Keep Security Weird & Scary - 2015
Event details
When: 12th & 13th, March, 2015
WEDS Evening Mar 11th 5pm-8pm - At the Wingate Round Rock Hotel Bar
OWASP/ISSA/BSides Security Social sponsored by:
Where: WinGate Williamson Conference Center Round Rock, TX. (Austin burb)
Cost: $15 per day
$5 discount to ISSA and InfraGard members
STUDENTS and MILITARY:
If you are a student or Military with a valid ID, you will get in for FREE !!! Just send us an email to BSidesAustin (at) Gmail.com.
Latest information, updates, LODGING and Schedule is on our main website:
-
Invite your friends by posting this on Twitter: "#BSidesAustin March, 12-13,2015: Keep Security Weird & SCARY"
Registration Open - Reserve your spot HERE:
KEYNOTE:
TEN CRAZY IDEAS FOR FIXING SECURITY
-Wendy Nather
The security industry is growing like never before — not just in the number of startups and ideas, but in investments and valuation. And yet some of these “new ideas” seem awfully familiar (don’t IOCs sound a lot like signatures to you?). The number of breaches isn’t decreasing; vulnerabilities are discovered on a daily basis, sometimes after having been around for decades. Maybe what we need is some outside-the-sandbox thinking. In this session, 451 Research director Wendy Nather will throw out the data from over 1,000 security vendors and start fresh with some ideas so crazy, they just might work. No sacred cows will be admitted to the keynote except in the form of BBQ brisket.
Thursday Followup KEYNOTE:
-Jay McLaughlin
Title: Faces of Fraud: How Cybercriminals are Attacking Financial Institutions
The virtual branch is the financial institution¹s franchise. But satisfying the experience of your valuable customers while protecting against the latest threats brings new challenges in securing this critical channel. Cybercrime has transformed into a sophisticated, billion-dollar industry, and high-risk targets need to develop a security posture that can scale to the volume and maturity of cyber-attacks being carried out. Multi-layered security solutions are needed to protect your virtual branch from fraud - but what does this even mean? This session will highlight tools and best practices on pressing issues - account takeover, social engineering, neural network monitoring, and emerging payments. Join this session to hear Jay McLaughlin, Chief Security Officer for Q2, who will share insights on how to protect against the most persistent and motivated cyber adversaries.
Bio: Jay McLaughlin currently serves as the Chief Security Officer and Senior Vice President for Q2, a provider of premier electronic banking solutions for community focused financial institutions. In this role, he is responsible for the delivery and execution of the organization¹s overall security strategy. Jay brings more than 15 years of technology and security experience within the financial services. McLaughlin, a well-regarded thought leader, is known throughout the industry as a go-to expert for security. His dynamic, balanced, insightful presentations and writings cover a wide range of security topics. He is highly visible and frequently speaks at industry conferences and summits. He's been featured and quoted in various publications including ComputerWorld, CIO Magazine, American Banker, and the ABA Banking Journal. In 2010, ComputerWorld selected and recognized him as a Premier100 IT Leader for his contributions and leadership over the course of his career. Jay is a CISSP (Certified Information Systems Security Professional) and holds a Bachelor of Science degree in Management Information Systems from the University of Central Florida.
Friday KEYNOTE:
-Reuben Paul
WORKSHOPS/TRAINING:
- Weds March 11th - Postpones until later in the year in association with Austin ISSA
Follow the schedule as it develops:
-
BSidesAustin Speakers & Schedule
LockPick Village:
Sponsors
BSidesTexas Statewide Sponsors:
Engaging the Audience BSidesAustin Sponsors:
Above and Beyone BSidesAustin Sponsors:
Core BSidesAustin Sponsors:
Contributing BSidesAustin Sponsors:
BEER Sponsor:
Shwagg - Door Prize Sponsors:
Schedule
Visit our schedule page for the final schedule 2 weeks prior to the Con and up to the Con - http://bsidestexas.blogspot.com/p/austinschedule.html
Planners
Volunteers
Participants
Name |
Twitter/Email |
Day 1 |
Day 2 |
|
|
|
|
Task List
(please -cross out- when it's done)
Tech
Wifi
Projector, White Boards
Photo
Video
Audio
Streaming or Stickam or Skype or Ustream or Livestream
Non-tech
Breakfast
Lunch
Coffee/Tea
Tables and chairs
Tags for flickr, twitter, blog, etc.
Please use the tag #BsidesAustin for content related to this event
Who's blogging?
Comments (0)
You don't have permission to comment on this page.