• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Browse and search Google Drive and Gmail attachments (plus Dropbox and Slack files) with a unified tool for working with your cloud files. Try Dokkio (from the makers of PBworks) for free. Now available on the web, Mac, Windows, and as a Chrome extension!

View
 

BSidesDetroit14Sessions

Converge | BSides Detroit 2014

 

BSides Detroit: Saturday, 7/12/2014

 

Time/Track Keynote Business Breaking and Entering Hacker
9:00 AM-10:00 AM Practicing Our Mistakes Until We Master Them
Jack Daniel



10:00 AM-10:30 AM Break
10:30 AM-11:30 AM
Security for the Next Generation: Lessons Learned From a First Time Father
Keith Dixon
Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields
Eve Adams
Breech Stains
Matt Johnson
11:30 AM-12:00 PM
Threats in Vehicle-to-Vehicle Communications
George Corser
Verbal Sparring 101
Nick Jacob
Lessons Learned Planning, Managing, and Running the BSJTF CTF
Ben0xA && Dthom
12:00 PM-2:00 PM Lunch Break
2:00 PM-3:00 PM
Engagement Zen: Transforming IT & The Business through Security for Fun + Profit
Paul R. Jorgensen
Build it, they will come: The importance of local infosec communities
Ed Rojas
Hacking Your Way Into the APRS Network on the Cheap
Mark Lenigan
3:00 PM-4:00 PM
What Happened to the ‘A’? – How to Leverage BCP/DR for your Info Sec Program
Michael A. Ortega
Beating the Infosec Learning Curve Without Burning Out
Scott Thomas
Thinking Outside the Bunker: Security as a Practice, Not a Target
Steven Legg
4:00 PM-5:00 PM
Roadmap for Success: 20 Critical Security Controls for Effective Cyber Defense
Ken Evans
Eat, Sleep, BILL, Repeat
Zee Abdelnabi
Seeing Purple: Hybrid Security Teams for the Enterprise
Mark Kikta
5:00 PM-6:00 PM
Fix What Matters:Why CVSS Sucks and How To Do Better
Michael Roytman
Is software development engineering? Probably not, one reason: testing.
Ben Schleis
Who Moved My Keys??? An Amazing Way to Deal with Changes We Need to Make in InfoSec
Caston Thomas

 

Comments (0)

You don't have permission to comment on this page.