DAY-CON VIII:

Private “Internet of Things” Workshop: September 2nd, 2014



September 3rd 2014    Dayton Security Summit Day 1:

8:30AM - 9:00AM           Registration & Check-In

9:00AM - 9:30AM           Ground Rules (Angus Blitter)

9:30AM - 12:00PM         Tools of the Trade (Bigezy, Gabe, Josh & Nathaniel)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Beyond Embedded (Angus)


6:30PM Reception 7:00PM - 9:00PM Group Dinner


September 4th, 2014    Dayton Security Summit Day 2:

7:00AM - 8:00AM           5K Hacker Run

9:00AM - 12:00PM         Radical Thinking & Disruptive Tech (Graeme)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Point of Origin Hacking (Hendrik & Rodrigo)


September 5th, 2014

10:00AM - 2:00PM       HackSec Packetwars Invitational


5:00PM - 8:00PM       Reception & Urban Nights


Times and Content Subject to Change



SPEAKER DELEGATES:


Angus Blitter - Your host and resident media whore. Angus is the founder of Hack Sec Klahn, a like-minded group of technologists. Angus is also the creator of PacketWars™ (packetwars.com) the World's first Cyber Sport. Angus believes diversity is good for the species and hackers are a national resource. Old school, grey hat and previously plump, Angus still likes to eat, drink and hack.



Bigezy -  Has a new day job (very cool) but was a security analyst at a Fortune 500 Electric Utility and is responsible for border defense of scada networks and policy enforcement. He has also done his part protecting the economy spending 5 years securing a mutual fund transfer agency that wired the money around for 54 percent of NASDAQ. Before that he founded one of the first Internet service providers in the Midwest.



Rodrigo Rubira Branco (@BSDaemon) - Is responsible for the Dissect || PE project, an automated malware analysis system available for security researchers to test new ideas and findings. In the past, he worked as Director of Vulnerability & Malware Research at Qualys, as Chief Security Research for Check Point where he released dozens of security vulnerabilities and was awarded by Adobe as one of the top contributors for vulnerabilities in 2011. He also worked as Senior Vulnerability Researcher for Coseinc and Staff Software Engineer in IBM. He is the organizer of H2HC (Hackers 2 Hackers Conference), the oldest security research conference in Latin America.



Nathaniel Husted - Nathaniel, sometimes referred to as Dr. Whom, has spent the last 6 years researching cutting edge topics in security and IT. He currently works as a consultant at Cigitcal, Inc. and is an organizer for Circle City Con as well as the Learning from Authoritative Security Experiments and Results workshop. He holds a Ph.D. in Informatics with a focus on information security. The focus of his dissertation was a set of guidelines for information security practitioners on how to use techniques from public health, complexity science, and economics in order to mitigate complex emergent security phenomenon. He currently writes on a blog at www.drwhom.net.



Brent Huston - Brent is the Security Evangelist and CEO of MicroSolved, Inc. He spends a LOT of time breaking things, including the tools/techniques and actors of crime. When he is not focusing his energies on chaos & entropy, he sets his mind to the order side of the universe where he helps organizations create better security processes, policies and technologies. He is a well recognized author, surfer, inventor, sailor, trickster, entrepreneur and international speaker. He has spent the last 20+ years dedicated to information security on a global scale. He likes honeypots, obscure vulnerabilities, a touch of code & a wealth of data. He also does a lot of things that start with the letter “s”. You can learn more about his professional background here: http://www.linkedin.com/in/lbhuston & follow him on Twitter (@lbhuston).



Josh More - Josh has more than fifteen years of experience in security, IT, development and system and network administration. Currently, he runs Eyra Security, a security consultancy based in Minneapolis, MN. Josh holds several security and technical certifications and has served in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org, often taking a unique approach to solving security problems by applying lessons from other disciplines like Agile Development, Lean Manufacturing, Psychology, Economics and Complexity Science.



Graeme Neilson - Is a security consultant / researcher for Aura Information Security based in Wellington. He has worked in security for over ten years with a focus on network infrastructure and reverse engineering. Previously he has presented at Kiwicon (Wellington, New Zealand), Ruxcon (Sydney, Australia) and BlackHat (Las Vegas, USA).



Hendrik Schmidt - Hendrik is a seasoned security researcher with vast experiences in large and complex enterprise networks. Over the years he focused on evaluating and reviewing all kinds of network protocols and applications. He loves to play with packets and use them for his own purposes. In this context he learned how to play around with several communication technics, wrote protocol fuzzers and spoofers for testing its implementation and security architecture. He is a pentester and consultant at the german based ERNW GmbH and will happily share his knowledge with the audience.


Gabe Weaver - Gabe is a Research Scientist at the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign.  I am currently working to develop a Cyber-Physical Topology Language (CPTL) to communicate and analyze cyber-physical systems.  During my doctoral thesis at Dartmouth College, I created extended Unix tools (XUTools) to process a broader class of languages in which security policies are expressed in the language-theoretic sense.  XUTools and related research has been featured in news outlets such as ComputerWorld, CIO Magazine, Communications of the ACM and Slashdot.