April 13, 2019
To become a speakerSIGN UP
Edward MiroRideshare OSINT - Car Based SE For Fun & Profit
Like many, I have used rideshare apps to make money between gigs and full time employment. With the right conversation techniques and strategic staging locations, this is a hugely untapped SE vector and information source for target intelligence. It's also an ideal laboratory for those looking to practice and implement social engineering basics and hone 'soft skills'. With over 500 passengers and a 5 star rating, I will share some of the discoveries I've made in this arena and the skills that work.
Kent HastingsOpen Source Solutions for Election Security
After the "hanging chads" trouble in Florida during the Gore/Bush 2000 election, some suggested replacing paper and punchcards with online and touchscreen machines to automate voting and insure the integrity of the selection. That solution is perhaps less accountable unless properly designed.
Zachary MinnekerFrute: a fuzzer/brute forcer
In this talk, I'm going to go over the motivation for building a brute forcing tool, talk about languages and why I chose Go for frute, talk a little bit about Go itself just to sort of hammer home a point about that choice, and then talk about the development of the tool itself. I'm going to talk about the challenges that came up during the development of the tool, how I overcame them, and how frute has worked out in competition use.
Herbert Spencer, TraitWareReducing the Human Error During a Login
TraitWare® ties the user to the login and eliminates usernames and passwords, which secures and simplifies the user's digital life. TraitWare’s product employs a simple and secure login solution, providing multi-factor login options based on the security desired. Competitive solutions remain layered on the existing username and password model. TraitWare eliminates usernames and passwords by using a secure confidential capture of a user’s unique digital traits and differentiates a user’s device to 1 in 300 billion. With TraitWare, credentials cannot be stolen, lost, or phished.
Lisa Stein, Coastal Business SystemsHow SHARP products connect to an Active Directory to become a secure device
THE MAP and SHARP security features on MFPs and how they benefit each company
Stephan LonisCommunications in a GRID Down Scenario and Why old technology standards prevail in the face of emerging technologies during a disaster. (Ham Radio Talk-Packet Radio)
Among other threats faced everyday in the information security field California is unique in that in recent years we've been faced with devastating wildfires. Technology we depend on can be brought to a halt at a moments notice during a major disaster. In this talk I would like to go over packet radio from a ham radio perspective and how it is used in the face of a disaster when all other infrastructure is down. I will also touch on topics I have learned in my amateur radio journey in respect to RF signal analysis, antennas, software available and, new and exciting digital modes coming out.
Aaron WilliamsOld School Technical Surveillance & Countermeasures
An overview of technical surveillance threat models, methods, technologies, and countermeasures.
Victor TorresHow to win the National Cyber League
The National Cyber League is a capture the flag competition that takes place every semester for college students. There are two parts to the competition, solo and as a team. In fall 2018 I placed 1st in the solo competition, and in the team competition my team placed 1st. I will be going over how I started out in this field, and the skills I developed that led me to victory.
To become a speakerSIGN UP