Hacker Halted USA 2012

Topic Abstracts

“Open Source Intelligence – What Color Underwear are you wearing today?”
“Presenting a Hard Target to Attackers – Roadmap to Securing Your Enterprise”
“Hackers:...

Technology, Computer Science

Submit new post
Thank you for posting.
Share it:
More

Topic Abstracts

“Open Source Intelligence – What Color Underwear are you wearing today?”
“Presenting a Hard Target to Attackers – Roadmap to Securing Your Enterprise”
“Hackers: responsibility and reality”
“Strategies for Web Application Security at Scale”
“Solving the Cyber Security Hiring Crisis DHS and the Great Talent Search”
“BioHacking”
“Using Information Superiority to win the Cybersecurity Battle”
“How to Make End Users Smarter About Security”
“Counter Exploitation of Cyber Threats”
“Tenacious Diggity – Skinny Dippin’ in a Sea of Bing”
“How to create an Open Source multi-OS interoperable microSD/USB drive live distribution with encrypted data storage, forensics capabilities and remote backup”
“Advanced SQL Injection: IDS/WAF evasion”
“Winning the Security Awareness Game”
“House of cards - How not to collapse when bad things happen”
“Bulletproof Network Security”
“The Next Generation of DGA-based Crimeware”
“Go with the Flow: Strategies for successful social engineering”
“The Persistent Threat of Mobile Apps – Why Continuous Testing is Key”
“Zombie Browsers, spiced with rootkit extensions”
“Mobile Hardware Hacking with Raspberry Pi”
“Building a Live Hacking Target Range”
“Breaking SAP Portal”
“Advanced Industrial Espionage Attacks”
“What you don't know can hurt you!”
“Physical Drive-by Downloads - An Android Modders Weakness”
“Attacking Apache Reverse Proxy”
“Hacking The Big Four Databases”
“Hacking Back In Self-Defense: How Can I Do It Legally?”
“Riding on Cloud 9 – Holistic Security for a Euphoric Cloud Experience”
"Security and Software-defined Networks"
“FedRAMP - How the Feds Plan to Manage Cloud Security Risks”
Bring Your Own Destruction
A Perfect Cyber Storm is Brewing – and We Are Not Prepared
“The Cloud Whisperer: What Security Secrets is your Cloud not disclosing?”
“How to successfully get your Cloud through FedRAMP, PCI, and HIPAA”
“Architecting and Building a Secure Virtual Infrastructure and Private Cloud”
“Software Threat Modeling for the Cloud”
“Own the Network - Own the Data”
“Security 360”
“Advanced Persistent Pentesting: Fighting Fire with Fire”
“Delivery Is Everything: Case Studies in Presenting Penetration Test Findings”
“DGAs and Cyber-Criminals: A Case Study”
“Spawnning Reverse Shell With Any IP , Any Time!”
“Hacking SCADA Systems - 2011 Year in Review”
“Military Targeting Adapted for Hacking”
“Enemy behind the Firewall: Trust, Tools, Threat”
“Exploiting Routers for Fun and Profit”
“Using HTTP headers pollution for mobile networks attacks”