DAY-CON VIII:

Private “Internet of Things” Workshop: September 2nd, 2014



September 3rd 2014    Dayton Security Summit Day 1:

8:30AM - 9:00AM           Registration & Check-In

9:00AM - 9:30AM           Ground Rules (Angus Blitter)

9:30AM - 12:00PM         Tools of the Trade (Bigezy & Gabe, Josh and Ben)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Beyond Embedded (Angus, Joe and Sergey)


6:30PM Reception 7:00PM - 9:00PM Group Dinner


September 4th, 2014    Dayton Security Summit Day 2:

7:00AM - 8:00AM           5K Hacker Run

9:00AM - 12:00PM         Radical Thinking & Disruptive Tech (Josh & Nathaniel, Graeme, Brent and Josh)

12:00PM - 1:00PM         Lunch

1:00PM -   5:00PM         Point of Origin Hacking (Hendrik, Jacob, Rafael & Angus)


September 5th, 2014

10:00AM - 2:00PM       HackSec Packetwars Invitational


3:00PM - 6:00PM       Reception & Urban Nights


Times and Content Subject to Change



SPEAKER DELEGATES:


Angus Blitter - Your host and resident media whore. Angus is the founder of Hack Sec Klahn, a like-minded group of technologists. Angus is also the creator of PacketWars™ (packetwars.com) the World's first Cyber Sport. Angus believes diversity is good for the species and hackers are a national resource. Old school, grey hat and previously plump, Angus still likes to eat, drink and hack.



Bigezy -  Has a new day job (very cool) but was a security analyst at a Fortune 500 Electric Utility and is responsible for border defense of scada networks and policy enforcement. He has also done his part protecting the economy spending 5 years securing a mutual fund transfer agency that wired the money around for 54 percent of NASDAQ. Before that he founded one of the first Internet service providers in the Midwest.



Sergey Bratus - Is a Research Assistant Professor of Computer Science at Dartmouth College. His research interests include designing new operating system and hardware-based features to support more expressive and developer-friendly debugging, secure programming and reverse engineering; Linux kernel security (kernel exploits, LKM rootkits, and hardening patches); data organization and other AI techniques for better log and traffic analysis; and various kinds of wired and wireless network hacking. Before coming to Dartmouth, he worked on statistical learning methods for natural text processing and information extraction at BBN Technologies. He has a Ph.D. in Mathematics from Northeastern University.



Josh Goldfarb (Twitter: @ananalytical) - Josh is an experienced cyber security analyst with over a decade of experience building, operating, and running Security Operations Centers (SOCs). Josh currently serves as the Chief Security Strategist of the Enterprise Forensics Group at FireEye. Until its acquisition by FireEye, Josh served as Chief Security Officer for nPulse Technologies. Prior to joining nPulse, Josh worked as an independent consultant, applying his analytical methodology to help enterprises build and enhance their network traffic analysis, security operations, and incident response capabilities to improve their information security postures. He has consulted and advised numerous clients in both the public and private sectors at strategic and tactical levels. Earlier in his career, Josh served as the Chief of Analysis for the United States Computer Emergency Readiness Team (US-CERT) where he built from the ground up and subsequently ran the network, endpoint, and malware analysis/forensics capabilities for US-CERT.



Nathaniel Husted - Nathaniel, sometimes referred to as Dr. Whom, has spent the last 6 years researching cutting edge topics in security and IT. He currently works as a consultant at Cigitcal, Inc. and is an organizer for Circle City Con as well as the Learning from Authoritative Security Experiments and Results workshop. He holds a Ph.D. in Informatics with a focus on information security. The focus of his dissertation was a set of guidelines for information security practitioners on how to use techniques from public health, complexity science, and economics in order to mitigate complex emergent security phenomenon. He currently writes on a blog at www.drwhom.net.



Brent Huston - Brent is the Security Evangelist and CEO of MicroSolved, Inc. He spends a LOT of time breaking things, including the tools/techniques and actors of crime. When he is not focusing his energies on chaos & entropy, he sets his mind to the order side of the universe where he helps organizations create better security processes, policies and technologies. He is a well recognized author, surfer, inventor, sailor, trickster, entrepreneur and international speaker. He has spent the last 20+ years dedicated to information security on a global scale. He likes honeypots, obscure vulnerabilities, a touch of code & a wealth of data. He also does a lot of things that start with the letter “s”. You can learn more about his professional background here: http://www.linkedin.com/in/lbhuston & follow him on Twitter (@lbhuston).



Benjamin Johnson - Is the Chief Evangelist of Bit9.  Prior to Bit9, Mr Johnson was CTO and Co-founder of Carbon Black, a cyber security start-up company aimed at endpoint threat detection and response.  Ben’s career started with computer-network-operations (CNO) for the National Security Agency and then expanded at Mantech, a defense contractor.  Ben spent much of his time as an intrusion engineer and security engineer working on CNO/cyber tools and capabilities, and then moved into the incident response and the defensive technology space after switching over to a commercial focus.  Ben’s role currently involves meeting with a lot of incident response, security operations, and decision maker personnel at prospective and current customers, as well as working with technology partners on integrations and new capabilities.  He is actively involved in trying to push innovation and solve security problems through better tools and processes.


Joe Klein - Joe has played all roles in the Security business over the last 30 years. As a researcher he developed the first IPv6 IDS, Predictive Internet Threat Intelligence system, sensor networks security, hacked cars and other things that move, hacked time, and now runs a company creating the next generation security based on biologically inspired methods and practices.  He also has a patent in ‘Integrated cyber network security system and method’ and many provisional patents.  When not Geeking, life is about training for triathlons, hanging out with friends at ‘hacker spaces’ and conferences, enjoying life.


Josh More - Josh has more than fifteen years of experience in security, IT, development and system and network administration. Currently, he runs Eyra Security, a security consultancy based in Minneapolis, MN. Josh holds several security and technical certifications and has served in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org, often taking a unique approach to solving security problems by applying lessons from other disciplines like Agile Development, Lean Manufacturing, Psychology, Economics and Complexity Science.



Graeme Neilson - Is a security consultant / researcher for Aura Information Security based in Wellington. He has worked in security for over ten years with a focus on network infrastructure and reverse engineering. Previously he has presented at Kiwicon (Wellington, New Zealand), Ruxcon (Sydney, Australia) and BlackHat (Las Vegas, USA).



Hendrik Schmidt - Hendrik is a seasoned security researcher with vast experiences in large and complex enterprise networks. Over the years he focused on evaluating and reviewing all kinds of network protocols and applications. He loves to play with packets and use them for his own purposes. In this context he learned how to play around with several communication technics, wrote protocol fuzzers and spoofers for testing its implementation and security architecture. He is a pentester and consultant at the german based ERNW GmbH and will happily share his knowledge with the audience.



Jacob Torrey - Is a Senior Research Engineer at Assured Information Security, Inc. where he leads the Computer Architectures group and acts as the site lead for the Colorado branch. Jacob has worked extensively with low-level x86 and MCU architectures, having written a BIOS, OS, hypervisor and SMM handler. His major interest is how to (mis)use an existing architecture to implement a capability currently beyond the limitations of the architecture.



Gabe Weaver - Gabe is a Research Scientist at the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign.  I am currently working to develop a Cyber-Physical Topology Language (CPTL) to communicate and analyze cyber-physical systems.  During my doctoral thesis at Dartmouth College, I created extended Unix tools (XUTools) to process a broader class of languages in which security policies are expressed in the language-theoretic sense.  XUTools and related research has been featured in news outlets such as ComputerWorld, CIO Magazine, Communications of the ACM and Slashdot.