Featured Speakers

Jack Daniel works for Tenable Network Security, has over 20 years’ experience in network and system administration and security, and has worked in a variety of practitioner and management positions.

A technology community activist, he supports several information security and technology organizations. Jack is a co-founder of Security BSides, serves on the boards of three Security BSides non-profit corporations, and helps organize Security B-Sides events.

Presenting: History and ethos of BSides talk


Chris Nickerson

LARES


Chris Nickerson,CEO of LARES, is just another “Security guy” with a whole bunch of certs whose main area of expertise is focused on Real World Attack Modeling, Red Team Testing and Defensive Measurement. At Lares, Chris leads specialized team of adversarial engineers who conduct Risk Assessments, Penetration Testing, Application Testing, Social Engineering, Red Teaming and Full Spectrum Attack Simulation. Prior to starting Lares, Chris was Dir. of Security Services at Alternative Technology, a Sr. IT compliance at KPMG, Sr. Security Architect and Compliance Manager at Sprint Corporate Security.Chris is a 17+ year veteran of the infosec speaking community,the author of the upcoming “RED TEAM TESTING” book published by Elsevier/Syngress and a founding member of BSides Conference.

Presenting: Adversarial modelling exercises

David Kennedy

TrustedSec

Presenting: Understanding Offensive and Defense – Having a purple view on INFOSEC

When this industry started – there was a gap for those that quickly went on the defense or offense. Our minds were structured in either seek and destroy (red) or defend all the things (blue). The industry is changing and the understanding of both offense and defense is imperative to building a much better tomorrow. This talk runs through the latest offensive techniques used with live demonstrations as well as some of the best methods for defense when it comes to stopping the offense. Learn some of the methods I use on a regular basis for the offense, and most importantly – the easiest ways to detect me as I’m ripping through the network.

Deviant Ollam

While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant Ollam is also a member of the Board of Directors of the US division of TOOOL, The Open Organisation Of Lockpickers. His books Practical Lock Picking and Keys to the Kingdom are among Syngress Publishing’s best-selling pen testing titles. At multiple annual security conferences Deviant runs the Lockpick Village workshop area, and he has conducted physical security training sessions for Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, ekoparty, AusCERT, GovCERT, CONFidence, the FBI, the NSA, DARPA, the National Defense University, the United States Naval Academy at Annapolis, and the United States Military Academy at West Point.

His favorite Amendments to the US Constitution are, in no particular order, the 1st, 2nd, 9th, & 10th.

Presenting: Elevator Security - What Goes Up Will Let You Down

Throughout the history of hacker culture, elevators have played a key role. From the mystique of students at MIT taking late-night rides upon car tops (don't do that, please!) to the work of modern pen testers who use elevators to bypass building security systems (it's easier than you think!) these devices are often misunderstood and their full range of features and abilities go unexplored. This talk will be an in-depth explanation of how elevators work... allowing for greater understanding, system optimizing, and the subversion of security in many facilities. Those who attend will learn why an elevator is virtually no different than an unlocked staircase as far as building security is concerned!