View
 

BsidesSeattle2015

Please Go here for 2017 DATA:   

http://www.securitybsides.com/w/page/112154857/BsidesSeattle2017

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

 

When: 

February 20, 2016  

 

Doors open:

 

8:00 am - 5:30 pm

 

 

Where: 

 

The Commons Mixer Building 
15255 NE 40th Street

Redmond, WA  

98052.


SponsorAgreement.pdf  

 

 

Presentations


 

 


 

TICKETS:

 

 

https://www.eventbrite.com/e/bsides-seattle-2015ish-tickets-19822367234

 

 

Invite your friends by posting this on Twitter: #BSidesSeattle 

Follow @BsidesSeattle for updates! 

 

Questions?

 

hit up:  

@BsidesSeattle

or

[email protected]

 

 Schedule:

 


 


Sponsors

 

Want to show your support for an awesome event? 

Details found here:

2015BSidesSeattleSponsorshipKit.pdf

Sponsorship Agreement.pdf

 

 

 

Core Supporters


 

"Now Hiring for the Seattle Red Team!"

 

Community Supporters

 

 

 

 

 

Tags for flickr, twitter, blog, etc.

Please use the tag #BsidesSeattle for content related to this event 

 

Planners

 

  • Josh M (@nerd_monkey)

  • Magen W (@tottenkoph)

 

 

 

 

 

 

 

 

Offensive Defense Print E-mail

Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.

Comments (0)

You don't have permission to comment on this page.