Endpoint Security Decisions
Kurt Roemer
Consumerization and the proliferation of mobile devices have forever changed
security. Organizations and individuals must adapt to the new security realities
or suffer the consequences of a poor user experience and damaging data breaches.
Endpoint Security Decisions focuses on the key decisions that must be made to
manage endpoint risk and protect organizational and personal interests. This
session highlights the ways that consumerization can be embraced while enhancing
security and promoting innovation.
Project Ubertooth: Building a Better Bluetooth Adapter
Michael Ossmann http://greatscottgadgets.com/
The off-the-shelf Bluetooth adapters didn't do what I wanted, so I built my own.
This is the story of how someone with very little knowledge of electronics
embarked on a project to build a 2.4 GHz wireless development platform and
ultimately succeeded in creating a low cost device that can be used for
Bluetooth sniffing and more. Find out how to build your own Ubertooth One, how
to use it for Bluetooth experimentation and other things, and catch a glimpse of
an exciting future of wireless security research enabled by open source
hardware.
Making Windows 7 SP1 32/64bit Boot CD/DVD/USBs with Winbuilder
Adrian Crenshaw Slides
So you have your Linux boot DVDs, but there are a few Windows tools you must
have. You may have used Bart's PE builder or UBDC4Win before, but Windows XP is
getting long in the tooth. This talk will show how to build your own Windows 7
SP1 32/64bit based boot CD, DVD, or USB flash drive to run Windows only security
and forensics tools from. Also covered will be dual booting it with Backtrack 5
on the same USB or DVD to have even more options.
Cloud Computing Security
Dr. James Walden http://kosh.nku.edu/~waldenj/
Cloud computing is an emerging paradigm for large scale web application
deployment. While cloud computing may reduce the complexity and costs of web
application deployment, it also introduces new risks and requires a
fundamentally different approach to security. Traditional security approaches
such as firewalls and network intrusion detection are either impossible or
inappropriate for cloud applications. New risks include loss of governance,
failure of compliance with regulations that assume infrastructure is physical
rather than virtual, an expanded attack surface resulting from the connection
between your organization and the cloud, and hypervisor attacks that may enable
attackers on the same physical server to access your data. This talk will
address how these risks occur in the context of cloud computing and will examine
ways to mitigate them.