06-24-2017 Security Implications of Shadow IT

“Shadow IT” is a name often given to Information Technology systems used within an organization without proper authorization. But in order for Shadow IT to exist, there has to be enablers encouraging and/or providing a way. This talk looks at some of the enablers of Shadow IT, and proposes one mitigation towards dealing with the […]

06-10-2017 An update on Cybersecurity Regulations & Standards

“As infosec professionals, we have to keep up on the latest threats and issues emerging in cybersecurity.  Certainly the recent WannaCry incident is a perfect example of this. But in addition to that, we also need to keep abreast of updates and changes in regulations, standards and the like that can also affect us and […]

04-22-107 GET TO KNOW. Neural Networks, TensorFLOW 101

    GET TO KNOW. Neural Networks, TensorFlow 101 This is the first of a series of sessions where we will get to know new technologies that are being developed and implemented in many cutting edge products in the west coast. There will be a presentation with guidelines however, attendants are encouraged to do their […]

03-25-2017 OSSINT Micro Expressions & SE

OSSINT Micro Expressions & SE            Misgizmo will give a presentation about Open Source Intelligence, Micro Expressions and Social Engineering. This presentation will cover the use of OSSINT & Micro expressions to successfully, perform Social Engineering attacks. Social Engineering is defined as: Social engineering, in the context of information security, refers […]

03-11-2017 Click all the links, and run it live! An introduction to responding to Malware

Click all the links, and run it live!  An introduction to responding to Malware Remember that time that someone didn’t click on a phishing link?  Me neither. Config will give an introduction to Incident Response, focused on the triage and identification of malware commonly found in phishing and drive-by attacks. We will go over what […]

02-25-2017 Memory Analysis with Volatility framework

      Haxathlon will give a presentation on volatility memory analysis framework. “The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.” The Volatility distribution is available from: http://www.volatilityfoundation.org/#!releases/component_71401 Volatility […]