Private “Internet of Things” Workshop: September 2nd, 2014

September 3rd 2014    Dayton Security Summit Day 1:

8:30AM - 9:00AM           Registration & Check-In

9:00AM - 9:30AM           Ground Rules (Angus Blitter)

9:30AM - 12:00PM         Tools of the Trade (Bigezy, Gabe, Josh & Nathaniel)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Beyond Embedded (Angus)

6:30PM Reception 7:00PM - 9:00PM Group Dinner

September 4th, 2014    Dayton Security Summit Day 2:

7:00AM - 8:00AM           5K Hacker Run

9:00AM - 12:00PM         Radical Thinking & Disruptive Tech (Graeme)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Point of Origin Hacking (Hendrik & Rodrigo)

September 5th, 2014

10:00AM - 2:00PM       HackSec Packetwars Invitational

5:00PM - 8:00PM       Reception & Urban Nights

Times and Content Subject to Change


Angus Blitter - Your host and resident media whore. Angus is the founder of Hack Sec Klahn, a like-minded group of technologists. Angus is also the creator of PacketWars™ ( the World's first Cyber Sport. Angus believes diversity is good for the species and hackers are a national resource. Old school, grey hat and previously plump, Angus still likes to eat, drink and hack.

Bigezy -  Has a new day job (very cool) but was a security analyst at a Fortune 500 Electric Utility and is responsible for border defense of scada networks and policy enforcement. He has also done his part protecting the economy spending 5 years securing a mutual fund transfer agency that wired the money around for 54 percent of NASDAQ. Before that he founded one of the first Internet service providers in the Midwest.

Rodrigo Rubira Branco (@BSDaemon) - Is responsible for the Dissect || PE project, an automated malware analysis system available for security researchers to test new ideas and findings. In the past, he worked as Director of Vulnerability & Malware Research at Qualys, as Chief Security Research for Check Point where he released dozens of security vulnerabilities and was awarded by Adobe as one of the top contributors for vulnerabilities in 2011. He also worked as Senior Vulnerability Researcher for Coseinc and Staff Software Engineer in IBM. He is the organizer of H2HC (Hackers 2 Hackers Conference), the oldest security research conference in Latin America.

Josh Goldfarb (Twitter: @ananalytical) - Josh is an experienced cyber security analyst with over a decade of experience building, operating, and running Security Operations Centers (SOCs). Josh currently serves as the Chief Security Strategist of the Enterprise Forensics Group at FireEye. Until its acquisition by FireEye, Josh served as Chief Security Officer for nPulse Technologies. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT.

Nathaniel Husted - Nathaniel, sometimes referred to as Dr. Whom, has spent the last 6 years researching cutting edge topics in security and IT. He currently works as a consultant at Cigitcal, Inc. and is an organizer for Circle City Con as well as the Learning from Authoritative Security Experiments and Results workshop. He holds a Ph.D. in Informatics with a focus on information security. The focus of his dissertation was a set of guidelines for information security practitioners on how to use techniques from public health, complexity science, and economics in order to mitigate complex emergent security phenomenon. He currently writes on a blog at

Brent Huston - Brent is the Security Evangelist and CEO of MicroSolved, Inc. He spends a LOT of time breaking things, including the tools/techniques and actors of crime. When he is not focusing his energies on chaos & entropy, he sets his mind to the order side of the universe where he helps organizations create better security processes, policies and technologies. He is a well recognized author, surfer, inventor, sailor, trickster, entrepreneur and international speaker. He has spent the last 20+ years dedicated to information security on a global scale. He likes honeypots, obscure vulnerabilities, a touch of code & a wealth of data. He also does a lot of things that start with the letter “s”. You can learn more about his professional background here: & follow him on Twitter (@lbhuston).

Joe Klein - Joe has played all roles in the Security business over the last 3 years. As a researcher he developed the first IPv6 IDS, Predictive Internet Threat Intelligence system, sensor networks security, hacked cars and other things that move, hacked time, and now runs a company creating the next generation security based on biologically inspired methods and practices.  He also has a patent in ‘Integrated cyber network security system and method’ and many provisional patents.  When not Geeking, life is about training for triathlons, hanging out with friends at ‘hacker spaces’ and conferences, geeking about life.

Josh More - Josh has more than fifteen years of experience in security, IT, development and system and network administration. Currently, he runs Eyra Security, a security consultancy based in Minneapolis, MN. Josh holds several security and technical certifications and has served in a leadership position on several security-focused groups. He writes a blog on security at, often taking a unique approach to solving security problems by applying lessons from other disciplines like Agile Development, Lean Manufacturing, Psychology, Economics and Complexity Science.

Graeme Neilson - Is a security consultant / researcher for Aura Information Security based in Wellington. He has worked in security for over ten years with a focus on network infrastructure and reverse engineering. Previously he has presented at Kiwicon (Wellington, New Zealand), Ruxcon (Sydney, Australia) and BlackHat (Las Vegas, USA).

Hendrik Schmidt - Hendrik is a seasoned security researcher with vast experiences in large and complex enterprise networks. Over the years he focused on evaluating and reviewing all kinds of network protocols and applications. He loves to play with packets and use them for his own purposes. In this context he learned how to play around with several communication technics, wrote protocol fuzzers and spoofers for testing its implementation and security architecture. He is a pentester and consultant at the german based ERNW GmbH and will happily share his knowledge with the audience.

Gabe Weaver - Gabe is a Research Scientist at the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign.  I am currently working to develop a Cyber-Physical Topology Language (CPTL) to communicate and analyze cyber-physical systems.  During my doctoral thesis at Dartmouth College, I created extended Unix tools (XUTools) to process a broader class of languages in which security policies are expressed in the language-theoretic sense.  XUTools and related research has been featured in news outlets such as ComputerWorld, CIO Magazine, Communications of the ACM and Slashdot.