SlideShare a Scribd company logo
1 of 15
Download to read offline
12 INTRIGUING
TALKS FROM
2015	
  
Sponsored by
Wendy Nather
and
Rob Graham
Incite Club: Fly THIS
Sideways!
Hacking isn’t just games any
more. The ones and zeros are
turning into real-world, kinetic
consequences, and lives are at
stake. How do we get the world
to take security seriously – on
both sides?
@RCISCwendy
@ErrataRob Sponsored by
Michael st. vincent
Speaking Metrics
to Executives
Executives need quick value, so
when you are presenting data,
typically in the form of graphs,
make sure to ask yourself these
questions: Is this information
actionable? Does it create a
sense of urgency? Is it easy to
understand?
@justoneping
Sponsored by
Keren Elazari
Hack the Future
The future of cybersecurity is not
just about privacy or keeping
things secret. Our information is
worth a lot of money, and the
power of releasing it can change
the world. Not everything can be
secure, but that’s exactly why the
world needs hackers.
@k3r3n3
Sponsored by
Larry Vandenaweele
The Journey to ICS
Poor authentication, passwords
on Post-Its, rogue access points
and unlocked doors and windows
are just a few of the common
weaknesses still seen in ICS
today. By protecting ourselves
first, building a team and getting
management on board, we can
begin to move towards the right
direction.
@lvandenaweele
Sponsored by
Rick Redman
What Would Fix
Passwords?
One enterprise was able to
minimize its risk posed by
password cracking attacks –
from 85 percent, down to only
50 percent – after implementing
weekly password auditing.
Enterprises can reduce risk by
increasing character length,
incentivizing employees and lots
of training.
@CrackMeIfYouCan
Sponsored by
Josh Corman
The State of Automotive
Cyber Safety
Our cars have become
computers on wheels, and now,
they are integrated with
numerous ‘hackable’ features.
The problem is that our society is
adopting connected technology
faster than we are able to
secure it.
@joshcorman
Sponsored by
“tAZZ TAZZ”
ZOMG It’s OSINT Heaven!
With open source intelligence,
social media networks and other
readily available sources,
collecting “confidential”
information on a given subject
may require just a few carefully
crafted searches. Be mindful of
the information you post online –
you may also be putting friends
and family at risk!
@GRC_ninja
Sponsored by
Michael Spacek
I Forgot My Password
Users often forget their
passwords, so it’s important for
applications to have safe
password reset mechanisms in
place. Rules of thumb include:
giving users the option for added
security, an expiration of 1-2
hours and using random tokens.
@spazef0rze
Sponsored by
Adam compton
Phishing: Going From Recon
to Credentials
Why do cybercriminals phish?
Because it works! Phishing
bypasses all the perimeter
controls. Plus, people are gullible,
we want to be helpful and we’re
also ‘unpatchable.’
@tatanus
Sponsored by
JoEtta Lesueur
Social Media in Incident
Response Program
Social media can be an integral
part of your company’s incident
response plan. Choose two social
media apps and have dedicated,
trained associates monitor these
channels. Establish a clear
communications policy, and
involve HR and legal.
@sHErArOX
Sponsored by
Elizabeth wharton
FAA. FTC, FCC – FU:
How 3 F’ing Agencies are
Shaping Infosec
Why have these agencies
suddenly picked up the interest in
cybersecurity? The answer is
money, fame and political power
– it’s all about big budgets.
@lawyerliz
Sponsored by
ERIC KMETZ
Cats & Mice: Ever Evolving
Attackers and Other Game
Changers
Social site behavior now makes
up the ‘8th layer’ or ‘user layer’ of
the security chain. If behaviors
and attributes became
sequences and letters, we could
creating signatures from
analyzing this behavior.
@VECT0RX
Sponsored by
kELLY kINGMAN
Kelly is a graphic recorder that
creates visual summaries of
spoken content like talks,
discussions, and meetings.
Her visuals stimulate creativity
and collaboration to help the
audience retain and understand
information.
@KELLYKINGMAN
Sponsored by
For the latest security news, trends and
insights, visit us at:
www.tripwire.com/blog
@TripwireInc
Don’t miss the next BSides event near you!
For more information, visit:
www.securitybsides.com
IMAGE COURTESY OF SHUTTERSTOCK.COM

More Related Content

More from Tripwire

More from Tripwire (20)

Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 
Protecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware ThreatProtecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware Threat
 
Top 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information SecurityTop 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information Security
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

12 Intriguing Talks from BSides Las Vegas 2015

  • 2. Wendy Nather and Rob Graham Incite Club: Fly THIS Sideways! Hacking isn’t just games any more. The ones and zeros are turning into real-world, kinetic consequences, and lives are at stake. How do we get the world to take security seriously – on both sides? @RCISCwendy @ErrataRob Sponsored by
  • 3. Michael st. vincent Speaking Metrics to Executives Executives need quick value, so when you are presenting data, typically in the form of graphs, make sure to ask yourself these questions: Is this information actionable? Does it create a sense of urgency? Is it easy to understand? @justoneping Sponsored by
  • 4. Keren Elazari Hack the Future The future of cybersecurity is not just about privacy or keeping things secret. Our information is worth a lot of money, and the power of releasing it can change the world. Not everything can be secure, but that’s exactly why the world needs hackers. @k3r3n3 Sponsored by
  • 5. Larry Vandenaweele The Journey to ICS Poor authentication, passwords on Post-Its, rogue access points and unlocked doors and windows are just a few of the common weaknesses still seen in ICS today. By protecting ourselves first, building a team and getting management on board, we can begin to move towards the right direction. @lvandenaweele Sponsored by
  • 6. Rick Redman What Would Fix Passwords? One enterprise was able to minimize its risk posed by password cracking attacks – from 85 percent, down to only 50 percent – after implementing weekly password auditing. Enterprises can reduce risk by increasing character length, incentivizing employees and lots of training. @CrackMeIfYouCan Sponsored by
  • 7. Josh Corman The State of Automotive Cyber Safety Our cars have become computers on wheels, and now, they are integrated with numerous ‘hackable’ features. The problem is that our society is adopting connected technology faster than we are able to secure it. @joshcorman Sponsored by
  • 8. “tAZZ TAZZ” ZOMG It’s OSINT Heaven! With open source intelligence, social media networks and other readily available sources, collecting “confidential” information on a given subject may require just a few carefully crafted searches. Be mindful of the information you post online – you may also be putting friends and family at risk! @GRC_ninja Sponsored by
  • 9. Michael Spacek I Forgot My Password Users often forget their passwords, so it’s important for applications to have safe password reset mechanisms in place. Rules of thumb include: giving users the option for added security, an expiration of 1-2 hours and using random tokens. @spazef0rze Sponsored by
  • 10. Adam compton Phishing: Going From Recon to Credentials Why do cybercriminals phish? Because it works! Phishing bypasses all the perimeter controls. Plus, people are gullible, we want to be helpful and we’re also ‘unpatchable.’ @tatanus Sponsored by
  • 11. JoEtta Lesueur Social Media in Incident Response Program Social media can be an integral part of your company’s incident response plan. Choose two social media apps and have dedicated, trained associates monitor these channels. Establish a clear communications policy, and involve HR and legal. @sHErArOX Sponsored by
  • 12. Elizabeth wharton FAA. FTC, FCC – FU: How 3 F’ing Agencies are Shaping Infosec Why have these agencies suddenly picked up the interest in cybersecurity? The answer is money, fame and political power – it’s all about big budgets. @lawyerliz Sponsored by
  • 13. ERIC KMETZ Cats & Mice: Ever Evolving Attackers and Other Game Changers Social site behavior now makes up the ‘8th layer’ or ‘user layer’ of the security chain. If behaviors and attributes became sequences and letters, we could creating signatures from analyzing this behavior. @VECT0RX Sponsored by
  • 14. kELLY kINGMAN Kelly is a graphic recorder that creates visual summaries of spoken content like talks, discussions, and meetings. Her visuals stimulate creativity and collaboration to help the audience retain and understand information. @KELLYKINGMAN Sponsored by
  • 15. For the latest security news, trends and insights, visit us at: www.tripwire.com/blog @TripwireInc Don’t miss the next BSides event near you! For more information, visit: www.securitybsides.com IMAGE COURTESY OF SHUTTERSTOCK.COM