ºÝºÝߣshows by User: BSides / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: BSides / Mon, 24 Jan 2011 22:45:46 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: BSides Lord of the bing b-sides atl /slideshow/lord-of-the-bing-bsides-atl/6690681 lordofthebing-b-sidesatl-110124224552-phpapp01
Rob Ragan Stach & Liu, LLC]]>

Rob Ragan Stach & Liu, LLC]]>
Mon, 24 Jan 2011 22:45:46 GMT /slideshow/lord-of-the-bing-bsides-atl/6690681 BSides@slideshare.net(BSides) Lord of the bing b-sides atl BSides Rob Ragan Stach & Liu, LLC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lordofthebing-b-sidesatl-110124224552-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rob Ragan Stach &amp; Liu, LLC
Lord of the bing b-sides atl from Security B-Sides
]]>
12164 3 https://cdn.slidesharecdn.com/ss_thumbnails/lordofthebing-b-sidesatl-110124224552-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The road to hell v0.6 /slideshow/the-road-to-hell-v06/4919436 theroadtohellv0-6-100807030620-phpapp01
]]>

]]>
Sat, 07 Aug 2010 03:06:11 GMT /slideshow/the-road-to-hell-v06/4919436 BSides@slideshare.net(BSides) The road to hell v0.6 BSides <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/theroadtohellv0-6-100807030620-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
The road to hell v0.6 from Security B-Sides
]]>
1407 3 https://cdn.slidesharecdn.com/ss_thumbnails/theroadtohellv0-6-100807030620-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2010 07 BSidesLV Mobilizing The PCI Resistance 1c /slideshow/2010-07-bsideslv-mobilizing-the-pci-resistance-1c/4919434 201007bsidesmobilizingpciresistance1c-100729112009-phpapp01-100807030457-phpapp01
]]>

]]>
Sat, 07 Aug 2010 03:04:52 GMT /slideshow/2010-07-bsideslv-mobilizing-the-pci-resistance-1c/4919434 BSides@slideshare.net(BSides) 2010 07 BSidesLV Mobilizing The PCI Resistance 1c BSides <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/201007bsidesmobilizingpciresistance1c-100729112009-phpapp01-100807030457-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
2010 07 BSidesLV Mobilizing The PCI Resistance 1c from Security B-Sides
]]>
556 2 https://cdn.slidesharecdn.com/ss_thumbnails/201007bsidesmobilizingpciresistance1c-100729112009-phpapp01-100807030457-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical Approach Towards Decision Making) /slideshow/tastes-great-vs-less-filling-deconstructing-risk-management-a-practical-approach-towards-decision-making/3909065 deconstructingriskmanagement-100429191300-phpapp01
Just as there are two sides to every coin, there are two schools of thought in risk management. One camp believes that there is never enough data to make statistically significant risk decisions, due to the unknown-unknowns and never really knowing the entire population of data breaches. Another camp believes that we have well detailed information about specific domains and using Bayesian math we can come to conclusions on how to manage risk. Regardless of the group or believe in risk management the fact is that we all manage risk. This session will discuss the two camps and propose a hybrid model that goes beyond technical details into the core of trusted knowledge relationships.]]>

Just as there are two sides to every coin, there are two schools of thought in risk management. One camp believes that there is never enough data to make statistically significant risk decisions, due to the unknown-unknowns and never really knowing the entire population of data breaches. Another camp believes that we have well detailed information about specific domains and using Bayesian math we can come to conclusions on how to manage risk. Regardless of the group or believe in risk management the fact is that we all manage risk. This session will discuss the two camps and propose a hybrid model that goes beyond technical details into the core of trusted knowledge relationships.]]>
Thu, 29 Apr 2010 19:12:32 GMT /slideshow/tastes-great-vs-less-filling-deconstructing-risk-management-a-practical-approach-towards-decision-making/3909065 BSides@slideshare.net(BSides) Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical Approach Towards Decision Making) BSides Just as there are two sides to every coin, there are two schools of thought in risk management. One camp believes that there is never enough data to make statistically significant risk decisions, due to the unknown-unknowns and never really knowing the entire population of data breaches. Another camp believes that we have well detailed information about specific domains and using Bayesian math we can come to conclusions on how to manage risk. Regardless of the group or believe in risk management the fact is that we all manage risk. This session will discuss the two camps and propose a hybrid model that goes beyond technical details into the core of trusted knowledge relationships. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/deconstructingriskmanagement-100429191300-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Just as there are two sides to every coin, there are two schools of thought in risk management. One camp believes that there is never enough data to make statistically significant risk decisions, due to the unknown-unknowns and never really knowing the entire population of data breaches. Another camp believes that we have well detailed information about specific domains and using Bayesian math we can come to conclusions on how to manage risk. Regardless of the group or believe in risk management the fact is that we all manage risk. This session will discuss the two camps and propose a hybrid model that goes beyond technical details into the core of trusted knowledge relationships.
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical Approach Towards Decision Making) from Security B-Sides
]]>
719 2 https://cdn.slidesharecdn.com/ss_thumbnails/deconstructingriskmanagement-100429191300-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Social Penetration - Mike Murray and Mike Bailey /BSides/social-penetration-mike-murray-and-mike-bailey bsidessf2010-socialpenetration-100314222322-phpapp01
Advanced exploitation on social networks. Not a social engineering talk, nor a talk about technological exploitation: the combination of exploits against people and technology all in one place.]]>

Advanced exploitation on social networks. Not a social engineering talk, nor a talk about technological exploitation: the combination of exploits against people and technology all in one place.]]>
Sun, 14 Mar 2010 22:23:13 GMT /BSides/social-penetration-mike-murray-and-mike-bailey BSides@slideshare.net(BSides) Social Penetration - Mike Murray and Mike Bailey BSides Advanced exploitation on social networks. Not a social engineering talk, nor a talk about technological exploitation: the combination of exploits against people and technology all in one place. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidessf2010-socialpenetration-100314222322-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Advanced exploitation on social networks. Not a social engineering talk, nor a talk about technological exploitation: the combination of exploits against people and technology all in one place.
Social Penetration - Mike Murray and Mike Bailey from Security B-Sides
]]>
1156 5 https://cdn.slidesharecdn.com/ss_thumbnails/bsidessf2010-socialpenetration-100314222322-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How really to prepare for a credit card compromise (PCI) forensics investigation: A ex-QIRA speaks out - David Barnett /slideshow/how-really-to-prepare-for-a-credit-card-compromise-pci-forensics-investigation-a-exqira-speaks-out-david-barnett/3373080 pciforensicwhatyoudontknow-100309023532-phpapp02
Reviewing cases ranging in size from your neighborhood bar to the massive TJX case, an ex-QIRA will discuss the dirty inside secrets of the card associations and QSA's. Reviewing lessons learned from dozens of past forensic cases, this presentation will highlight how to prepare for a PCI mandated forensics investigation including; what steps should be taken to limit fines and fees, how to ensure you have proper legal representation, how to limit the scope of the investigation, and what questions to ask before deciding on who will conduct the forensic investigation.]]>

Reviewing cases ranging in size from your neighborhood bar to the massive TJX case, an ex-QIRA will discuss the dirty inside secrets of the card associations and QSA's. Reviewing lessons learned from dozens of past forensic cases, this presentation will highlight how to prepare for a PCI mandated forensics investigation including; what steps should be taken to limit fines and fees, how to ensure you have proper legal representation, how to limit the scope of the investigation, and what questions to ask before deciding on who will conduct the forensic investigation.]]>
Tue, 09 Mar 2010 02:35:18 GMT /slideshow/how-really-to-prepare-for-a-credit-card-compromise-pci-forensics-investigation-a-exqira-speaks-out-david-barnett/3373080 BSides@slideshare.net(BSides) How really to prepare for a credit card compromise (PCI) forensics investigation: A ex-QIRA speaks out - David Barnett BSides Reviewing cases ranging in size from your neighborhood bar to the massive TJX case, an ex-QIRA will discuss the dirty inside secrets of the card associations and QSA's. Reviewing lessons learned from dozens of past forensic cases, this presentation will highlight how to prepare for a PCI mandated forensics investigation including; what steps should be taken to limit fines and fees, how to ensure you have proper legal representation, how to limit the scope of the investigation, and what questions to ask before deciding on who will conduct the forensic investigation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pciforensicwhatyoudontknow-100309023532-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Reviewing cases ranging in size from your neighborhood bar to the massive TJX case, an ex-QIRA will discuss the dirty inside secrets of the card associations and QSA&#39;s. Reviewing lessons learned from dozens of past forensic cases, this presentation will highlight how to prepare for a PCI mandated forensics investigation including; what steps should be taken to limit fines and fees, how to ensure you have proper legal representation, how to limit the scope of the investigation, and what questions to ask before deciding on who will conduct the forensic investigation.
How really to prepare for a credit card compromise (PCI) forensics investigation: A ex-QIRA speaks out - David Barnett from Security B-Sides
]]>
2796 8 https://cdn.slidesharecdn.com/ss_thumbnails/pciforensicwhatyoudontknow-100309023532-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Risk Management - Time to blow it up and start over? - Alex Hutton /slideshow/risk-management-time-to-blow-it-up-and-start-over-alex-hutton/3373075 huttonb-sidesf-100309023452-phpapp01
Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendancy towards failure, and how to match that up with what management will stomach.]]>

Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendancy towards failure, and how to match that up with what management will stomach.]]>
Tue, 09 Mar 2010 02:34:42 GMT /slideshow/risk-management-time-to-blow-it-up-and-start-over-alex-hutton/3373075 BSides@slideshare.net(BSides) Risk Management - Time to blow it up and start over? - Alex Hutton BSides Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendancy towards failure, and how to match that up with what management will stomach. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/huttonb-sidesf-100309023452-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We&#39;re doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendancy towards failure, and how to match that up with what management will stomach.
Risk Management - Time to blow it up and start over? - Alex Hutton from Security B-Sides
]]>
1439 5 https://cdn.slidesharecdn.com/ss_thumbnails/huttonb-sidesf-100309023452-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security? Who cares! - Brett Hardin /BSides/security-who-cares-brett-hardin bretthardin-bsides-100308013050-phpapp02
In the beginning, people inherently distrusted the Internet, however, Social Networking has changed this. People now enter information without even thinking of how it will affect them. This presentation will explain the shift in trust, with real-life examples, and what we as the security community need to do to change.]]>

In the beginning, people inherently distrusted the Internet, however, Social Networking has changed this. People now enter information without even thinking of how it will affect them. This presentation will explain the shift in trust, with real-life examples, and what we as the security community need to do to change.]]>
Mon, 08 Mar 2010 01:30:42 GMT /BSides/security-who-cares-brett-hardin BSides@slideshare.net(BSides) Security? Who cares! - Brett Hardin BSides In the beginning, people inherently distrusted the Internet, however, Social Networking has changed this. People now enter information without even thinking of how it will affect them. This presentation will explain the shift in trust, with real-life examples, and what we as the security community need to do to change. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bretthardin-bsides-100308013050-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the beginning, people inherently distrusted the Internet, however, Social Networking has changed this. People now enter information without even thinking of how it will affect them. This presentation will explain the shift in trust, with real-life examples, and what we as the security community need to do to change.
Security? Who cares! - Brett Hardin from Security B-Sides
]]>
499 5 https://cdn.slidesharecdn.com/ss_thumbnails/bretthardin-bsides-100308013050-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret) - Will Gragido and John Pirc /slideshow/advanced-persistent-threats-shining-the-light-on-the-industries-best-kept-secret-will-gragido-and-john-pirc/3362616 cassandrasecurityfinalpresosanfranciscosecuritybsides030210final-100308012342-phpapp01
The following lecture will cover very advanced techniques and trade craft of subversive multi-vector threat's (SMT's) and advanced persistent threats (APTs) by two of the world's leading experts in this specific field. It is important to understand that APT's have a long history and though typically not talked about unless you are dealing with Governments, Defense Industrial Base (DIB), research organizations and global financials are all too real. The techniques and tradecraft associated are so mature and diverse, they literally go undetected. Today’s Internet is far more complex, dynamic and diverse than ever before. Because of this fast-paced evolution within the threat landscape these types of attacks (as we predicted in a recent lecture at ToorCon in October 2009 in San Diego, Ca), have swiftly become mainstream. The telemetry of the attack surface knows no bounds and includes any mediums necessary for the completing their operational charter and missions. In most instances, these attacks are sponsored by nation state and sub-national entities either politically or economically motivated. During our discussion, we will address the history and psychology of these cyber actors as it relates to APTs and while advancing in an in-depth discussion on SMT's, crypto-virology, asymmetric forms of information gathering, recent use cases and next generation countermeasures for detecting and defending these types of attacks. Lastly, as we predicted last fall on the rise of the APT's into the mainstream, we will also leave you with yet another prediction of what to expect in the coming year.]]>

The following lecture will cover very advanced techniques and trade craft of subversive multi-vector threat's (SMT's) and advanced persistent threats (APTs) by two of the world's leading experts in this specific field. It is important to understand that APT's have a long history and though typically not talked about unless you are dealing with Governments, Defense Industrial Base (DIB), research organizations and global financials are all too real. The techniques and tradecraft associated are so mature and diverse, they literally go undetected. Today’s Internet is far more complex, dynamic and diverse than ever before. Because of this fast-paced evolution within the threat landscape these types of attacks (as we predicted in a recent lecture at ToorCon in October 2009 in San Diego, Ca), have swiftly become mainstream. The telemetry of the attack surface knows no bounds and includes any mediums necessary for the completing their operational charter and missions. In most instances, these attacks are sponsored by nation state and sub-national entities either politically or economically motivated. During our discussion, we will address the history and psychology of these cyber actors as it relates to APTs and while advancing in an in-depth discussion on SMT's, crypto-virology, asymmetric forms of information gathering, recent use cases and next generation countermeasures for detecting and defending these types of attacks. Lastly, as we predicted last fall on the rise of the APT's into the mainstream, we will also leave you with yet another prediction of what to expect in the coming year.]]>
Mon, 08 Mar 2010 01:23:31 GMT /slideshow/advanced-persistent-threats-shining-the-light-on-the-industries-best-kept-secret-will-gragido-and-john-pirc/3362616 BSides@slideshare.net(BSides) Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret) - Will Gragido and John Pirc BSides The following lecture will cover very advanced techniques and trade craft of subversive multi-vector threat's (SMT's) and advanced persistent threats (APTs) by two of the world's leading experts in this specific field. It is important to understand that APT's have a long history and though typically not talked about unless you are dealing with Governments, Defense Industrial Base (DIB), research organizations and global financials are all too real. The techniques and tradecraft associated are so mature and diverse, they literally go undetected. Today’s Internet is far more complex, dynamic and diverse than ever before. Because of this fast-paced evolution within the threat landscape these types of attacks (as we predicted in a recent lecture at ToorCon in October 2009 in San Diego, Ca), have swiftly become mainstream. The telemetry of the attack surface knows no bounds and includes any mediums necessary for the completing their operational charter and missions. In most instances, these attacks are sponsored by nation state and sub-national entities either politically or economically motivated. During our discussion, we will address the history and psychology of these cyber actors as it relates to APTs and while advancing in an in-depth discussion on SMT's, crypto-virology, asymmetric forms of information gathering, recent use cases and next generation countermeasures for detecting and defending these types of attacks. Lastly, as we predicted last fall on the rise of the APT's into the mainstream, we will also leave you with yet another prediction of what to expect in the coming year. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cassandrasecurityfinalpresosanfranciscosecuritybsides030210final-100308012342-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The following lecture will cover very advanced techniques and trade craft of subversive multi-vector threat&#39;s (SMT&#39;s) and advanced persistent threats (APTs) by two of the world&#39;s leading experts in this specific field. It is important to understand that APT&#39;s have a long history and though typically not talked about unless you are dealing with Governments, Defense Industrial Base (DIB), research organizations and global financials are all too real. The techniques and tradecraft associated are so mature and diverse, they literally go undetected. Today’s Internet is far more complex, dynamic and diverse than ever before. Because of this fast-paced evolution within the threat landscape these types of attacks (as we predicted in a recent lecture at ToorCon in October 2009 in San Diego, Ca), have swiftly become mainstream. The telemetry of the attack surface knows no bounds and includes any mediums necessary for the completing their operational charter and missions. In most instances, these attacks are sponsored by nation state and sub-national entities either politically or economically motivated. During our discussion, we will address the history and psychology of these cyber actors as it relates to APTs and while advancing in an in-depth discussion on SMT&#39;s, crypto-virology, asymmetric forms of information gathering, recent use cases and next generation countermeasures for detecting and defending these types of attacks. Lastly, as we predicted last fall on the rise of the APT&#39;s into the mainstream, we will also leave you with yet another prediction of what to expect in the coming year.
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret) - Will Gragido and John Pirc from Security B-Sides
]]>
1363 7 https://cdn.slidesharecdn.com/ss_thumbnails/cassandrasecurityfinalpresosanfranciscosecuritybsides030210final-100308012342-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Keanini /slideshow/computing-risk-without-numbers-a-semantic-approach-to-risk-metrics-tim-keanini/3362597 bsides-semtech-scoring-100308011925-phpapp02
Scoring methods are highly reliant on mathematics but what do the numbers really mean? W3C semantic standards allow us to create a more direct meaning-based model. Through set theory and description logics, we can compute classification and ranking through ontological-based reasoning. This method finally addresses the multiple viewpoints and perspectives often found within a large enterprise.]]>

Scoring methods are highly reliant on mathematics but what do the numbers really mean? W3C semantic standards allow us to create a more direct meaning-based model. Through set theory and description logics, we can compute classification and ranking through ontological-based reasoning. This method finally addresses the multiple viewpoints and perspectives often found within a large enterprise.]]>
Mon, 08 Mar 2010 01:19:18 GMT /slideshow/computing-risk-without-numbers-a-semantic-approach-to-risk-metrics-tim-keanini/3362597 BSides@slideshare.net(BSides) Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Keanini BSides Scoring methods are highly reliant on mathematics but what do the numbers really mean? W3C semantic standards allow us to create a more direct meaning-based model. Through set theory and description logics, we can compute classification and ranking through ontological-based reasoning. This method finally addresses the multiple viewpoints and perspectives often found within a large enterprise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsides-semtech-scoring-100308011925-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Scoring methods are highly reliant on mathematics but what do the numbers really mean? W3C semantic standards allow us to create a more direct meaning-based model. Through set theory and description logics, we can compute classification and ranking through ontological-based reasoning. This method finally addresses the multiple viewpoints and perspectives often found within a large enterprise.
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Keanini from Security B-Sides
]]>
756 3 https://cdn.slidesharecdn.com/ss_thumbnails/bsides-semtech-scoring-100308011925-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine /slideshow/the-great-compliance-debate-no-child-left-behind-or-the-polio-vaccine/3362590 pci-100308011740-phpapp02
Joshua Corman, Jack Daniel, Anton Chuvakin, Andy Ellis, Michelle Klinger]]>

Joshua Corman, Jack Daniel, Anton Chuvakin, Andy Ellis, Michelle Klinger]]>
Mon, 08 Mar 2010 01:17:31 GMT /slideshow/the-great-compliance-debate-no-child-left-behind-or-the-polio-vaccine/3362590 BSides@slideshare.net(BSides) The Great Compliance Debate: No Child Left Behind or The Polio Vaccine BSides Joshua Corman, Jack Daniel, Anton Chuvakin, Andy Ellis, Michelle Klinger <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pci-100308011740-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Joshua Corman, Jack Daniel, Anton Chuvakin, Andy Ellis, Michelle Klinger
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine from Security B-Sides
]]>
559 4 https://cdn.slidesharecdn.com/ss_thumbnails/pci-100308011740-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dominique Karg - Advanced Attack Detection using OpenSource tools /BSides/dominique-karg-advanced-attack-detection-using-opensource-tools talkbsidessf2010-100308011637-phpapp02
]]>

]]>
Mon, 08 Mar 2010 01:16:35 GMT /BSides/dominique-karg-advanced-attack-detection-using-opensource-tools BSides@slideshare.net(BSides) Dominique Karg - Advanced Attack Detection using OpenSource tools BSides <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/talkbsidessf2010-100308011637-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Dominique Karg - Advanced Attack Detection using OpenSource tools from Security B-Sides
]]>
2229 2 https://cdn.slidesharecdn.com/ss_thumbnails/talkbsidessf2010-100308011637-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2009 Zacon Haroon Meer /slideshow/2009-zacon-haroon-meer/3362587 2009zaconharoonmeer-100308011606-phpapp01
]]>

]]>
Mon, 08 Mar 2010 01:15:57 GMT /slideshow/2009-zacon-haroon-meer/3362587 BSides@slideshare.net(BSides) 2009 Zacon Haroon Meer BSides <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconharoonmeer-100308011606-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
2009 Zacon Haroon Meer from Security B-Sides
]]>
423 2 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconharoonmeer-100308011606-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Enterprise Portals - Gateway to the Gold /slideshow/enterprise-portals-gateway-to-the-gold/2571786 2009zaconiandevilliers-091124015008-phpapp01
Ian De Villiers ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Ian De Villiers ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:49:59 GMT /slideshow/enterprise-portals-gateway-to-the-gold/2571786 BSides@slideshare.net(BSides) Enterprise Portals - Gateway to the Gold BSides Ian De Villiers ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconiandevilliers-091124015008-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ian De Villiers ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
Enterprise Portals - Gateway to the Gold from Security B-Sides
]]>
985 3 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconiandevilliers-091124015008-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From fishing to phishing to ? /slideshow/from-fishing-to-phishing-to/2571775 2009zaconjockforrester-091124014849-phpapp01
Jock Forrester ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Jock Forrester ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:48:46 GMT /slideshow/from-fishing-to-phishing-to/2571775 BSides@slideshare.net(BSides) From fishing to phishing to ? BSides Jock Forrester ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconjockforrester-091124014849-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Jock Forrester ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
From fishing to phishing to ? from Security B-Sides
]]>
548 2 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconjockforrester-091124014849-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Getting punched in the face /slideshow/getting-punched-in-the-face/2571774 2009zaconnickarvanitis-091124014827-phpapp01
Nick Arvanitis ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Nick Arvanitis ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:48:19 GMT /slideshow/getting-punched-in-the-face/2571774 BSides@slideshare.net(BSides) Getting punched in the face BSides Nick Arvanitis ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconnickarvanitis-091124014827-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nick Arvanitis ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
Getting punched in the face from Security B-Sides
]]>
435 7 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconnickarvanitis-091124014827-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Make Tea Not War /slideshow/make-tea-not-war/2571773 2009zaconroeloftemmingh-091124014807-phpapp01
Roelof Temmingh ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Roelof Temmingh ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:48:01 GMT /slideshow/make-tea-not-war/2571773 BSides@slideshare.net(BSides) Make Tea Not War BSides Roelof Temmingh ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconroeloftemmingh-091124014807-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Roelof Temmingh ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
Make Tea Not War from Security B-Sides
]]>
487 4 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconroeloftemmingh-091124014807-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
OWASP Proxy /slideshow/owasp-proxy/2571762 2009zaconrogandawes-091124014742-phpapp02
Rogan Dawes ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Rogan Dawes ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:47:32 GMT /slideshow/owasp-proxy/2571762 BSides@slideshare.net(BSides) OWASP Proxy BSides Rogan Dawes ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconrogandawes-091124014742-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rogan Dawes ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
OWASP Proxy from Security B-Sides
]]>
2328 2 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconrogandawes-091124014742-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Smashing the stats for fun (and profit) /slideshow/smashing-the-stats-for-fun-and-profit/2571761 2009zaconshaundewberry-091124014723-phpapp02
Shaun Dewberry ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Shaun Dewberry ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:47:14 GMT /slideshow/smashing-the-stats-for-fun-and-profit/2571761 BSides@slideshare.net(BSides) Smashing the stats for fun (and profit) BSides Shaun Dewberry ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconshaundewberry-091124014723-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Shaun Dewberry ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
Smashing the stats for fun (and profit) from Security B-Sides
]]>
838 2 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconshaundewberry-091124014723-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Exploitation /slideshow/exploitation/2571757 2009zaconstalker-091124014656-phpapp02
Stalker ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>

Stalker ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/]]>
Tue, 24 Nov 2009 01:46:47 GMT /slideshow/exploitation/2571757 BSides@slideshare.net(BSides) Exploitation BSides Stalker ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconstalker-091124014656-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Stalker ZaCon 2009 http://www.zacon.org.za/Archives/2009/slides/
Exploitation from Security B-Sides
]]>
3920 5 https://cdn.slidesharecdn.com/ss_thumbnails/2009zaconstalker-091124014656-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-BSides-48x48.jpg?cb=1522846915 Security B-Sides is the first grass roots, DIY, open security conference in the world! Expanding the spectrum of conversation one event at a time. securitybsides.org/ https://cdn.slidesharecdn.com/ss_thumbnails/lordofthebing-b-sidesatl-110124224552-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/lord-of-the-bing-bsides-atl/6690681 Lord of the bing b-s... https://cdn.slidesharecdn.com/ss_thumbnails/theroadtohellv0-6-100807030620-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-road-to-hell-v06/4919436 The road to hell v0.6 https://cdn.slidesharecdn.com/ss_thumbnails/201007bsidesmobilizingpciresistance1c-100729112009-phpapp01-100807030457-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2010-07-bsideslv-mobilizing-the-pci-resistance-1c/4919434 2010 07 BSidesLV Mobil...