Opening Ceremony
All of Your Compliance Needs with One Methodolgy
Jim Czerwonka
Lockade: Electronic Games for Locksport
Adrian Crenshaw
What's Hiding in Your Software Components? Hidden Risks of Component-Based
Software Development: Seeing the Forest Through the Trees
Ryan Berg (No show?)
Mining Data from the Windows Registry
Jason Hale
Identity Theft: Who's in YOUR Wallet?
Richard Starnes & Rick Nord
Mobile Telephony for InfoSec Practitioners
Daniel Helton
A Crosswalk of the Department of Defense (DoD) Information Assurance
Certification and Accreditation Process (DIACAP)
John McLain
Building an Enterprise DDoS Mitigation Strategy
Mitchell Greenfield
Practical interception of mobile device traffic
Jeremy Druin
Changing What Game- One Future for Information Security
Michael Losavio
Trash Talkin - IT Audit Guide to Dumpster Diving
John Liestman
Linking Users to Social Media Usage on Android Mobile Devices
Ryan Ferreira
Origin of CyberSecurity Laws - An Insider's Story
Steve Riggs
A Place at the Table
Kristen Sullivan
What your Web Vulnerability Scanners Aren't Telling You
Greg Patton
ISSA Awards
Creating the Department of How: Security Awareness that makes your company
like you.
Ira Winkler
Are You Really PCI DSS Compliant? Case Studies of PCI DSS Failure!
Jeff Foresman
Where does Data Security fit into the Data Quality strategy?
Michael Vincent
Closing Ceremony
Downloads
https://archive.org/details/LouisvilleInfosec2014