ABCDEFGHIJKLMNOPQRSTUVW
1
TrackOrderActual Order/TimeApprox Time.Speaker:Talk Title:Level:Description:Approx Length:Notes
2
Intro0n/a1400Nick StolerWeb safety: Don't be low-hanging fruitBeginnerNSA makes headlines, but what'll bite you is your everyday Russian mobster. I'll go over the basic tools and techniques that will keep you safe from the vast majority of attacks and malware.5-15 min?
3
Intro111430Zak ZebrowskiOffensive & defensive techniques for web user identityIntermediateHttp://opensecuritytraining.info/WebIdentity.html60 minutes
4
Intron/a1530haxwithaxereduced derp wifiAny leveloverview of major wifi vulnerabilities and general mitigation30 minutes
5
Intro361600Xavier BelangerUsing DNSSECAny levelWhat is DNSSEC, how it works, and to install your own DNSSEC local resolver20-30 minutes
6
Intro431630Karen ReillyIntroduction to TorAny level10 minutes
7
Intro5n/a1650Christopher HermanceProtecting Windows with encryption and PKIIntermediateHow to secure your windows systems using Bitlocker, TPM, and self signed and public certs at no cost.30 minutes
8
Intro6n/a1720Ben the PyrateEncrypted email with OpenPGPIntermediateI will talk about the basics of using OpenPGP to encrypt and sign email, and discuss how to install and configure it in some common use cases. Eg, Thunderbird with Enigmail, or Gmail with End-to-End.20-30 minutes
9
Intro771800nellBitcoin Any levelA talk on cryptocurrency technology and how to setup cold storage for safely securing your coins. Advise bringing atleast an 8gb usb thumb drive. 40 min
10
IntroClass / sessionn/a1845Kaytee NesmithProtect your calls with encrypted voIP appsAny levelLearn about SIP clients and how to use Linphone (iOS) or CSipSimple (Android) to encrypt your calls...all while participating in usability research so we can make these apps better! One person at a time, 20-30 minutes
11
12
Advanced001400Arshad Noor *Regulatory Compliant Cloud Computing and FIDO Alliance in web appsIntermediateA three part talk: Regulatory Compliant Cloud Computing (RC3): a paradigm-shift for secure cloud computing. FIDO: Strong-authentication for the masses - is it finally here? FOSS DEMO: RC3 + FID.60 minutesVideo conference (GoToMeeting)
13
Advanced1n/a1500Joe KleinImpact of time attacks on cryptoAny levelCrypto has a strong dependency on time, which when modified disables and disrupts all known crypto systems. We will discuss how time attacks work, how to detect and how to defend against.20-30 min
14
Advanced221530Hank LeinigerPathWell: Password Topology Histogram Wear-LevelingAny levelMake passwords 5-6 orders of magnitude harder to crack60 minutes
15
Advanced351630Lindsay BeckOpen Tech FundIntermediate-AdvancedCurrent secure communications projects & funding application process45 min
16
Advanced441730Mark BristowWe’re all gonna die!: How APT will attack the SCADA IoT and spark a new CyberWar where we will need threat intelligence to do information sharingAny levelNo, not really. This is a look at real world issues facing our most critical assets and what we need to do to fix them (or not).60 minutes
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96