Wed, January 18, 2017
8:30am – 12:00 noon
Expedient/Tree of Life, Upper Arlington
PARKING NOTICE – Please park in the lot immediately to your right as you pass the entrance gate.
Member – Free
Non-Member – $20
08:30 – 09:00 – Registration with light breakfast
09:00 – 09:50 – Valerie Thomas
Title: Confessions of a Social Engineer: My Dirty Tricks and How To Stop Them
Abstract: You won’t find these attack signatures in any IDS. Firewall rules are useless against me. Social engineers use persuasion, deception, and influence to bypass technical controls by exploiting the human behind them. As a security consultant I’ve utilized social engineering in penetration tests for years. Join me and learn how I’m owning your networks and obtaining your sensitive data.
Bio: Valerie Thomas is an Executive Information Security Consultant for Securicon LLC that specializes in social engineering and physical penetration testing. After obtaining her bachelor’s degree in Electronic Engineering, Valerie led information security assessments for the Defense Information Systems Agency (DISA) before joining private industry. Her unique Defense and civilian background provides her with a solid understanding of intrusion detection, data loss prevention, and endpoint (in)security. Her electronic and RFID training became a crucial element of her physical security specialization. While some choose to focus on cyber of physical security, she has chosen to exploit the weaknesses of the combination of the two.
Valerie is the coauthor of “Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats” with Bill Gardner. Throughout her career, Valerie has conducted penetration tests, vulnerability assessments, compliance audits, and technical security training for executives, developers, and other security professionals. She has provided briefings and workshops for DEFCON, Derbycon, Blackhat, and multiple BSides events.
10:00 – 10:50 – Bobby Kuzma
Title: Embedded Device Hacking
Abstract: Join Core Security’s Bobby Kuzma as he demonstrates techniques for analyzing embedded, network enabled devices for security vulnerabilities, and introduce the tools and methodologies for conducting effective security assessments on novel devices.
You’ll learn the best tools to get started with, and learn from Bobby’s extensive mistakes in getting started in hardware reverse engineering.
Bio: Bobby Kuzma is a CISSP, security geek, and retired IT consultant. If it processes data, he’s probably tried to make it do bad things. He teaches, mentors, and explores (and occasionally explodes) things. When not spelunking through the infosec underworld, Bobby is a systems engineer with Core Security Technologies.
11:00 – 11:50 – Ed McCabe
Title: State of the Union of InfoSec
Abstract: State of the Union of InfoSec
Bio: My focus for the past 20 years has been aiding and assisting in the development and management of information security compliance programs to meet regulatory and statutory requirements while ensuring alignment with business needs and organization’s vision and focus.
11:50 – 12:00 – Closing Comments