No Saved Sessions
- No Saved Sessions
Please note that you can save a list of the sessions you would like to attend by using the “Bookmark” button. You can see your saved sessions by clicking this link or at the bottom of the page. Enjoy!
Just like a pirate is always looking for their next treasure, a job seeker should always be looking for their next opportunity. According to the Department of Labor, most professionals will have at least 15 jobs in their lifetime, and in our community, that number is almost double. What are tools and strategies to always have on hand so that you can navigate your career search. A frank discussion about career search strategies and fails.Read more here!
Over the past several years, medical device security has emerged from a unrecognized shadowy security issue to the forefront of concern by healthcare providers, vendors, media and patients. This presentation provides a history of medical device security issues, key challenges we face, recent regulatory changes with FDA guidance, and a forward look at emerging threats well beyond ransomware. Attendees will gain an insights to the challenges, learn about the threats and have common medical device security myths dispelled.
This talk opens with brief introduction to IoT types of attacks and vulnerabilities, over the five IoT verticals of 1. wearables 2. connected cars 3. connected homes 4. connected cities 5. industrialExample attacks are given for each of the verticals. Expand on the IoT specifics of how devices are developed, including issues such as reused code, crypto limitations as well as re-used firmware. The talk continues with connection to how IoT utilizes the cloud for data storage, type of data and how the cloud is overlooked in most IoT security issues. Scripted (or live) demos are now shown with several IoT devices, exploring attack methodologies and details of the attack surface presented by most IoT devices. Connect with IoT security development and OWASP methodologies, especially related to APIs and Big Data (in the cloud). Examples are shown using live data and Shodan (recorded scripts in case of live demo failure or connectivity issues) Final section of talk expands on IoT honeypots with several examples showing SCADA devices, routers and webcams. A recorded example of “Iot_Reaper” was actually caught by a custom honeypot and will be shown in this part of the talk. Conclusions of better methods for development of IoT but at the same time, how to better protect against weaponized IoT devices when your company is the target. The entire talk uses live examples or recorded scripts and shows real-world scenarios with a variety of devices. A win-win for this talk is that attendees not only learn, but they walk away with tools and methods that are practical and can be put into use immediately.
I will be going over a list of definitions, tools that fit each category, and open source variants that fit each (if available). I will be also going over the good, bad, and ugly of new/emerging technology.
My topic will cover legeraging cloud technology to create self healing and self expanding cyber weapons by leveraging technology like openstack and salt
To achieve maximum effectiveness and efficiency, IT organizations need to be agile. In a highly technical environment with a strict governance structure, it is difficult for managers and leaders to attain agility and maximize the resident talent within their organizations. Steve Corcoran a retired Marine Colonel with 28 years of experience in critical organizations and currently the serving Chief of Cyber Strategy for a top 25 cyber company brings a fresh perspective on how to achieve maximum effectiveness and efficiency. Steve’s military and civilian experience in innovative organizations with critical support functions provides for an interesting and insightful way for organizations to structure their leadership practices to become a high performing organization. In his presentation he brilliantly presents:
What is a high performing IT organization?
Why is agility so important for IT?
What is a high performing IT leader?
How can organizations adopt high performing IT leader skills?
What are some of the barriers to implementation?
What are the results of high performing IT leadership?
At the end of his presentation, audiences are always left with a lot to consider and useful practices and techniques to adopt immediately that will have an immediate effect on morale and productivity.