difference in the world. Network security is one of the world’s fastest growing fields, and our fresh ideas and proven products are revolutionizing the industry. We have big plans for continued global growth in 2016 and beyond, and we are looking for people who are creative, adaptable and... Read More →
avatar for Chris Sumner

Chris Sumner

Data Enthusiast
Chris is a security data nerd at Hewlett-Packard. Outside work he co-founded the not-for-profit Online Privacy Foundation who contribute to the emerging discipline of behavioral residue research within online social networks. He has previously spoken on this area of research at BSides, DEF CON and other conferences.
avatar for Scott Thomas

Scott Thomas

Sr. Security Consultant/Vulnerability Management Team Lead, VioPoint
Scott has worked in IT since the 90s mostly in finance & insurance. He has held multiple jobs ranging from the Service Desk to Vulnerability management. He is currently a Senior Security Consultant leading the Vulnerability Management practice for VioPoint. He helps support multiple industry verticals in organizations with a few dozen employees to those on Fortune's list. The topic of stress and burnout have been something he's struggled with... Read More →


Tuesday August 4, 2015 18:00 - 18:55
Underground The Tuscany

18:30

Privileges in the Real World: Securing Password Management
This presentation presents insights from a recently-conducted study on the exposure of networks to credential theft attacks and privileged accounts exploitation, and discusses the effectiveness of mitigations. This session will present some of the best practices needed to manage these privileged accounts, and highlights the need for automation in order to achieve effective privileged password management.

Speakers
AD

Andrey Dulkin

Andrey Dulkin has over 15 years of experience in information security research and development, both in technical and leadership positions. In his current position, Andrey heads the CyberArk Labs, where his research focuses on targeted attacks mitigation, critical infrastructure security, security architecture and various aspects of organizational information systems protection. Andrey is an active member of several cybersecurity forums and a... Read More →


Tuesday August 4, 2015 18:30 - 18:55
Passwords Tuscany

18:30

How I learnt hacking in highschool
One can not start attacking systems in the wild to try new hacking technique. Hacking is not a destination but a journey. How one can set up hacking labs with minimal infrastructure, online challenges and CTF competitions around the globe and how these competition help in learning techniques in real world. Finally I will show how one can get started with bug-bounty programs and make money while being student.

Speakers

Tuesday August 4, 2015 18:30 - 18:55
Proving Ground Florentine E

19:00

Ham Radio Exams
Come take your Ham Radio Exam at BSidesLV!  @USSJoin and his team of Ham experts will be hosting Ham Exams from 7-9PM.

For more info, see their website.



Tuesday August 4, 2015 19:00 - 21:00
Training Ground I Siena

19:45

SSH (Super Soaked Hackers) Water Balloon Fight

On Tuesday night, around 7:45, we’ll be commandeering part of the Tuscany parking lot, for a good old-fashioned water balloon fight! We’ve purchased 1000 water balloons from Bunch O’ Balloons, but feel free to bring more! (Bunch O’ Balloons will be the only balloons allowed, for quality control purposes and must be filled from the BSidesLV Security Operations controlled water spigot.)

For just a $20 buy-in per person, you can participate in the water balloon fight until we run out of balloons! Buy-in will be Tuesday evening, at the fight site, cash only. We’re also allowing super soakers, water pistols and other water fight toys, for an extra $10 buy-in cost, since you’ll have an obvious advantage. (Must bring your own toys.) There are no losers in this fight, as everyone will end up being a Super Soaked Hacker!

There will be a designated Soak Zone and observers outside of that zone are off-limits. You will receive one warning, if you deviate from the rules. On a second infraction, you will be removed from the fight – NO REFUNDS!

Come join us for a much needed cool down after a long day in Vegas, before we get ready for The New Hacker Pyramid at 9:30!

All monies collected from this event will go to benefit Hak4Kidz . Much thanks to @healwhans for helping us with the logistics and planning of this event.

Want to help us promote? Use the hashtag #SSH along with #BSidesLV and #H4K, to help spread the word.


Tuesday August 4, 2015 19:45 - 21:00
TBA The Tuscany

20:00

QueerCon Mixer
First Annual QueerCon/BSidesLV Mixer!

Tuesday August 4, 2015 20:00 - 21:00
Piazza Lounge Patio Piazza Lounge Patio

21:30

Hacker Pyramid

That’s right, The New Hacker Pyramid is coming back to Security Summer Camp in Las Vegas for 2015.

And as we mourn the passing of the 10,000¢ Hacker Pyramid, we’re certain that you’re going to find some serious joy at BSides Las Vegas.

Be in the audience for your chance to join a Security Celebrity for a chance to win FABULOUS PRIZES including the GRAND PRIZE of ????? (we don’t know yet, but it’ll be awesome dammit).


Tuesday August 4, 2015 21:30 - 23:55
Chill-Out Room Florentine C/D
 
Wednesday, August 5
 

07:30

Breakfast
Wednesday August 5, 2015 07:30 - 08:30
Chill-Out Room Florentine C/D

08:30

Coffee
Wednesday August 5, 2015 08:30 - 09:00
Chill-Out Room Florentine C/D

08:30

Radare2 an open source reverse engineering framework
Radare2 is a complete framework dedicated to reverse engineering.
Written in C, completely portable, and released under LGPL,
it's a tool of trade to deal with binaries in any form.
A [lot of people]( http://radare.today/who-uses-r2/ ) are currently
using it for a large panel of different purposes; binary exploitation,
weird CPU architecture reversing, binary diffing, ctf, emulation, ...

But since it is a really complete tool without a GUI,
it has a steep learning curve, hence this workshop.

Speakers
avatar for Anton Kochkov

Anton Kochkov

Lead Developer, Security Code Ltd.
Reverse engineer and a lead developer in SecurityCode Ltd. Core member of coreboot, droid-developers/MILEDROPEDIA and MEre projects. His main interest - is a research of the early booting stages of computers (including embedded and mobile ones) and various firmware, commonly ‘hidden’ from the eye.
avatar for Maxime Morin

Maxime Morin

IT Security Consultant, Malware.lu CERT
Freshly new team leader of Malware.lu CERT, the first private CERT (Computer Emergency Response Team) in Luxembourg. He is fighting against the intentional blur in the industry and against meaningless terminology unfortunately used too often and widely. This struggle also involves a better understanding of the world of IT security and a better vulgarisation of the Science in General.


Wednesday August 5, 2015 08:30 - 12:25
Training Ground I Siena

08:30

You Hack, We Capture: Attack Analysis with Honeypots
Honeypots are systems aimed at deceiving malicious users or software that launch attacks against the infrastructure of various organizations. They can be deployed as protection mechanisms for an organization’s real systems, or as research units to analyze the methods employed by human hackers or malware. In this workshop we will study the operation of two research honeypots. A honeypot system will undertake the role of a web trap for attackers who target the SSH service. Another one will undertake the role of a malware collector, usually deployed by malware analysts to gather and store malicious binary samples. We will also talk about post-capturing activities and further analysis techniques. Furthermore, visualization tools and techniques will be presented, plus a honeypot bundle Linux distribution that contains pre-configured versions of the above tools and much more related utilities, which can make the deployment of honeypots an easy task.

Speakers
avatar for Ioannis Koniaris

Ioannis Koniaris

Software Engineer (Security Team), Yelp
Ioannis is an Information Security engineer and researcher, working to protect company assets, data and operations. His general interests are programming, security, development operations (DevOps) and cloud computing while his academic interests include honeypots, honeyclients, botnet tracking, malware analysis, intrusion detection and security visualization. Ioannis has released a number of utilities to aid information security professionals... Read More →


Wednesday August 5, 2015 08:30 - 12:25
Training Ground II Siena

08:30

Registration Open
Wednesday August 5, 2015 08:30 - 18:00
Conference Center Foyer Conference Center Foyer

09:45

Opening Remarks
Wednesday August 5, 2015 09:45 - 09:55
Chill-Out Room Florentine C/D

10:00

Introduction to the Career Track
Introducing the event and presenting general interviewing tips

Speakers

Wednesday August 5, 2015 10:00 - 10:10
Career Track Florentine B

10:00

Security Questions Considered Harmful
Many sites require users to provide answers to "security questions," which are typically used as part of the account recovery process. This talk will explore the nature of these questions and answers, and present problems associated with this practice.

Speakers
avatar for Jim Fenton

Jim Fenton

Internet Technologist, Altmode Networks
Jim Fenton is a consultant and researcher with a focus on user-centric identity, messaging, and Internet privacy and security issues. His primary consulting focus is currently in the area of user authentication standards, currently supporting the National Institute of Standards and Technology (NIST). He is an active participant in the Identity Ecosystem Steering Group and is an advisor to Disconnect, a maker of Internet privacy tools... Read More →


Wednesday August 5, 2015 10:00 - 10:25
Passwords Tuscany

10:00

ZOMG It's OSINT Heaven!
Tazz, also once tagged as an “Internet Mall Cop” by a 16-year old know-it-all, will show you the background behind payment cards, and what they're really saying. She’ll also show examples of under-evolved humans who post other PII online, and how to use OSINT to find out more details about people. Finally she’ll briefly discuss the Python V3 work she is doing to “fill-in-the-blanks” and crawl the Internet for intelligence.

Speakers
avatar for Tazz Tazz

Tazz Tazz

Tazz is a veteran whose technology interests began with Atari and she was amazed when a word processor had enough memory to hold multiple lines. She’s been involved with technology since 1997 starting her career in communications, after which she completed her degree. She’s had various IT roles and responsibilities over the years to include military communications, Field Software (Breaker/Fixer) Engineer, System Administrator of Chaos, IA... Read More →


Wednesday August 5, 2015 10:00 - 10:25
Proving Ground Florentine E

10:00

WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote code execution, persistence, lateral movement, covert data storage, and VM detection. Defenders and forensicators have largely remained unaware of the value of WMI due to its relative obscurity and completely undocumented file format. After extensive reverse engineering, our team has documented the WMI repository file format in detail, developed libraries to parse it, and formed a methodology for finding evil in the repository.
In this talk, we will take a deep dive into the architecture of WMI, reveal a case study in attacker use of WMI in the wild, describe WMI attack mitigation strategies, show how to mine its repository for forensic artifacts, and demonstrate how to detect attacker activity in real-time by tapping into the WMI eventing system. By the end of this talk, we will have convinced the audience that WMI is a valuable asset not just for system administrators and attackers, but equally so for defenders and forensic analysts.

Speakers
WB

William Ballenthin

Willi Ballenthin is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team who specializes in incident response and computer forensics. He can typically be found investigating intrusions at Fortune 500 companies and enjoys reverse engineering malware, developing forensic techniques, and exploring the cutting edge. Willi is the author of a number of cross-platform Python libraries including python-registry, python-evtx... Read More →
MG

Matthew Graeber

Staff Reverse Engineer, FireEye, Inc.
Matt Graeber (@mattifestation) is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team with a varied background in reverse engineering, red teaming, and offensive tool development. Since joining FireEye, Matt has reversed a vast quantity of targeted and commodity malware samples and served as an instructor of Mandiant’s Advanced Malware Analysis course. Matt is the author of various PowerShell modules used for... Read More →
CT

Claudiu Teodorescu

Staff Reverse Engineer, FireEye, Inc
Claudiu Teodorescu is a reverse engineer in the FireEye Labs Advanced Reverse Engineering (FLARE) Team. Prior to joining FireEye, Claudiu worked for Guidance Software, writing forensic parsers for different file formats to support the EnCase forensic tool. Also, as the Cryptographic Officer of the company, he supported EnCase integration with different disk/volume/file based encryption products including Bitlocker, McAfee EEPC, Checkpoint FDE... Read More →


Wednesday August 5, 2015 10:00 - 10:55
Breaking Ground Florentine A

10:00

A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
The YubiKey is a small, relatively inexpensive, USB hardware crypto token that can be used for 2-factor authentication and to generate One Time Passwords. The infrastructure to support it is all open source, and the OTP validation code can be made very lightweight and embeddable. My purpose in proposing this talk is to make the hacking community aware of it in an effort to lower the barrier for using One Time Passwords, and to help foster open source 2 factor authentication.

Speakers
RG

Russ Gritzo

Russ started out with computers by soldering together a Z-80 circuit board on his mom's kitchen table in the late 1970's. He still has that computer, as well as a VAX. He even has a few useful computers. After a 25 year sidetrack through gamma ray spectrometry and other things nuclear, he returned to computer hacking a few years ago. He is currently working as a penetration tester supporting a Department of the US Government. When not sitting... Read More →


Wednesday August 5, 2015 10:00 - 10:55
Common Ground Florentine G

10:00

Have I seen you before?
Logs! Packets! NetFlow!  So much data but yet we struggle to wade through the volumes of information being captured.  There's visual analysis, "behavioral" analysis, and security analytics (whatever that means).  This talk isn't going to wade in on those topics.  We simply set out to demonstrate an effective means to answer these simple questions (at lightning speeds): Has this happened before?  Or more simply, show me what new things are happening. Is it common or rare for this to happen?

Speakers
MP

Maxim Pevzner

Maxim Pevzner is a data architect for for a startup in Cambridge. Maxim has had a hand in the architecture and operations of big data environments at companies including Facebook, Zynga, NetFlix.
DR

Daniel Reich

By day, Daniel Reich is a business development manager driving the cloud security strategy for EMC's Hybrid Cloud Solutions organization. By night, he's working hands on with technology on projects like the one being presented at BSides. An accomplished technologist, Mr. Reich was previously a co-founder of several successful technology companies.


Wednesday August 5, 2015 10:00 - 10:55
Ground Truth Florentine F

10:00

All You Need Is One: A ClickOnce Love Story
ClickOnce is a deployment solution that enables fast, easy delivery of packaged software. It is commonly used by organizations to deploy both internal and production-grade software packages along with their respective updates. By allowing end-users to accept the requested permissions of the software package without the intervention of an administrator, ClickOnce simplifies the deployment and use of robust software solutions.
It also provides an excellent opportunity for malicious actors to establish a foothold in your network.
In this talk, we will discuss how we combined ClickOnce technology and existing phishing techniques into a new methodology for establishing an initial presence in an environment. By minimizing user interaction, we only require that the user is fooled for "one click" - after that, we already have a foothold in their environment and are ready to pivot and escalate further.

Speakers
RG

Ryan Gandrud

Ryan has a B.S. in computer science from North Dakota State University. He has done work in the Information Technology, Healthcare, Financial Services, and Information Security industries. Ryan's primary knowledge base includes network, web application, and thick application penetration testing with extensive knowledge in email phishing.
CW

Cody Wass

Cody graduated from North Dakota State University with a degree in Computer Science. He fiddles with web applications and struggles with IDA in his spare time, usually while enjoying a glass of single malt scotch.


Wednesday August 5, 2015 10:00 - 10:55
Underground The Tuscany

10:00

Pros vs. Joes CTF and SECTF
What is the Pros V Joes CTF?

This event is an opportunity for average users (Joes) to try their hand at both the offensive and defensive side of computer security. For the Pros, it’s a chance to hone and show off their skills, helping others to learn and better themselves. It’s also a lot of fun.

Joes are split up into teams, each with a Pro captain, and given their own network to defend against the other Pros in our Red Cell. Each team’s network is full of servers and desktops running Windows, Linux, your standard services like DNS, Web, Mail, and others. Of course, there will be more than a few surprises…

Pros V Joes is linking up with SE CTF!

This year, the Pros V Joes CTF will be working together with the Social Engineering CTF at BSides LV. This will add a new and exciting dimension to the classical bits and bytes hacking of PvJ. Now, Pros and Joes alike will have to also handle their physical security and their OPSEC. Social Engineering players will have the challenge of trying to deal with a live organization of defenders that are trying to protect their information. Red Cell players of PvJ will have to choose a side (or not…


Wednesday August 5, 2015 10:00 - 18:00
Chill-Out Room Florentine C/D

10:10

10:30

It’s All Geek to Me
Speakers
CP

Chris Pogue

Chris Pogue is the Senior Vice President for the Nuix Cyberthreat Analysis Team. | Abstract: While technical acumen plays a significant role in how you secure an interview, alone, it will not land you the job. Of equal importance is your ability to communicate deeply technical content to a non-technical audience in a manner that is easy to understand. During this presentation Chris will cover some of the most common lessons learned for... Read More →


Wednesday August 5, 2015 10:30 - 10:50
Career Track Florentine B

10:30

I Forgot My Password
Users often forget their passwords, so applications often must have a password reset mechanism. There are several options for how to do it; some of them are good, most of them not so good. Generate a password and send it in an email? No. Security questions? No way. Reset passwords via a phone call? Rather not. This talk presents some really creative examples of botched password reset implementations, as well as a proven method for resetting passwords securely.

Speakers
avatar for Michal Špaček

Michal Špaček

Michal, aka spazef0rze, is an application security engineer who's on a mission to show developers how & why to write secure code, and is the discoverer of the PHP "md5(QNKCDZO)" bug. Michal has worked for small and big, local and multinational, and is currently freelancing.


Wednesday August 5, 2015 10:30 - 10:55
Passwords Tuscany

10:30

Classic Misdirection: Social Engineering to Counter Surveillance
Good OPSEC is not enough, sometimes you're already being watched. Sometimes good OPSEC goes wrong and backfires. This talk will discuss how good OPSEC can backfire, show some history of real-world psychological operations, and how to social engineer and troll your way to being less conspicuous of a target, or at least give those watching you a show and bad intelligence. While you can't hide everything, you can shape the way you are viewed by those who are watching you.

Speakers
PC

Peter Clemenko III

Peter Clemenko III is a recent graduate of Wilmington University with a passion for privacy and security. He is currently working on new privacy technologies involving Android and Linux.


Wednesday August 5, 2015 10:30 - 10:55
Proving Ground Florentine E

10:30

WiFi Pineapple: Winning the WiFi Battlefield
Why crack the network when you can be the network? Join Sebastian Kinne
and Darren Kitchen of Hak5 as they slice the WiFi Pineapple down to its
core. From tracking and reporting to recon and targeting. From the next
generation rogue access point to the future of the fruit. Learn what's
possible with the WiFi Pineapple Mark V.

Speakers
SK

Sebastian Kinne

Sebastian Kinne is the lead developer of the WiFi Pineapple. Prior to | hacking fruits, he reverse engineered MMORPG network protocols while | completing his BSc in Computer Science. As a presenter and instructor, he | has probably tracked your smartphone's WiFi in a demo or two.
DK

Darren Kitchen

Darren Kitchen is the founder of Hak5, an Internet television show inspiring hackers and IT pros since 2005. Breaking out of the 1990s phone | phreak scene, Darren has continued to foster his passion for information security throughout his career as a systems administrator, presenter, | instructor and inventor. He also pwns you in Unreal Tournament.


Wednesday August 5, 2015 10:30 - 11:25
Above The Ground Plane Copa Showroom (1st Fl)

11:00

Phishing: Going from Recon to Credentials
This presentation will quickly explore some of the common phishing attack tools and techniques. Additionally, there will be a demo of a new tool which can assist penetration testers in quickly deploying phishing exercises in minimal time. The tool can automatically search for potential targets, deploy multiple phishing websites, craft/send phishing emails, record the results, and generate a basic report.

Speakers
avatar for Adam Compton

Adam Compton

Senior Security COnsultant, Rapid7
Adam Compton currently works as a penetration tester and has over 20 years of infosec experience, 15 years as a penetration tester. He has worked in both the government and private sectors for a variety of customers ranging from domestic and international governments, multinational corporations, and smaller local business.
EG

Eric Gershman

Eric Gershman is currently working on the security team for a group that manages large systems that enable researchers to do "Big Science". Prior to working in security Eric pursued a bachelors degree in Information Technology at the University of Central Florida. During his time at UCF, he worked as a technician on a large help desk, research intern for an Anti-Virus company and finally as a Linux Systems Administration for several Department of... Read More →


Wednesday August 5, 2015 11:00 - 11:25
Proving Ground Florentine E

11:00

TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
These days, many security groups want to become "intel shops,” and threat intelligence is all the rage. An intel shop should ingest intel, analyze indicators, and pivot from correlated data. However, few understand how to begin the transition. How IS this accomplished? MAGIC, DAMNIT. Then again, if you’re not the slight of hand kind of guy or gal, we have an answer for you. Check behind your ear, and you’ll find a dollop of TAPIOCA!

In this talk, we will present our process for analyzing Indicators of Compromise (IOCs) at scale, correlating information from multiple sources, and pivoting to obtain information from deep within the bowels of our global network. We’ll talk about the technical challenges we have addressed in applying automated analysis to terabytes of data every day. We will also discuss the next-steps for this analysis, including applying machine learning techniques to help further classify our data. We are also releasing our automated IOC vetting tool, TAPIOCA (TAPIOCA Automated Processing for IOC Analysis), to help other security groups begin processing and benefiting from threat intelligence.

Speakers
avatar for Ryan Chapman

Ryan Chapman

Computer Incident Response Analyst, Bechtel Corporation
Ryan Chapman works as an incident response analyst for Bechtel Corporation. Ryan enjoys the challenge of handling incidents, reversing malware, and automating tasks for the security operations center. He also loves public speaking and has presented at venues such as BSides, CactusCon, Splunk .Conf, and others. Ryan has a fondness for doing stand-up comedy, retro gaming, and plays plenty of Street Fighter. Hadouken!
avatar for Moses Schwartz

Moses Schwartz

Sr. Network Security Analyst, Bechtel Corporation
Moses Schwartz is a security researcher with experience in cyber incident response, vulnerability assessment, industrial control system and SCADA security, and supply chain risk management. He is currently a senior network security monitoring analyst on the cyber incident response team (CIRT) for Bechtel Corporation. He was previously a senior member of technical staff at Sandia National Laboratories, where he researched and developed new... Read More →


Wednesday August 5, 2015 11:00 - 11:55
Breaking Ground Florentine A

11:00

Haking the Next Generation
Kids are wired to learn. They are learning while they are playing, so why not give them an environment where they can play while they are learning.
A combination of a speaking track, workshops, and an open area of stations complementing each other enables the attendees to expand and enlighten their technical interests. For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential. You can come learn more about how Hak4Kidz is making a difference and how you can potentially organize a Hak4Kidz in your local city.

Speakers
avatar for David Schwartzberg

David Schwartzberg

Senior Security Engineer, MobileIron
David Schwartzberg is a Sr. Security Engineer at MobileIron, a mobile security company, where he specializes in mobile and network security. Utilizing his 6 years accounting experience and combined 17 years InfoTech and InfoSec experience, he speaks regularly with technology executives and professionals to help protect their corporate secrets and stay compliant. In his spare time he co-founded Hak4Kidz, www.hak4kidz.com, and has blogged for... Read More →


Wednesday August 5, 2015 11:00 - 11:55
Common Ground Florentine G

11:00

Who Watches the Watchers? Metrics for Security Strategy
Security Metrics are often about the performance of information security professionals - tranditional ones are centered around vulnerability close rates, timelines, or criticality ratings. But how does one measure if those metrics are the rights ones? How does one measure risk reduction, or how sucecssful your metrics program is at operationalizing that which is necessary to prevent a breach?

Speakers
avatar for Michael Roytman

Michael Roytman

Michael Roytman is responsible for building out Risk I/O’s analytics functionality, and has been selected to speak at BSides, Metricon, SIRACon and more. His work at Risk I/O focuses on security metrics, risk measurement, and vulnerability management and his work has been published in USENIX. He formerly worked in fraud detection in the finance industry, and holds an M.S. in Operations Research from Georgia Tech. His home in Chicago... Read More →


Wednesday August 5, 2015 11:00 - 11:55
Ground Truth Florentine F

11:00

Harvesting Passwords from Source Code, Scripts, and Code Repositories
This presentation will discuss post-exploitation methods for harvesting passwords from source code, scripts, code repositories, shell history, log files, and other locations. Two new tools will be released during this presentation.

Speakers
PP

Philippe Paquet

Philippe has 20+ years of experience in the video game industry, developing anti-tampering, anti-debugging, and various DRM technologies. He has multiple patents and has published several papers.


Wednesday August 5, 2015 11:00 - 11:55
Passwords Tuscany

11:00

Bio-Hacking: Implantable chip attack vector
Implantable electronic devices are becoming more common nowadays. Specifically subdermal implants are now being used in companies for employee identification, security access, medical records and authentication among other uses. These implantable devices can easily bypass current security check procedures in most enterprises as they are located inside the body of a human. A live demo of mobile exploitation using an implanted RFID chip into a subject's hand will be performed during this presentation. This proof of concept aims to show the possibilities of use of implantable devices as attack vectors.

Speakers
RS

Rod Soto

Rod Soto is a security researcher and board member of HackMiami. He is a regular speaker at hacking conferences all over the country on the topics of penetration testing tools and methods, as well as the topic of digital civil liberties. Rod Soto was the winner of the 2012 BlackHat Las Vegas Capture the Flag hacking competition, and is the founder and lead developer of the Kommand&&Kontrol competitive hacking tournament series. He is currently... Read More →
avatar for Seth Wahle

Seth Wahle

Seth Wahle is an engineer and security researcher who specializes in embedded computing, robotic, and radio frequency systems. As a former Fire Control-man in the United States Navy, He maintained and controlled the ships self defense weapon systems to protect the U.S. fleet against surface and missile attacks. Now as a civilian Seth applies his skills to identify and solve problems in the cyber security, large scale asset management, and... Read More →


Wednesday August 5, 2015 11:00 - 11:55
Underground The Tuscany

11:10

Did you make a difference today?
We will explore options for finding purpose and meaning in your security career and the personal and professional benefits you can achieve from it. Presented will be non-traditional security work environments, interesting career options and the benefits of finding a cause. Do you want to spend the rest of your life testing web apps or do you want to make a difference?

Speakers
KM

Kevin McDonald

Kevin McDonald is the Director of Clinical Information Security Systems at Mayo Clinic


Wednesday August 5, 2015 11:10 - 11:30
Career Track Florentine B

11:30

Social Media in Incident Response Program
In an age of darkness, a world full of fear, we must have those that fight against it. When we are afraid, we turn to social media. When we are alone, we turn to social media. Wherever we may go, we use social media. Social media, is the key to improving incident response. The highly evolved InfoSec people can harness the power of social media to help fight against the mutants of the world.

Speakers
avatar for JoEtta LeSueur

JoEtta LeSueur

JoEtta LeSueur is currently a graduate student at Kennesaw State University. She is an Associate of ISC2 for CISSP. She is currently employed at JDA Software as an application security administrator.


Wednesday August 5, 2015 11:30 - 11:55
Proving Ground Florentine E

11:30

Better Spectrum Monitoring with Software Defined Radio
Many of the current crop of SDR platforms support a very wide range of operating frequencies covering more than a GHz of bandwidth, but most users of those platforms find themselves looking at waterfall displays showing a few MHz at most. Let's look at how we can use SDR to monitor activity over several GHz of spectrum and visualize the results over both short and long periods of time.

Speakers
MO

Michael Ossmann

Michael Ossmann is a wireless security researcher who makes hardware for hackers. Best known for the open source HackRF, Ubertooth, and Daisho projects, he founded Great Scott Gadgets in an effort to put exciting, new tools into the hands of innovative people.


Wednesday August 5, 2015 11:30 - 12:25
Above The Ground Plane Copa Showroom (1st Fl)

11:30

Company Elevator Pitches
Rotating Sponsor pitches about your company: cool projects/initiatives, open positions, company culture, unique perks (5 minutes each)

Wednesday August 5, 2015 11:30 - 12:30
Career Track Florentine B

12:00

Backdooring MS Office documents with secret master keys
Recent MS Office documents are normally encrypted very strongly, making them difficult to brute force. However, there are techniques an attacker can use to secretly backdoor these encrypted documents to make them trivial to decrypt. Cloud environments may be more dangerous than thought as it is not possible for users to confirm the security of their encryption and it would be easy for cloud providers (or advanced attackers with access to those cloud providers) to backdoor encryption in undetectable ways. I believe that this is a serious problem that the security industry needs to consider.

Speakers
SM

Shigeo Mitsunari

Shigeo Mitsunari is a software developer and researcher. He is interested in cryptography, in particular, pairing-based cryptography and its implementation. He developes a x86/x64 JIT assembler Xbyak and very fast C++ pairing library which are open source projects. He was received MITOH Super Creator by IPA in 2003, the Chairman Awards by Information Promotion consortium in 2005, the Best paper award by IEICE in 2010.
avatar for Yoshinori Takesako

Yoshinori Takesako

chairperson, SECCON
Yoshinori Takesako is the executive committee chairperson, organizer, and challenge creator of the SECCON CTF contests that are held several times a year throughout Japan including large international online and in-person contests. He is also on the OWASP Japan advisory board, the review board for the CODE BLUE conference, a Microsoft MVP of Developer Security, the leader of the Shibuya Perl Mongers group, and has been designated an expert in... Read More →


Wednesday August 5, 2015 12:00 - 12:25
Common Ground Florentine G

12:00

Advancing Internet Security Research with Big Data and Graph Databases
The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS. The presentation will give a brief overview of the system and then focus on how it has influenced security research at OpenDNS.

Speakers
avatar for Andrew Hess

Andrew Hess

Software Engineer, OpenDNS
Andrew Hess is a software engineer on the Research Systems team at OpenDNS where he works to quantify the company's security intelligence and provide tools to make researchers as effective as possible. Andrew graduated from Washington University with majors in Systems Engineering and Electrical Engineer.


Wednesday August 5, 2015 12:00 - 12:25
Ground Truth Florentine F

12:00

Towards Standardizing Comparisons of Password Guessability
This talk compares the performance of numerous guessing approaches and human experts to understand how they impact password research. A new tool to standardize security analyses by researchers will be released during this presentation.

Speakers
SM

Sean M. Segreti

Sean is a PhD student at Carnegie Mellon University, where he conducts and publishes studies on password security and usability. He and Blase Ur will be representing the entire passwords research group at CMU, which comprises three faculty and more than 10 students.
avatar for Blase Ur

Blase Ur

Ph.D. Student, Carnegie Mellon University
Blase is a PhD student at Carnegie Mellon University, where he conducts and publishes studies on password security and usability. He and Sean Segreti will be representing the entire passwords research group at CMU, which comprises three faculty and more than 10 students.


Wednesday August 5, 2015 12:00 - 12:25
Passwords Tuscany

12:00

Cats and Mice - Ever evolving attackers and other game changers
After a couple years working in various tech-related industries Eric found himself in the Social Networking world for seven years. About 2/3rds of the way into this position he split out a side project.

This unique perspective gave him new insights into how to take some administrative duties and wrap them up into what became a semi-autonomous learning abuse mitigation system

The project was designed to do what admins regularly do (manual mitigation of bad actors/persona non-grata). But with enough accuracy and performance the goals were loftier.

Finding and acting on these elements before an admin even has to deal with them -- faster detection, and prevention, and mitigationtimes.

Much introspection ensued. The mind re-thought and further re-though what sensory input it was able to use to *know* which users look bad but are not. Likewise, how to reproduce an electronic 'gut instinct' on the bad users.

Attempts at solving this problem did not immediately proove easily.

Furthermore, as the system adapted, so did the attackers.

Speakers
EK

Eric Kmetz

Eric Kmetz is a Software Engineer that has had a long-running interest in InfoSec. His hacking interests have spanned across BBSes, Phone Conferences, IRC, and TCP/IP vulnerabilities. More recently he has used his skills to work on software with the intent of creating software that is more tamper-resistant. | | He's been attending DEFCON since 2003, as a Security Gooning for four of those years. In 2014 he went to his first BSidesLV and... Read More →



Wednesday August 5, 2015 12:00 - 12:25
Proving Ground Florentine E

12:30

Lunch
Wednesday August 5, 2015 12:30 - 13:55
Chill-Out Room Florentine C/D

14:00

Welcome back, Emcee sets tone for the afternoon
Speakers

Wednesday August 5, 2015 14:00 - 14:05
Career Track Florentine B

14:00

Stronger Password-Based Encryption Using I/O Hardness
Password-based encryption needs all the help it can get to withstand brute-force attacks. We repurpose an old idea to encrypt data so that each password guess requires processing all of the encrypted data. Then, we'll look at some use cases to see how the costs change for the attacker and defender. In a brute force attack, this can mean a large increase in attacker I/O, with little cost increase to defenders, who must process all of the data anyway.

Speakers
GZ

Greg Zaverucha

Software Engineer, Microsoft
Greg is a software engineer in the MSR Security and Cryptography group at Microsoft. He performs research in applied cryptography, implements cryptographic primitives, and helps product teams use cryptography securely. Prior to joining Microsoft, Greg worked on applied research, standardization and product security at Certicom/Blackberry. Greg holds a PhD in CS specializing in cryptography from the University of Waterloo.


Wednesday August 5, 2015 14:00 - 14:25
Passwords Tuscany

14:00

FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
A look at three "F'ing" government agencies whose recent oversight and regulatory actions are shaping the where and how of information security research.

Speakers
EW

Elizabeth Wharton

Ms. Wharton, an attorney and co-founder of Policy Bytes, utilizes her first-hand legislative and information security business experience to advise clients on strategic messaging, policy impact analysis, and legislative initiative implementation for technology research, information security, and privacy related issues at the state and federal level. Ms. Wharton has been a congressional legislative aide in Washington, D.C. advising on technology... Read More →


Wednesday August 5, 2015 14:00 - 14:25
Proving Ground Florentine E

14:00

Wi-Door - Bind/Rev Shells for your Wi-Fi
The Windows Hosted Network provides a way to share your Wi-Fi connection. Unfortunately, this feature can be abused to create rogue access points. However, due to the lack of any publicly available tools, attacks against the hosted network are difficult to demonstrate in a practical scenario and this feature is hardly ever turned off in enterprise domain. Wi-Door aims to solve this! Wi-Door allows pentesters to demonstrate how the hosted network can be abused in an enterprise setup.

Speakers
VR

Vivek Ramachandran

SecurityTube.net and Pentester Academy
Vivek Ramachandran discovered the Caffe Latte attack, broke Web Cloaking and publicly demonstrated enterprise Wi-Fi backdoors. He is the author of "Backtrack 5: Wireless Penetration Testing" which has sold over 13,000+ copies worldwide. He runs SecurityTube Training and Pentester Academy which has trained professionals from 90 countries and has spoken/trained at Defcon, Blackhat USA/Europe/Abu Dhabi, Brucon, Hacktivity etc. conferences.


Wednesday August 5, 2015 14:00 - 14:55
Above The Ground Plane Copa Showroom (1st Fl)

14:00

Building an Empire with PowerShell
Offensive PowerShell had a watershed year in 2014. But despite the multitude of useful projects, many pentesters still struggle to integrate PowerShell into their engagements in a secure manner. The Empire project aims to solve the weaponization problem by providing a robust PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. This is the post-exploitation agent you’ve been waiting for.

Speakers
avatar for Will Schroeder

Will Schroeder

Security Researcher, Adaptive Threat Division, Veris Group, LLC
Will Schroeder (@harmj0y) is a security researcher and pentester/red-teamer for Veris Group’s Adaptive Threat Division. He is a co-founder of the Veil-Framework, developed PowerView and PowerUp, is an active developer on the PowerSploit project, and is a co-founder and core developer of the PowerShell post-exploitation agent Empire. He has presented at a number of security conferences on topics spanning AV-evasion, post-exploitation, red... Read More →
JW

Justin Warner

Justin Warner (@sixdub) is a pentester/red-teamer with Veris Group’s Adaptive Threat Division and dabbles in security research when he is feeling inspired. As an Air Force Academy graduate and former USAF Cyber Operations Officer, he gained experience with large scale operations at the national level. Justin has a passion for threat research, reverse engineering, and red team operations. He is an active developer on the Veil-Framework and is... Read More →


Wednesday August 5, 2015 14:00 - 14:55
Breaking Ground Florentine A

14:00

Yes, you too can perform daring acts of Live Acquisition.
In this talk D0n Quix0te will discuss scripting of common Windows forensics utilities for Live Acquisition. D0n will also introduce an Open Source project aimed at creating a framework for scripting Live Acquisition tools.

Speakers
DQ

D0n Quix0te

D0n Quix0te is the author and creator of OMENS, OMENSApp, and AChoir. He has more than 25 years of experience in architecting, installing, maintaining, and defending high value targets. Currently he is an Incident Response Analyst for a Fortune 500 entertainment company. Prior to that, his experience includes 16 years architecting and securing systems for NASA and 7 years architecting, installing and maintaining systems at Lockheed.


Wednesday August 5, 2015 14:00 - 14:55
Common Ground Florentine G

14:00

Fishing To Phishing - It’s all about slimy creatures.
Hacking a fish finder should be something that hasn't been seen or talked about. The talk will be fun and interest anyone inside or outside the BSides community. Many can relate, or understand the issues and risks of poor security for almost any new device. Most don't realize how powerful sonar units have become over the last 5 years. Fishing is one of the most popular activities in the world.

This talk can be 20 or 45 minutes

Speakers
WC

Wayne Crowder

After the dream of becoming a fisheries biologist was crushed under the reality of low pay for 8+ years of school, Wayne turned to his love of technology. IT and Security have been very kind to Wayne's fishing habit. For many years it supported him while he moonlighted as a professional fisherman. Stints on TV, radio and seminars for boat or outdoor shows, has led to at least a dozen autographs. Incident response, malware and threat intel keep... Read More →


Wednesday August 5, 2015 14:00 - 14:55
Underground The Tuscany

14:00

Intro to Data Science for Security
In this workshop, students will learn basics of data science as they apply to analyzing common security-related data. Prediction & forecasting, anomaly detection, interaction graph analysis, and clustering will be demonstrated as tools for incident response, forensics, and planning.

Speakers
avatar for Rob Bird

Rob Bird

Challenges? Let's talk!, Technology Entrepreneur & Big Data Scientist
Rob leads Big Data platform architecture for Akamai, building compute, storage, and transport systems processing over an exabyte a year. He is the Chair of the Akamai Center of Excellence in Machine Learning, founder of the BSides Ground Truth track, and author of the Blarpy anomaly detection tool. Additionally, he brings academics to reality as co-editor of the Journal of Big Data. He is also the founder of Red Lambda, and its former CTO.
AS

Alex Shagla-McKotch

Alex is a senior security consultant at Rapid7, and former US Cyber Quests champion. He has extensive background in data science applied to security, as well as penetration testing, and fuses them to create advanced methodologies.


Wednesday August 5, 2015 14:00 - 15:55
Ground Truth Florentine F

14:00

Android App Security Auditing
Students will set up an environment that makes it easy to test Android apps for common security flaws such as lack of binary protections, insecure data transmission, insecure file storage, and data exposure in logs and memory dumps.

We will find and exploit real flaws in real financial apps including the Bank of America, Wells Fargo, TurboTax, and many more.

Speakers
avatar for Sam Bowne

Sam Bowne

City College San Francisco, City College San Francisco
Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks at DEFCON, HOPE, BayThreat, LayerOne, and Toorcon, and taught classes and many other schools and teaching conferences. He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign. Industry certs: CISSP, CEH, CCENT, WCNA, and more.


Wednesday August 5, 2015 14:00 - 17:55
Training Ground I Siena

14:00

Open Up A Can of OSINT On 'Em
There's a great deal that you can learn about online adversaries using Open Source Intelligence (OSINT), but a lot of us only scratch the surface. This session is all about learning how to go both deep and broad in adversary analysis to better defend your org--or, if it's your thing, to attack the attackers.

Speakers
TH

Tim Helming

Tim Helming, DomainTools Director of Product Management, has around 15 years of experience in cybersecurity, from network to cloud to application attacks and defenses. At WatchGuard, after starting in the trenches of technical support he eventually helped define and launch some of the best-selling SMB security appliances in the market. At Symform, he led definition and messaging efforts for that company’s unique peer-to-peer cloud storage... Read More →


Wednesday August 5, 2015 14:00 - 17:55
Training Ground II Siena

14:15

Interview Role Play
  • Presentation on “bad interviews” lessons learned/what not to do/humorous horror stories;

    • One recruiter and one hiring manager play off each other in a Mock Interview, breaking the 4th wall intermittently to talk directly to the audience about mistakes made, how to best answer certain questions, etc.

  •  
    •  
      • Be sure to stay productive

        • e.g., when to discuss Salary ranges

        • “Know your Hiring audience” tips

    • Open Mic - anyone with good points can step up to Emcee

    • Audience with good stories can step up to Emcee

      • Prize for the worst story, audience vote by applause

Speakers
KR

Kris Rides

Kris Rides is the Co-Founder and CEO of Tiro Security, an Information Security staffing and penetration testing company based in Los Angeles. Kris has over 15 years in the tech recruitment industry, is a founding board member of the LA Chapter of the Cloud Security Alliance and an advisory board member of CyberWatch West.


Wednesday August 5, 2015 14:15 - 14:45
Career Track Florentine B

14:30

Auth for Encrypted Services with Server Side APT
This presentation will discuss several bad designs for encrypting data stored in the cloud, and presents a new method for authenticating to an encrypted service.


Wednesday August 5, 2015 14:30 - 14:55
Passwords Tuscany

14:30

+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
Does what we teach and share reach beyond our community and into the every-day life of the average Joe? Can someone seemingly far removed from security benefit from events like BSides? One year after attending my first BSides, I share how what I learned has filtered out and changed my personal and professional environments.

(Author note: My abstract could use work. I'm sorry.)

Speakers

Wednesday August 5, 2015 14:30 - 14:55
Proving Ground Florentine E

15:00

Blind Hashing
Dubbed 'Security by Obesity' on Reddit, Blind Hashing entangles password hashes with a massive pool of completely random data. The data pool acts as a common defense fund to completely protect passwords against offline password cracking attacks.

Speakers
JS

Jeremy Spilman

Jeremy is the inventor of Blind Hashing and the first micropayment channel implementation in Bitcoin. He aims to create technology which measurably improves our security and privacy against the most well-provisioned hackers and corporate interests, deeply believing that everyone has the right to security in their digital identity and privacy in their digital footprints.


Wednesday August 5, 2015 15:00 - 15:25
Passwords Tuscany

15:00

Maximizing Bro Detection
Bro is an open source traffic analysis tool mainly deployed in Universities. This talk will show a bit of how Bro can be utilized in a real-world corporate environment and merely touch on what is possible with it.

Speakers
JB

John B. Althouse

John figures out ways to detect evil. He is also a track instructor and spends his free time calmly talking to people while they drive at 130mph toward a walls.


Wednesday August 5, 2015 15:00 - 15:25
Proving Ground Florentine E

15:00

Software-Defined Radio Signal Processing with a $5 Microcontroller.
Can you do useful software-defined radio work without hauling around your monster Core i7 laptop? Yes! I'll discuss the signal processing tricks I employed in my PortaPack for the HackRF One.

Speakers
JB

Jared Boone

ShareBrained Technology, Inc.
Jared Boone is an open-source hardware and software hacker who focuses on radio, music, and privacy/security projects. He runs ShareBrained Technology, where his projects sometimes turn into products.


Wednesday August 5, 2015 15:00 - 15:55
Above The Ground Plane Copa Showroom (1st Fl)

15:00

For love of country: 15 years of Security Clearance Decisions
A look at 15 years of security clearance adjudication data in order to gain some understanding of what goes into a security clearance decision.

Speakers
avatar for Kevin Tyers

Kevin Tyers

Kevin is a long time tech professional that is deeply interested in the culture around security, specifically the relationship between the infosec community and the government. Though he does not hold a clearance, he has spent many hours reading about the security clearance process. He has presented at other security conferences about Python and Network Security, and runs the blog thewaronshrugs.com.


Wednesday August 5, 2015 15:00 - 15:55
Common Ground Florentine G

15:00

Insider Tricks for Bug Bounty Success
If you are new to Bug Bounties, learn how to start reporting bugs for cash. If you have experience with Bug Bounties, learn how to increase your chances of success and earn bigger rewards.

Speakers
avatar for PHIL PURVIANCE

PHIL PURVIANCE

Security Associate, Bishop Fox
The number of companies with bug bounty programs has increased dramatically over the last five years. A clever researcher can make easy money disclosing security vulnerabilities responsibly, and some have even turned it into a full-time job. | | But how do these programs actually work? I will use my personal experiences on both sides of the fence - as a bug hunter and as a bug bounty submission reviewer - to provide an exclusive look into... Read More →


Wednesday August 5, 2015 15:00 - 15:55
Underground The Tuscany

15:30

PBKDF2: Performance Matters
Structural problems in how PBKDF2 was originally described mean almost all implementations give attackers an accidental advantage. This talk describes the problem and surveys several implementations.

Speakers
avatar for Joseph Birr-Pixton

Joseph Birr-Pixton

Joseph, aka ctz, has 7 years of experience with Hardware Security Module firmware development and phone authentication solutions. He spends the rest of his time complaining about how awful computers and electronic security are.


Wednesday August 5, 2015 15:30 - 15:55
Passwords Tuscany

15:30

Embedding Web Apps in MITMProxy Scripts
MITMProxy is a popular open source Python-based HTTP(S) interception proxy. The developers have recently added a web-based front-end to supplement the existing ncurses console GUI.
This talk will focus on work that I have done to bring a plugin architecture to the web front-end, allowing existing and new MITMProxy scripts to be configured and triggered through the browser.
Two types of plugins have been added: view-only transformations, and "action" transformations with options affecting the data traveling across the wire. This gives MITMProxy users more capabilities in terms of manipulating and visualizing intercepted HTTP(S) traffic, using application or domain-specific plugins.
I will show how this plugin architecture can be used in practice via an example of cheating at a popular mobile word puzzle game. There will also be a brief discussion of other interesting plugins and next steps.

Speakers
CC

Chris Czub

Chris Czub is a Security Researcher at Duo Security, an Ann Arbor, Michigan-based start-up focused on two-factor authentication and account security. With a career spanning a decade, he has worked in various roles from software engineer to tech lead at start-ups and IT companies in SE Michigan. He has seen security in practice at small and medium-sized organizations and worked on various aspects of security, such as secure coding... Read More →


Wednesday August 5, 2015 15:30 - 15:55
Proving Ground Florentine E

15:35

Company Elevator Pitches
Rotating Sponsor pitches about your company: cool projects/initiatives, open positions, company culture, unique perks (5 minutes each)

Wednesday August 5, 2015 15:35 - 16:40
Career Track Florentine B

16:00

All Your RFz Are Belong to Me – Software Defined Radio Exploits
SDR can be used to accomplish a many varied thing in the wireless world,
from plotting air traffic in realtime, to contacting old NASA space
probes, and reverse engineering restaurant pager protocols. In this talk
I’ll review some interesting and unusual radio systems, and show how you
can interact with them using open source software and cheap hardware. Of
particular interest is security: wireless systems (consumer, corporate,
government, amateur) are widely deployed and often vulnerable.

Some of the areas to be covered include: decoding existing, and creating
your own, First Person View video from drones, radio spectrum monitoring
and signal detection, visualising multipath propagation using digital TV
transmissions, and vehicular proximity smart keys.

Speakers
BS

Balint Seeber

A software engineer by training, Balint is a perpetual hacker, the | Director of Vulnerability Research at Bastille Networks, and guy behind | spench.net . His passion is Software Defined Radio | and discovering all that can be decoded from the ether, as well as | extracting interesting information from lesser-known data sources and | visualising them in novel ways. When not receiving electromagnetic | radiation, he likes to develop... Read More →


Wednesday August 5, 2015 16:00 - 16:50
Above The Ground Plane Copa Showroom (1st Fl)

16:00

Happy Hour
Wednesday August 5, 2015 16:00 - 16:55
Chill-Out Room Florentine C/D

16:15

Sue the Fed, Hack your FBI File
“Sue the Fed, Hack Your FBI File” will be a presentation and chance for Q&A about making effective FOIA and state Public Records Act requests. It will focus on the FBI and explain how understanding data structures such as ECF, Sentinel, and DIVS can lead to more effective requests. Attorney Henry will be available for conversation after the presentation, as well as at her table. 

Speakers
avatar for Caitlin Henry

Caitlin Henry

Attorney, @sue_the_fed
Kelly Henry, an Oakland-based attorney specializes in Freedom of Information and Public Records Act requests. You can read about some of her cases, and find resources for drafting your own requests here http://caitlinkellyhenry.com/foia. Kelly Henry also teaches in the Criminal Justice Department at Sonoma State University and the Anthropology and Social Change department at CIIS.



Wednesday August 5, 2015 16:15 - 16:35
Chill-Out Room Florentine C/D

16:20

16:40

It’s Not Just Your Answer: Hacking Tech Interviews

You don’t need to be a walking search engine to win at security tech interviews. Many candidates that go through a tech interview make some key mistakes that have nothing to do with what they actually know. Learn how to hack the infosec tech interview process for your best chance of success from a tech interviewer that does over 50 tech interviews per year.


Speakers
AB

Adam Brand

Adam Brand is an Associate Director in Protiviti’s Security and Privacy practice. In addition to leading security projects, he is also a lead tech interviewer for the Western region. With over 50 tech interviews in the past year, Adam has first-hand knowledge of how to hack the process to maximize your chances.


Wednesday August 5, 2015 16:40 - 17:00
Career Track Florentine B

17:00

Infosec careers, myth vs. reality

Many people say that they want careers in information security, often latching onto the stories of penetration testers or other security rockstars for the promise of a job with better pay and more cool factor. While looking to this as an escape from their current reality, most people don't realize the work or challenges involved in the realities of these other jobs. This talk will help to arm people with the insight needed to uncover the truth about careers in information security and to perform the self-reflection to determine what it means to find the right fit.


Speakers
HP

Heather Pilkington

Heather Pilkington (employer withheld) is a security consulting Jill-of-all-Trades, who has worked as a network penetration tester, forensicator, threat and vulnerability management engineer, systems administrator, help desk chick, and a barista. She found the last one to be the most eye-opening.


Wednesday August 5, 2015 17:00 - 17:20
Career Track Florentine B

17:00

Password Alert by Google
Password Alert is a free, open-source Chrome extension that protects your Google and Google Apps for Work Accounts. Once you've installed it, Password Alert will show you a warning if you type your Google password into a site that isn't a Google sign-in page. This protects you from phishing attacks, and also encourages you to use different passwords for different sites a security best practice.

Speakers
avatar for Drew Hintz

Drew Hintz

Security Engineer, Google
Drew is an Information Security Engineer, Staff Software Engineer at Google. He's the creator of Google Password Alert. His main focus is protecting Google and its users from targeted threats. His team has helped discover and kill 30+ 0day exploits being used in the wild by attackers, including code execution in Microsoft Office and universal XSS in Adobe Flash.


Wednesday August 5, 2015 17:00 - 17:25
Passwords Tuscany

17:00

What Lurks in the Shadow
What Lurks in the Shadow: Addressing the Growing Security Risk of Shadow IT & Shadow Data

Welcome to the Mordor of security, where the eye of BYOD reigns supreme, and the proliferation of easy-to-use devices is creating an unprecedented level of end user entitlement. A little knowledge has become a very dangerous thing by letting people “help themselves” to data and network access. This is the world of Shadow Data/Shadow IT, where rules are known but not observed; where risks are taken regardless of known consequences; and where “keep it secret” definitely does not keep IT safe. What happens when users or employees take it upon themselves to decide what tech they want to use and how they want to implement it? As the IoT proliferates, and human nature takes its course, we cannot out-engineer human failings and susceptibility. Because that device, and the freedom to use it as the user sees fit, override anything we currently put in place.

Speakers
avatar for Cheryl Biswas

Cheryl Biswas

Cheryl Biswas is Assistant Chief Security Officer and InfoSec analyst, researcher and writer with JIG Technologies in Toronto, Canada. She handles communications; researches and delivers InfoSec briefings; and advises on Disaster Recovery and security processes for clients. She loves her role and works to bridge the gap between those in tech and those who aren’t.


Wednesday August 5, 2015 17:00 - 17:25
Proving Ground Florentine E

17:00

Remote Access, the APT
ThruGlassXfer (TGXf) is a new and exciting technique to exfiltrate files from a computer through the screen. This presentation looks at a number of covert screen and keyboard infiltration and exfiltration techniques in an enterprise off-shoring context.

Speakers
avatar for Ian Latter

Ian Latter

Late night coder .., Midnight Code
A 20 year veteran of the IT industry, Ian has spent 15 years working in security in a number of positions including Penetration Tester, Security Architect and most recently, a Security Governance role at a blue chip corporate. Ian teaches the Practical Threat Intelligence course at Black Hat and has spoken at key international hacking and security conferences including COSAC (Ireland), Ruxcon (Australia), and Kiwicon (New Zealand). If he had... Read More →



Wednesday August 5, 2015 17:00 - 17:55
Breaking Ground Florentine A

17:00

Rethink, Repurpose, Reuse... Rain Hell
What Hacker doesn’t like james bond type gadgets? Like the all in one, one in all tool that can get you out of (or into) all sorts of jams, and is just plain cool to tinker with. Like Glitch from reboot! Well chances are you have several already at your fingertips, there are countless out there with more powerful ones arriving daily. The pace at which new wireless devices are released is blistering fast, leaving many perfectly good “legacy” devices around for testing. This talk will walk you through and further the discussion of modding these devices with readily available tools to quickly turn them into mobile hack platforms. Think PwnPad but without the $900 price tag. Going into whats worth your time and what's not. The possibilities are there if you so choose! Need all the power of your desktop or maybe just a few specific tools? Whatever your aim, this talk will point it further in the right direction

Speakers
MZ

Michael Zupo

Always the underdog, Works for the Canadian Government selling booze, drinks much of it then goes home and tinkers with all of his dusty projects. | only certified in trying his hardest. | He is immensely appreciative for bsides las vegas


Wednesday August 5, 2015 17:00 - 17:55
Common Ground Florentine G

17:00

No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
This session presents a credible and powerful method to estimate an aggregate performance index from a grab bag of ground-truth metrics and evidence, even if the ground truth data are messy. Several case studies will be demonstrated: Vendor Risk Assessment, Vulnerability Management, and Security Operations. Excel and R+Shiny tools will be released

Speakers

Wednesday August 5, 2015 17:00 - 17:55
Ground Truth Florentine F

17:00

Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
Threat intelligence. You keep using that term. I'm not sure it means what you think it means.
Plagued by meaningless generalized URLs and file hashes was supposed to be the role of AVs and proxies, how it came about that threat intelligence vendors keep providing those?
Actionable threat intelligence is the rainbow burping unicorn of infosec where such provided intelligence is actually useful for the specific organization.
In this talk we'll discuss about SOME of the way that this can be achieved and utilized in a risk management program.

Speakers
avatar for Ian Amit

Ian Amit

Vice President, ZeroFOX
Iftach (Ian) Amit, Vice President at ZeroFox, has over a decade of experience in hands-on and strategic roles, working across a diversity of security fields: business, industry, marketing, technical and research. At ZeroFOX, Ian leads the company’s customer solutions offerings and runs ZeroFOX’s New York offices. Previously, Ian served as Director of Services at IOActive. His career also includes time at Security-Art, Aladdin, Finjan, and... Read More →


Wednesday August 5, 2015 17:00 - 17:55
Underground The Tuscany

17:20

Some things you just can’t find on Google.

You know it’s important to ask questions to your interviewers, but you need to make them count. Candidates need to assess a company that they think they want to work for. We’ll share tips on how to best get the inside information about what it’s really like (beyond Glassdoor, beyond the general “how many people are on the team?”) to work there so you can determine if it’s up to par with what you want in your next job.



Wednesday August 5, 2015 17:20 - 17:40
Career Track Florentine B

17:30

No More Graphical Passwords
What have we accomplished with passwords in the last fifty years? Embarrassingly little. We are on the brink of an explosion of authentication technologies, but so far much of what we see is the same flawed ideas repeated over and over. It is time for the community to step up and start leading the world to better authentication security. This presentation will look at where we are with passwords, biometrics, tokens, and other authentication solutions, and will also look at the big problems we still haven't solved.

Speakers
avatar for Mark Burnett

Mark Burnett

Consultant, Mark Burnett
Mark, aka m8urnett, is an independent security analyst with over 17 years of security industry experience. He is author of several security books--including Perfect Passwords--and has written for many other web sites, newsletters, and print magazines. Much of his day job involves application and OS security, and developing training material.


Wednesday August 5, 2015 17:30 - 17:55
Passwords Tuscany

17:30

Out of Denial: A 12-Step Program for Recovering Admins
With massive data breaches being announced almost daily, the number of IT professionals moving into the security arena continues to grow. Some of these (like myself) come from systems and network admin backgrounds. Many of these “recovering admins” think they know security because they managed firewalls, established VPNs and created AD password policies. Most, however, are wrong - they don’t understand the enemy, his tactics or what’s at stake. To help with this learning process, we will work through a "12-step” program designed to help face the harsh reality, dispel many common misconceptions and provide some clear directions to move forward.

Wednesday August 5, 2015 17:30 - 17:55
Proving Ground Florentine E

17:40

Longevity in InfoSec – Turning Passion into Expertise & Respect

Whether your transitioning from another industry sector or one akin to InfoSec (like IT) or starting on the first stepping stone to InfoSec, this talk will cover the key ingredients for (1) appreciating yourself and knowing how to be mentored (2) transferring passion into professionalism amidst a multitude of distractions and defeats over a career-span and (3) establishing the aides that will help you focus on your goals, both in the short and long term, and being able to re-align those goals based upon key changes in technology trends and emerging threats.


Speakers
TU

Tony “UV” UcedaVelez

Tony “UV” UcedaVelez is the CEO of VerSprite, a risk focused security consulting firm focused on building authentic, tailored solutions for global clients.


Wednesday August 5, 2015 17:40 - 18:00
Career Track Florentine B

18:00

Common Mistakes that Engineers make while Interviewing in a “Hot” market

What not to say, but if you do - how to change it into a positive

•  I'm looking because I want more money

*  just shopping

•  I want to learn

•  I haven't done any research on your company

•  I don't care what the product is - doesn't matter

Speakers
SA

Sinda Allen

Sinda Allen is a Senior Staffing Professional with over 20 years of experience. Sinda is known for growing effective and efficient teams by keeping a balance of hiring the right skills known by the right candidates that long term grow the company and the shared vision of culture.


Wednesday August 5, 2015 18:00 - 18:20
Career Track Florentine B

18:00

How Secure Are Multi-Word Random Passphrases?
Passphrases in the style of XKCD 936 or Diceware have gained popularity, but are they secure enough and practical to use? They seem like a good compromise between security and memorability, but why did Bruce Schneier say using them is "no longer good advice"? This session investigates popular password generation schemes, and examines the characteristics that determine the passphrase strength. We will also review whether the average person finds these passphrases easier to use than passwords, and if they're practical to use in most cases.

Speakers
avatar for Bruce Marshall

Bruce Marshall

Founder, PasswordResearch.com
Bruce is a security consultant that founded the PasswordResearch.com web site over a decade ago. He aims to introduce more professionals to new and existing authentication research so they can better justify secure system design and policy choices. He has previously shared his experiences with authentication and other topics at the Black Hat, SANS, and InfoSec World conferences.



Wednesday August 5, 2015 18:00 - 18:25
Passwords Tuscany

18:00

Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
Conflict can be a good thing, really. Without it, we get groupthink and dumbass decisions. But how we approach and resolve conflicts can make the difference between healthy conflict and an unproductive, frustrating fight. Why do we have so much of the latter?

My graduate research on the conflict resolution style preferences of information security professionals sheds light on the “culture of no”: why infosec conflict so often results in fights, why we keep burning bridges to make a point, and why people can be unwilling to talk to us. More importantly, this research gives us ideas on how we can resolve conflicts without burning all the bridges – in other words, how we can begin to have nice things.

(No hackers or statistics were harmed in this research.)

Speakers
RL

Rachael Lininger

Information security analyst, risk consultant, Cthulhu cultist. Lawful good. Opinions belong to her autocorrect, not her employer.


Wednesday August 5, 2015 18:00 - 18:25
Proving Ground Florentine E

18:00

Why does InfoSec play bass? And other observations about hacker culture.
Shortly after I was convinced to join Twitter and get engaged with the security community, I started noticing patterns with the people I was meeting. Namely, I noticed that many were also musicians and that the vast majority played the electric bass. As a bass player myself, I understand that the general rule is, if you show up to an open-mic blues jam, you’ll get to play bass all night, and the guitarists will be relieved that none of them have to ‘do bass duty’. I became fascinated with how this pattern seems to reverse in the infosec/hacker community and started to see parallels between security and this particular instrument. I plan to share my research, ideas and theories that I’ve collected on my journey to understand this strange anomaly and look forward to hearing more.

Speakers
avatar for Adrian Sanabria

Adrian Sanabria

Senior Security Analyst, 451 Research
Equally comfortable performing a pentest, designing an infosec program, heading up an incident response team, or discussing market trends, Adrian has covered much of the security spectrum. In his current role as an industry analyst, he writes and researches extensively about the security industry. He also gets to talk to lots of people in the industry on a regular basis, blogs and can be found stirring up trouble on Twitter as @sawaba... Read More →


Wednesday August 5, 2015 18:00 - 18:55
Common Ground Florentine G

18:00

AI and CND - implications for security in the era of Artificial Intelligence
The purpose of this talk will be to illuminate, promote and create awareness for the field of Artificial Intelligence by providing a purely speculative, yet fun and imaginative outlook on the many ways AI can and will transform society and security. The talk will highlight where AI already exists in the everyday world all around us, sometimes without our realizing it. It will introduce the notion of competing AI’s in security as defender vs attacker.

Speakers
DM

Dan Mitchell

Dan Mitchell is currently a Principal Data Scientist at ThreatConnect. He is a 16 year veteran of the security industry. Dan’s career as a security professional originated from his discovery and subsequent fascination with Artificial Intelligence and theories on sentient machines. Dan is driven and passionate about the application of Artificial Intelligence and advanced mathematics to outsmart the adversary. Dan takes pride in the fact that... Read More →


Wednesday August 5, 2015 18:00 - 18:55
Ground Truth Florentine F

18:00

Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
This presentation will discuss the previously-unreleased firmware distribution called “Intentionally Vulnerable WRT (IV-WRT)”. IoT, or more accurately embedded device, security is a train wreck. IV-WRT is an attempt at bringing vulnerabilities to light which exist inside of firmware on embedded systems. While IoT encompasses many more technologies, the crux of the issue is the (in)security of the devices themselves. While the vulnerabilities themselves are not unknown, the repercussions of said vulnerabilities on embedded systems are often overlooked, and the risk (or “So What?”) is lost. Now you can experience these vulnerabilities for yourself, first hand.

Speakers
avatar for Paul Asadoorian

Paul Asadoorian

Product Evangelist, Tenable Network Security
Paul Asadoorian is the Founder & CEO of Security Weekly, where he has led the content and production of one of the longest running computer security podcasts/Internet TV shows. By day he is the Product Strategist for Tenable Network Security. Paul produces and hosts the various shows at Security Weekly, all dedicated to providing the latest security news, interviews with the industries finest and technical how-to segments. Paul has extensive... Read More →
NC

Nick Curran

Nicholas Curran is a security geek, philosophy geek and producer for Paul's Security Weekly. He enjoys poetry, music and tea. Est culus quod cogos alienum loqui latinae which, roughly translated, means "he is a jerk because he makes strangers speak latin.


Wednesday August 5, 2015 18:00 - 19:00
Breaking Ground Florentine A

18:00

Ask the EFF
"Ask EFF" will be a panel presentation and question-and-answer session with several staff members of the Electronic Frontier Foundation, the nation’s premiere nonprofit digital civil liberties group. Each staffer will discuss a particular issue that has been in the news or on EFF’s docket this yea.

Speakers
avatar for Nate Cardozo

Nate Cardozo

Senior Staff Attorney, Electronic Frontier Foundation
NATE CARDOZO is a Senior Staff Attorney on the Electronic Frontier Foundation’s digital civil liberties team. In addition to his focus on free speech and privacy litigation, Nate works on EFF's Who Has Your Back? report and Coders' Rights Project. Nate has projects involving cryptography and the law, automotive privacy, government transparency, hardware hacking rights, anonymous speech, electronic privacy law reform, Freedom of Information... Read More →
NK

Nadia Kayyali

NADIA KAYYALI is a member of EFF’s activism team. Nadia's work focuses on surveillance, national security policy, and the intersection of criminal justice, racial justice, and digital civil liberties issues. Nadia has been an activist since high school, when they participated in the World Trade Organization protests in Seattle. Nadia is one of the creators of the Canary Watch website, which tracks and classifies warrant canaries.
avatar for Kurt Opsahl

Kurt Opsahl

Deputy ED and General Counsel, Electronic Frontier Foundation
Kurt Opsahl is the Deputy Executive Director and General Counsel of the Electronic Frontier Foundation. In addition to representing clients on civil liberties, free speech and privacy law, Opsahl counsels on EFF projects and initiatives. Opsahl is the lead attorney on the Coders' Rights Project. Before joining EFF, Opsahl worked at Perkins Coie, where he represented technology clients with respect to intellectual property, privacy, defamation... Read More →


Wednesday August 5, 2015 18:00 - 19:00
Underground The Tuscany

18:30

Are You Sure That You Still Need Passwords?
Our mission is to remove username/password from internet. We are fools enough to think that the current auth paradigm can be much safer, simpler and secure if only it were completely reversed. We shouldn't manually type our data into a form; those who want our data should ask permission to read them from our smartphones.

Speakers
avatar for Björn Pirrwitz

Björn Pirrwitz

CEO, SingleID
Björn is an angel investor and entrepreneur, and is the co-founder and CEO of SingleID. He holds law degrees from Bonn University and the University of Texas School of Law. He previously co-founded Novum Capital, and has been on the board of IVC Venture Capital since 2003. Björn has lived, studied, and worked in nine countries and speaks six languages.
avatar for Daniele Vantaggiato

Daniele Vantaggiato

CTO, SingleID Inc
Daniel is a security consultant, programmer, systems administrator, and entrepreneur, who has over 15 years of experience and is passionate about cryptography.



Wednesday August 5, 2015 18:30 - 18:55
Passwords Tuscany

18:30

Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
While serial interfaces and tools to easily make use of them are more widespread than ever. However, with the downfall of the serial modem as a common communication method and the omission of an RS232 serial port from most modern PC designs it is easy to have gotten into the tech industry without ever having touched a simple serial port. This talk is intended to be an intro to dealing with serial and JTAG and now it relates to hardware hacking.

Speakers
MJ

Matthew Jakubowski

Longtime con goer, first time speaker. Always took things apart as a kid to figure out how they worked and in some cases how to get Linux onto them. Been responsible in many different areas of infosec: datacenter tech, sysadmining, defending systems in a SOC, and now he gets to break them professionally as a pentester. Not to be confused with The Jaku.


Wednesday August 5, 2015 18:30 - 18:55
Proving Ground Florentine E

18:45

Closing remarks and thanks from our Emcee
Career Track Bingo cards due; drawing for prizes seeded by BSidesLV given out during Closing Ceremonies in the Chill-Out Room.

Speakers

Wednesday August 5, 2015 18:45 - 18:55
Career Track Florentine B

19:00

Auction, Raffle, Closing Remarks
Wednesday August 5, 2015 19:00 - 19:55
Chill-Out Room Florentine C/D

22:00

Pool Party Sponsored by Ionic Security
Wednesday August 5, 2015 22:00 - Thursday August 6, 2015 04:00
The Pool The Pool