• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BSidesHuntsville2015

Event Details:

 

When: February 6 & 7, 2015

Where: Dynetics, Inc

Address: 1004 Explorer Blvd, Huntsville, AL 35805

 

Volunteers:

Paul Coggin: @PaulCoggin

Charline Nixon: @CharlineNixon

Russ Ward: 

Dan Nagle: @NagleCode - Web Master

Don Jarmon: @drjarmon

Kevin Miller: @kevinnetguy

Dawn Dunkerly:

Jeremy Conway: @cj3r3my

 

 

SCHEDULE:
FRIDAY, February 6TH – TRAINING – TBA
SATURDAY, February 7TH  – TALKS – TBA

 

Training:

 

Title: Intro to Threat Intelligence

 

Instructor: Robert M. Lee (Twitter: @RobertMLee)

Description: Threat Intelligence has become a sort of buzz term - but what exactly is it? How do you take advantage of it? And what does it really mean to do Intelligence analysis in the digital domain?  This class will answer these questions and more as students learn analysis skills and gain an understanding of Intelligence tradecraft that can be made applicable to any type of work - especially network security. The training is more analysis based than technical making it understandable by those with varying backgrounds. In the course students will be exposed to various case-studies to break apart intrusion analysis and threat intelligence reports and learn how such reports are made. Lastly, students will be given an opportunity to perform Open Source Intelligence (OSINT) to practice the skills hands-on.

Requirements: A laptop is required to participate in the hands-on lab but is not required to attend the course. The laptop should have at least 4Gb of RAM and have VMware Workstation, VMware Player, or VMware Fusion installed.

 

Title: CybatiWorks "Mission: Control Systems"

 

Instructor: Matt Luallen (Twitter: @CYBATTI)

 

Description:  Control systems envelop our modern world (Industrial Control) and are rapidly expanding (Internet of Things/Everything/Lawnmowers/Plants).  As we embark on this next generation of interconnectedness how do we make sure that attacks against spreadsheets, powerpoints and databases does not expand to cycling your home's or businesses' Internet-connected HVAC.  This session will give participants a rapid-fire introduction in to control systems, where they are, how they communicate, the attack surface and mitigating control opportunities.  The day will end with an active offense / defense exercise.

Requirements: Participants will operate in groups of 2 - all equipment will be provided (laptops and industrial devices). 

 

Registration for training 2/6/15 and conference 2/7/15 : https://www.eventjoy.com/e/bsides-huntsville-550505

The 2/6/15 training course ticket cost is $25 and does not include lunch.

The 2/7/15 conference ticket cost is $10 and includes lunch.

 

CALL FOR PAPERS IS NOW OPEN UNTIL December 1,  2014!  

PLEASE SEND ALL SUBMISSIONS TO bsideshuntsville<at>yahoo<dot>com

 

Topics of Interest:

Vulnerabilities

ICS\SCADA

Telecommunications

Threat Intelligence

Incident Handling \ Incident Response

Digital Forensics

Network Infrastructure

Critical Infrastructure

Exploits

Reverse Engineering

Tool Development

Secure Coding

Application Security

Database Security

Wireless

New Technologies

Cryptography 

Python, Ruby etc....

Mobile Security

Malware 

Monitoring and Analysis

 

Key Note Speaker: Robert M. Lee  @RobertMLee

 

 

Sponsors

  

      

 

     

 

        

 

 

 

 

 

 

 

 

 

 

 

 

Sponsors make BSidesHuntsville possible, and we appreciate all levels of sponsorship. 

Please contact us at bsideshuntsville<at>yahoo<dot>com if you are interested in sponsoring.

 

Questions? Email us at bsideshuntsville<at>yahoo<dot>com

Follow us on Twitter: @BSidesHSV

 

 

Comments (0)

You don't have permission to comment on this page.