09-30-2017 SUPER TALK SATURDAY CHIRON/WIREX

This Saturday. Two WORLD class presentations at Hackmiami. The story behind WIRE X by Chad Seaman as seen in Krebs on Security A half dozen technology and security companies — some of them competitors — issued the exact same press release today. This unusual level of cross-industry collaboration caps a successful effort to dismantle ‘WireX,’ […]

06-24-2017 Security Implications of Shadow IT

“Shadow IT” is a name often given to Information Technology systems used within an organization without proper authorization. But in order for Shadow IT to exist, there has to be enablers encouraging and/or providing a way. This talk looks at some of the enablers of Shadow IT, and proposes one mitigation towards dealing with the […]

06-10-2017 An update on Cybersecurity Regulations & Standards

“As infosec professionals, we have to keep up on the latest threats and issues emerging in cybersecurity.  Certainly the recent WannaCry incident is a perfect example of this. But in addition to that, we also need to keep abreast of updates and changes in regulations, standards and the like that can also affect us and […]

04-22-107 GET TO KNOW. Neural Networks, TensorFLOW 101

    GET TO KNOW. Neural Networks, TensorFlow 101 This is the first of a series of sessions where we will get to know new technologies that are being developed and implemented in many cutting edge products in the west coast. There will be a presentation with guidelines however, attendants are encouraged to do their […]

03-25-2017 OSSINT Micro Expressions & SE

OSSINT Micro Expressions & SE            Misgizmo will give a presentation about Open Source Intelligence, Micro Expressions and Social Engineering. This presentation will cover the use of OSSINT & Micro expressions to successfully, perform Social Engineering attacks. Social Engineering is defined as: Social engineering, in the context of information security, refers […]

03-11-2017 Click all the links, and run it live! An introduction to responding to Malware

Click all the links, and run it live!  An introduction to responding to Malware Remember that time that someone didn’t click on a phishing link?  Me neither. Config will give an introduction to Incident Response, focused on the triage and identification of malware commonly found in phishing and drive-by attacks. We will go over what […]