06-16-2018 Adversarial Simulation Tools 101

This presentation will cover an introduction to a number of Adversarial Simulation Frameworks. These frameworks offer a method to test organization’s networks, applications and hosts defense resilience against a simulated attack/attacker. We will go over their objectives, structure and technologies as well as technical demos. Presenter Rod Soto Saturday, June 16, 2018 2:00 PM to 4:00 PM […]

02-24-2018 Cryptocurrency 101

Learn the many uses for cryptocurrencies/blockchain, where to buy and sell crypto, how to create a wallet and secure your funds, how to invest and trade, and more. Presenter: Botornot Broward Main Library 100 S Andrews Ave · Fort Lauderdale, FL 2.PM

02-03-2018 SMS as a Cryptocoin attack vector

SMS as a Cryptocoin attack vector This presentation will show how malicious actors are actively taking advantage of the use of SMS as second authentication factor to prove identity. These vulnerabilities enable malicious actors to obtain SMS messages then proceed to reset and take over all users accounts starting with email accounts with access to […]

01-20-2018 Intro to Reversing

Intro to Reversing –  New vulnerabilities are being discovered at a rapid rate and can cause threat to the systems we are protecting. Reverse engineering helps us better understand our systems, software and the vulnerabilities that are discovered on a deeper level. This talk will go into the basics of reverse engineering x86 on Linux […]

09-30-2017 SUPER TALK SATURDAY CHIRON/WIREX

This Saturday. Two WORLD class presentations at Hackmiami. The story behind WIRE X by Chad Seaman as seen in Krebs on Security A half dozen technology and security companies — some of them competitors — issued the exact same press release today. This unusual level of cross-industry collaboration caps a successful effort to dismantle ‘WireX,’ […]

06-24-2017 Security Implications of Shadow IT

“Shadow IT” is a name often given to Information Technology systems used within an organization without proper authorization. But in order for Shadow IT to exist, there has to be enablers encouraging and/or providing a way. This talk looks at some of the enablers of Shadow IT, and proposes one mitigation towards dealing with the […]