Eric Capuano, SOC Manager at Colorado Department of Market Protection
One common myth is that required spending millions is proficient at security. Besides so is this untrue, but i’ll communicate methods you are able to enrich safety posture while really lowering using. This talk outlines a number of the tricks and mindsets to undertaking safety really without breaking the lender. This is not the standard A?AˆA?Problem, difficulty, challenge. A?AˆA? chat. This really is a solution-based talk that dates back to numerous of the basic problems facing SOC groups everywhere.
Eric Capuano (Twitter: ) is actually an info Security specialist portion state and authorities together with SMBs, start-ups and non-profits. Additionally, an associate for the package Hacking community team at DEF CON.
Jay Beale, CTO and COO at InGuardians
Taught by Bastille Linux founder Jay Beale, passion.com this hands-on working area will teach you to definitely utilize Linux pots to raised include a strike on any regimen operating on the system. You will end up provided a vulnerable plan to guard, via a virtual maker as possible install beforehand. You are going to 1st compromise the application form, subsequently contain it and take advantage of it again. We will talk about AppArmor, seccomp and SELinux, and you’ll be in a position to download the digital machinery to test more complex versions of your after. For reason for convenience, we’re going to need Docker, but you can make concepts home and check out these with LXC/LXD, runc, or any other structure for controlling containers. This working area will be instructed for the first time and provides one topic from long-running Dark Hat course, “”Aikido regarding the Order Line.A?AˆA?
Jay Beale (Twitter: and ) happens to be in Linux safety since 1999, as he began producing a number of protective safety equipment, like Bastille Linux/UNIX and the CIS Linux Scoring device, both of that have been put widely throughout business and government. He has supported as an invited speaker at lots of industry and federal government meetings, a columnist for info safety Magazine, SecurityPortal and SecurityFocus, and a contributor to nine guides, such as those who work in his Open provider Security show additionally the “”Stealing the circle”” series. He’s already been asked to dicuss at and chair seminars across the world. 1st talk at Def Con was a student in 2000. Jay is a founder and both CTO and main functioning policeman associated with the records security consulting team InGuardians.
Whether you will do greater scope pentesting or bounty shopping, website development is the first technique of broadening the scope. Enroll in Jason as he walks your through their means sequence for knowledge including; subdomain scraping, bruteforce, ASN advancement, permutation checking, automation, and a lot more!
Jason Haddix ()
‘” 3_Saturday,,,SKY,”Verona/Tuin/Trevi – Promenade Level”,”‘Crossing the line with a Burner cell: an attorney details legit & protection problems at edge'”,’wendy’,”‘Title: Crossing the line with a Burner Phone: a legal counsel details Legal & safety problem from the line
For many individuals, crossing a line isn’t really a reason for worry. However with a recent uptick in unit searches and desires for social networking manages, countless terrible guidance has been circulating. Listen from a hacker lawyer concerning the legality of boundary queries- so what can border agents ask you? Must you open a phone? Can you provide a fake social networking deal with?'” 3_Saturday,,,BHV,”Pisa Room”,”‘DIYBioweapons and legislation'”,”‘Meow Ludo Meow Meow'”,”‘Title: DIYBioweapons and Regulation
Speaker: Meow Ludo Meow Meow About Meow Ludo Meow Meow: Meow-Ludo may be the president of biohacking in Australia, and operates fulltime operating BioFoundry. They are a regular hacker, part-time national political prospect, and is also thinking about interdisciplinary work.He could be contemplating the capacity of biohackers to produce bioweapons while the regulations that make an effort to controls them.