View
 

BSidesDenverTalks

(Related Pages ::BSidesDenver)

 

Call For Presenters (CFP)

 

BSides Denver will have two tracks (with "availability" for additional, ad-hoc talks that come up during the event). The first track will be talks voted on/confirmed before the event; the second track will be done Barcamp style, wherein talks will be announced on the first day and voted up on-the-spot.  The second track is ideal for round-table type discussions.

 

 

Talks

 

Please update with your: name, contact information (email, twitter, website), presentation title, and short description.  Please leave use the example text as a template.  Simply copy and paste it into a new entry, then edit it to fit your talk.   

 

  • Name: (Name)  (link/twitter info)
  • Title: TItle
  • Abstract: Abstract of presentation

 

   

Comments (9)

Peter Schawacker said

at 5:24 am on Apr 23, 2010

Name: Peter Schawacker @psalchemy www.alchemysecurity.com/
Title: Peter Schawacker- Agile Security, SOC and how Mortman/Hutton ruined my summer vacation
Abstract: This talk is about organizing unmanageable people to accomplish impossible tasks. In it I talk about why traditional project management approaches almost always fail, especially when it comes to security. There's been some discussion of Agile software development, but not so much about its application to other domains. I've been using Agile to build and security operations centers and manage teams of analysts. Think of this as a how-to for effective cat herding, security requirements analysis and managing by not managing.

Tim Skorick said

at 10:22 am on Apr 23, 2010

Name: Tim Skorick
Title: Browser Extension Malware
Abstract: In an age in which the PC exists almost exclusively for web use whether at work or at home, malware authors no longer have to puzzle how to trojan a computer: the browser offers fewer impediments, has an API that publishes every object they could possible want to hook, and contains the user's entire work and play experience. Add to that varying failures in client-side or enterprise-level controls and you have the perfect breeding ground for a growing species of malware.

Steve Pordon said

at 1:08 am on Apr 30, 2010

Name: Steve Pordon
Title: Defeating High Security Locks: An Overview
Abstract: Intermediate-level overview of how high security locks work, and how to defeat them. Assumes basic lockpicking knowledge and concepts (shear line, tension, etc.), but will include a 2-minute refresher for those who need it. Emphasis will mainly be on high security pin-tumbler locks--ASSA Twin, Medeco Biaxial, Schlage Primus, and similar sidebar locks--with some discussion of disc locks (Abus, Abloy).

Jerry said

at 9:55 pm on May 13, 2010

Name: Jerry Gamblin (www.twitter.com/jgamblin)
Title: Implementing Security Awareness: Your Users Are Not Idiots
Abstract: I sometimes feel that security professionals treat their end users with a level on slightly above contempt. Why is that and what can we do to be better about educating our end users and keeping our networks secure?

Daniel Molina said

at 5:45 am on May 28, 2010

Name: Daniel J. Molina, @DJMolina / [email protected]
Title: Top 10 Ways IT is Enabling Cybercrime
Abstract: Today's IT departments, unbeknownst to themselves, are empowering cybercrime by their own actions. Daniel Molina presents The TYop 10 Things that your IT department is doing, that enables cybercrime in your own company.

Megan Knox said

at 2:46 pm on May 28, 2010

Name: Erin Jacobs @SecBarbie
Title: Compliance Crystal Ball – Future trends in risk-based security framework
Abstract:
More often than not organizations structure their internal security framework based almost exclusively upon regulatory and business compliance drivers. Through the discussions and drivers that are occurring in the security community as well as the cross-pollination into the business community, security compliance framework is changing direction. This talk will guide the audience though a history of regulatory compliance focusing on SAS70’s, ISO 2700x, PCI-DSS, HIPAA, SOX, and GLBA. Through this historic analysis, we will extract the known trends and forecast where the future is taking the security compliance landscape.

flyingpenguin said

at 7:34 pm on Jun 2, 2010

Name: Davi Ottenheimer, @daviottenheimer
Title: Cloudy with a chance of security
Abstract: Virtualized computing continues to evolve and bring both pros and cons (pun not intended) to information security. Everything from access controls to logs and forensics is being forced to adapt as IT resources are migrated from physical to virtual. This presentation gives a comparative analysis of the physical and virtual environments to identify key differentiators and risks. It then proposes several new approaches to meet the challenge of security and compliance for virtual systems, especially in clouds.

David Willson said

at 5:21 pm on Jun 3, 2010

Name: [email protected]
Title: "When Does Electronic Espionage Become an 'Act of War' and What Options Do Nations Have to Defend Their Networks?"
Abstract: This presentation will be a combination of my two articles published in the ISSA Journal last August 2009 and this June 2010. I will discuss current cyber threats, how nations have reacted to them, or not, the types of threats, where the line might be drawn between electronic espionage/cyber crime and “acts of war,” the significant challenges nations face, and potential solutions. I will also discuss some more practical security solutions for business to reach beyond their networks to create a greater security posture.

jamey heary said

at 5:17 pm on Jun 16, 2010

* Name: Jamey Heary
* Title: Sneak peak at PCI 2.0 changes
* Abstract: Learn about how PCI works behind the scenes, PCI Proposed Changes for October, PCI Virtualization SIG Update, PCI and Cloud Services, New Guidance on Audio Recordings

You don't have permission to comment on this page.