These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to Oddjob, Glenn, Jordan, Tim, Will, Mike, Nathan, Chris and Branden for helping set up AV and record.
Track 1
Opening Ceremonies
Rethinking the Trust Chain: Auditing OpenSSL and Beyond
Kenneth White
Actionable Threat Intelligence, ISIS, and the SuperBall
Ian Amit
Security Culture in Development
Wolfgang Goerlich
Simulating Cyber Operations: "Do you want to play a game?"
Bryan Fite
Hacking IIS and .NET
Kevin Miller
User Awareness, We're Doing It Wrong
Arlie Hartman
Departmentalizing Your SecOps
Tom Gorup
Shooting Phish in a Barrel and Other Terrible Fish Related Puns
Amanda Berlin
ZitMo NoM - Clientless Android Malware Control
David Schwartzberg
Data Loss Prevention: Where do I start?
Jason Samide
Reducing Your Organization's Social Engineering Attack Surface
Jen Fox
1993 B.C. (Before Cellphones)
Johnny Xmas
Building a Comprehensive Incident Management Program
Owen Creger
Is that a
PSVSCV in your pocket
Jake Williams
Analyzing the Entropy of Document Hidden Code
Adam Hogan
Making Android's Bootable Recovery Work For You
Drew Suarez
Does anyone remember Enterprise Security Architecture?
Rockie Brockway
Track 2
Ruby - Not just for
hipster
Carl Sampson
Configure your assets, save your butt
Caspian Kilkelly
Digital Supply Chain Security: The Exposed Flank
Dave Lewis
I Amateur Radio (And
So Can You)
Kat Sweet
Wireless Intrusion Detection System with Raspberry Pi
Chris Jenks
Running Away from Security: Web App Vulnerabilities and OSINT Collide
Micah Hoffman
Lessons Learned from Implementing Software Security Programs
Todd Grotenhuis
Stupid Pentester Tricks - OR - Great Sysadmin Tips! - Done in style of Rocky and
Bullwinkle
Alex Fernandez-Gatti / Matt Andreko / Brad Ammerman (not to be posted)
Findings to date.
Cameron Maerz
Clean Computing: Changing Cultural Perceptions
Emily Peed
(No Sound)
From Parking Lot to Pwnage - Hack?free Network Pwnage
Brent White / Tim Roberts
PlagueScanner: An Open Source Multiple AV Scanner Framework
Robert Simmons
How not to Infosec
Dan Tentler
Hacking the Jolla: An Intro to Assessing A Mobile Device
Vitaly McLain / Drew Suarez
Track 3
Operationalizing Yara
Chad Robertson
An Inconvenient Truth: Security Monitoring vs. Privacy in the Workplace
Ana Orozco
From Blue To Red - What Matters and What (Really) Doesn't
Jason Lang
Using Evernote as an Threat Intelligence Management Platform
Grecs
Surfing the Sea and Drowning in Tabs: An Introduction to Cross-Site Request
Forgery
Barry Schatz
OBAMAS CYBER SECURITY PLAN DISSECTED
Jonathan Thompson
The Hacker Community is Dead! Long Live the Hacker Community!
Bruce Potter
Deploying Honeypots To Gather Actionable Threat Intelligence
James Taliento
How to Budget for IDS
Brian Heitzman
Reverse Engineering Windows AFD.sys
Steven Vittitoe
Nepenthes: Netpens With Less Pain
Andy Schmitz
Do We Still Need Pen Testing?
Jeff Man
Workshops
Your Own Worst Enemy Landing Your First Infosec Gig Despite Yourself - Johnny Xmas
Building an Incident Response Program - Lesley Carhart
Security Auditing Android Apps - Sam Bown
Downloads:
https://archive.org/details/CircleCityCon2015
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek