Graphic recording artist Kelly Kingman depicts the interesting points and key takeaways from some of the most intriguing talks presented at BSides Las Vegas 2015.
--
Read our blog post on why BSides matters to infosec here: http://www.tripwire.com/state-of-security/featured/bsides-broadening-the-horizons-of-information-security/
2. Wendy Nather
and
Rob Graham
Incite Club: Fly THIS
Sideways!
Hacking isn’t just games any
more. The ones and zeros are
turning into real-world, kinetic
consequences, and lives are at
stake. How do we get the world
to take security seriously – on
both sides?
@RCISCwendy
@ErrataRob Sponsored by
3. Michael st. vincent
Speaking Metrics
to Executives
Executives need quick value, so
when you are presenting data,
typically in the form of graphs,
make sure to ask yourself these
questions: Is this information
actionable? Does it create a
sense of urgency? Is it easy to
understand?
@justoneping
Sponsored by
4. Keren Elazari
Hack the Future
The future of cybersecurity is not
just about privacy or keeping
things secret. Our information is
worth a lot of money, and the
power of releasing it can change
the world. Not everything can be
secure, but that’s exactly why the
world needs hackers.
@k3r3n3
Sponsored by
5. Larry Vandenaweele
The Journey to ICS
Poor authentication, passwords
on Post-Its, rogue access points
and unlocked doors and windows
are just a few of the common
weaknesses still seen in ICS
today. By protecting ourselves
first, building a team and getting
management on board, we can
begin to move towards the right
direction.
@lvandenaweele
Sponsored by
6. Rick Redman
What Would Fix
Passwords?
One enterprise was able to
minimize its risk posed by
password cracking attacks –
from 85 percent, down to only
50 percent – after implementing
weekly password auditing.
Enterprises can reduce risk by
increasing character length,
incentivizing employees and lots
of training.
@CrackMeIfYouCan
Sponsored by
7. Josh Corman
The State of Automotive
Cyber Safety
Our cars have become
computers on wheels, and now,
they are integrated with
numerous ‘hackable’ features.
The problem is that our society is
adopting connected technology
faster than we are able to
secure it.
@joshcorman
Sponsored by
8. “tAZZ TAZZ”
ZOMG It’s OSINT Heaven!
With open source intelligence,
social media networks and other
readily available sources,
collecting “confidential”
information on a given subject
may require just a few carefully
crafted searches. Be mindful of
the information you post online –
you may also be putting friends
and family at risk!
@GRC_ninja
Sponsored by
9. Michael Spacek
I Forgot My Password
Users often forget their
passwords, so it’s important for
applications to have safe
password reset mechanisms in
place. Rules of thumb include:
giving users the option for added
security, an expiration of 1-2
hours and using random tokens.
@spazef0rze
Sponsored by
10. Adam compton
Phishing: Going From Recon
to Credentials
Why do cybercriminals phish?
Because it works! Phishing
bypasses all the perimeter
controls. Plus, people are gullible,
we want to be helpful and we’re
also ‘unpatchable.’
@tatanus
Sponsored by
11. JoEtta Lesueur
Social Media in Incident
Response Program
Social media can be an integral
part of your company’s incident
response plan. Choose two social
media apps and have dedicated,
trained associates monitor these
channels. Establish a clear
communications policy, and
involve HR and legal.
@sHErArOX
Sponsored by
12. Elizabeth wharton
FAA. FTC, FCC – FU:
How 3 F’ing Agencies are
Shaping Infosec
Why have these agencies
suddenly picked up the interest in
cybersecurity? The answer is
money, fame and political power
– it’s all about big budgets.
@lawyerliz
Sponsored by
13. ERIC KMETZ
Cats & Mice: Ever Evolving
Attackers and Other Game
Changers
Social site behavior now makes
up the ‘8th layer’ or ‘user layer’ of
the security chain. If behaviors
and attributes became
sequences and letters, we could
creating signatures from
analyzing this behavior.
@VECT0RX
Sponsored by
14. kELLY kINGMAN
Kelly is a graphic recorder that
creates visual summaries of
spoken content like talks,
discussions, and meetings.
Her visuals stimulate creativity
and collaboration to help the
audience retain and understand
information.
@KELLYKINGMAN
Sponsored by
15. For the latest security news, trends and
insights, visit us at:
www.tripwire.com/blog
@TripwireInc
Don’t miss the next BSides event near you!
For more information, visit:
www.securitybsides.com
IMAGE COURTESY OF SHUTTERSTOCK.COM