07-11-2015 Hackerville, REMnux

110_remnux

Hackerville We will be playing and discussing the Hackerville documentary.  REMnux         REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can examine malware, yet might be […]

06-20-2015 Docker, HackmiamiBT

110_docker_bt

Docker Docker is a tool that can package an application and its dependencies in a virtual container that can run on any machine. This helps enable flexibility and portability on where the application can run, whether on-premise, public cloud, private cloud, bare metal, etc. We will have a hands-on session on Docker, and take a […]

06-06-2015 Virtualization & Cloud Security Challenges

security-umbrella_2

              Virtualization & Cloud Security Challenges Rod Soto will talk about attack vectors, security shortfalls, mitigation and defense techniques in most commonly used Virtualization technologies such as Hyper-V, Vsphere, Xen Server/XenApp. There will also be a discussion on security implications in current cloud environments and continuous move of organizations into […]

Dave Monnier of Team Cymru Keynote Speaker

dave_monnier

Dave Monnier is a Fellow and the Director of Threat Intelligence and Outreach at Team Cymru. Understanding that real-world security involves both technology and business considerations, Dave helps organizations to fully consider their security and policy decisions in real-world terms. Dave has traveled the world presenting security ideas and solving organizations hardest problems. With over […]

The Hackable Badge Contest

HackMiami Conference

Is it a badge hack?  Is it a cypto challenge?  Is it a scavenger hunt? Why yes, yes it is! The hackable badge contest is making its initial appearance at the HackMiami conference this year.  The objective of the contest is to involve all who know about or want to learn about Near Field Communications […]

05-06-2015 Pentest 101

hackmiamilogo

Penetration testing 101 This interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation. This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you can choose your own training […]