Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Welcome to SCHEDULE.BSIDESBOSTON.COM
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Friday, May 9
 

10:00am

Registration / Networking
Friday May 9, 2014 10:00am - 12:00pm
Registration 1 Memorial Dr #1, Cambridge, MA 02142

11:00am

Capture The Flag (CTF) Registration
Organizers
avatar for Paul Drapeau

Paul Drapeau

Principal Security Researcher, Confer Technologies Inc.
Paul Drapeau (@pdogg77) is currently the Principal Security Researcher for Confer Technologies Inc. Prior to joining Confer Paul was the Principal IT Security Engineer for a Boston area pharmaceutical company for over 13 years. He has helped organize the 2013 and 2014 BSides Boston CTF, as well as the 2013 SOURCE Boston CTF events. Paul wishes he had more spare time to capture more flags... :)


Friday May 9, 2014 11:00am - 11:30am
Registration 1 Memorial Dr #1, Cambridge, MA 02142

11:30am

Capture The Flag - (CTF)
Friday May 9, 2014 11:30am - 5:00pm
CTF Room 1 Memorial Dr #1, Cambridge, MA 02142

12:00pm

Lunch (Not Provided - Cafeteria Open on Ground Floor) & Break / Networking
Friday May 9, 2014 12:00pm - 1:00pm
Ground Floor 1 Memorial Drive, Suite 100, Cambridge, MA 02142

12:00pm

Lockpicking By TOOOL Boston - (LP)
Try and test your hands on using various picks to open different locks sponsored by TOOOL Boston.

Friday May 9, 2014 12:00pm - 5:00pm
Lockpick Village 1 Memorial Dr #1, Cambridge, MA 02142

1:00pm

Friday's Opening Remarks
Speakers
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.


Friday May 9, 2014 1:00pm - 1:10pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

1:20pm

Keynote: Jack Daniel - Doomed to repeat, InfoSec’s failure to learn from the past - (K1)
We have seen cycle after cycle of change and disruption in technology and security, and it seems that on each iteration the industry goes through the same series of mistakes, panic, despair, and finally varying levels of resolution.  In this presentation I will review disruptions from early computing systems to cloud, to the current "Bring Your Own [whatever]" and "Internet of Things" panics, then focus on the common issues, and common solutions, to these cycles.

Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Tenable Network Security

Tenable Network Security

Recruiting, Tenable Network Security
At Tenable, we are all about innovation, creativity and purpose, with a passion for designing solutions that change people’s lives and make a difference in the world. Network security is one of the world’s fastest growing fields, and our fresh ideas and proven products are revolutionizing the industry. We have big plans for continued global growth in 2016 and beyond, and we are looking for people who are creative, adaptable and... Read More →


Friday May 9, 2014 1:20pm - 2:10pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

2:20pm

Joey Peloquin: Offensive Mobile Forensics - (13)
Moderators
avatar for TH

TH

Hart Consulting
I am trying to be the person that my dog deserves. | | Have been a techie for many years (Programmer, Analyst, Systems Programmer, Network Programmer and the really dirty one Auditor). | | Now working my way into Cyber / Information Security field. Yes I believe there are two distinct components. Cyber to me is the architecture comprised of hardware/software. Information to me refers more to actual data that gets processed... Read More →

Speakers
avatar for Joey Peloquin

Joey Peloquin

Director, Professional Services, GuidePoint Security
Joey has over 15 years of experience in the information technology industry specializing in information security. Prior to joining the GuidePoint Security team, he served as World Wide Security Architect for F5 Networks focusing on mobile and application security, and authentication and access security. His previous experience includes managing application and mobile security consulting teams at national security consulting firms, and leading... Read More →


Friday May 9, 2014 2:20pm - 3:00pm
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

2:20pm

Mark Thomas - "Auditing all the things" for smarter detection and faster incident response - (5)
Moderators
avatar for Macy Cronkrite

Macy Cronkrite

Prof Serv, SPLUNK
There is nothing more dangerous | to my health than boredom. | Sherlock Holmes

Speakers
MT

Mark Thomas

Principal Software Engineer, Threat Stack
Mark Thomas is the Principal Software Engineer at Threat Stack, Inc. He is a consummate C hacker with more than 15 years of experience in writing software for high performance networking and security applications. | | He holds several patents in network security and is a dedicated open source contributor. He is currently a maintainer for the popular libevent library and author of the high-performance http library, libevhttp.


Friday May 9, 2014 2:20pm - 3:00pm
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

2:20pm

Jason Ding: Why You Should Give Up Online Social Networks? - (11)
Moderators
Speakers
avatar for Jason Ding

Jason Ding

Research Scientist, Barracuda Networks
Dr. Zejin Jason Ding is a research scientist at Barracuda Labs. His main research interests include machine learning, network security social networks, and big data analysis. He is particularly interested in applying machine learning algorithms to solve network security and social network problems, such as spam detection, automatic URL/domain classification, malware prevention, social bonnet detection, etc. He had actively presented talks/demos... Read More →


Friday May 9, 2014 2:20pm - 3:00pm
Track 3 1 Memorial Dr #1, Cambridge, MA 02142

3:10pm

Robert Wood: Next Generation Red Teaming - (3)
Moderators
avatar for Frank Quinn

Frank Quinn

Information Security Pro,
Infosec topics, & the evolution of technology in general.... " Yeah Baby ! " | Defensive Specialist + student of, & experimenter with, Virtualization labs, Private Cloud, & Infosec techniques, tools, & practices. Love SANS & BSides, especially Boston. My strategy in a nutshell: "Patch your Apps & O.S.'s, Limit Admin acct use, Reduce attack surfaces, Scan for vuln's & remediate. Identify & backup critical data offsite, White-list Apps! Rinse... Read More →

Speakers
RW

Robert Wood

Director of Red Team Assessments, Cigital
Robert Wood is currently the Red Team Practice Director at Cigital; Robert has worked with a number of clients spanning from Fortune 100 financial institutions, hospitals, defense contractors, all the way to gaming companies and ISVs, providing services at every stage in the SDLC, including developing software security programs. Prior to Cigital, Robert worked as a mobile forensic investigator and red team penetration tester, exposing him to a... Read More →


Friday May 9, 2014 3:10pm - 3:50pm
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

3:10pm

Rockie Brockway: The Challenge of Natural Security Systems - (16)
Moderators
Speakers
RB

Rockie Brockway

Business Risk and Information Security Director, Black Box Network Services
Rockie’s start in Infosec was as an intern in college working for Dr. Peter Tippett at his company Certus International disassembling virus code. The first employee of one of northeast Ohio’s first ISPs, he spent several years managing networks and unix systems before starting his own security consulting organization. He has spent the past two decades analyzing business systems, performing penetration tests and deriving business risk... Read More →


Friday May 9, 2014 3:10pm - 3:50pm
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

3:10pm

David Bressler: Bitcoin Explorer - Visualizing/Monitoring Bitcoin Transactions - (6)
Moderators
avatar for Macy Cronkrite

Macy Cronkrite

Prof Serv, SPLUNK
There is nothing more dangerous | to my health than boredom. | Sherlock Holmes

Speakers
DB

David Bressler (@bostonlink)

Senior Security Consultant, GuidePoint Security LLC
David has over 5 years of working experience in the information security field, primarily focusing on penetration testing, incident response, and malware analysis. Prior to joining GuidePoint Security, David was a Senior Information Security Analyst for Boston Children’s Hospital, where he led the application security, vulnerability management, and incident response programs. He has developed numerous tools and Maltego integrations including... Read More →


Friday May 9, 2014 3:10pm - 3:50pm
Track 3 1 Memorial Dr #1, Cambridge, MA 02142

4:00pm

Keynote: Michael Davis - Using Hackers’ Own Methods & Tools to Defeat Persistent Adversaries - (K2)
In today's world of advanced cyber threats, security professionals need to implement new methods and strategies to gain the upper hand in protecting their business. Thinking like an attacker isn't really good enough. However, incorporating hacker methodologies & tools will give security teams the situational awareness and intelligence needed to respond quickly to new & previously unknown threats.

The security industry is changing. For some, it's a good thing, and for others, they're watching their antiquated ways of failing to prevent exploits become irrelevant for smart security teams.

Why? For starters, attackers are eating traditional technologies for breakfast. Hackers are more sophisticated, and already have volumes of intel on you and your company, including the technologies deployed to defend your infrastructure. Second, it's becoming increasingly more difficult to simply rely on 'building a bigger wall,' because you cannot defend against persistency.

A fundamentally different security mindset is needed to address well-organized, well-funded, and sophisticated attackers who focus squarely on circumventing your defenses. This includes using attacker technology and tools against the attackers, incorporating the same stealth techniques that attackers use into your defenses, leveraging forensics at the point of
attack to understand what you are dealing with, and using analytics to understand attacker behavior to draw conclusions on specific areas of your systems that require attention.

Moderators
avatar for Frank Quinn

Frank Quinn

Information Security Pro,
Infosec topics, & the evolution of technology in general.... " Yeah Baby ! " | Defensive Specialist + student of, & experimenter with, Virtualization labs, Private Cloud, & Infosec techniques, tools, & practices. Love SANS & BSides, especially Boston. My strategy in a nutshell: "Patch your Apps & O.S.'s, Limit Admin acct use, Reduce attack surfaces, Scan for vuln's & remediate. Identify & backup critical data offsite, White-list Apps! Rinse... Read More →

Speakers
avatar for Michael Davis

Michael Davis

CTO, CounterTack
As CounterTack’s CTO, Michael Davis is responsible for driving the advancement of CounterTack’s revolutionary endpoint security platform, as well as leveraging his visionary approach to push defenders ahead of attackers. Davis has earned a reputation as one of the nation’s leading authorities on information technology. The list of organizations that rely on his council includes AT&T, Sears, Exelon, and the US Department of... Read More →


Friday May 9, 2014 4:00pm - 4:50pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

5:00pm

CTF Results, Prizes and Closing Remarks
Speakers
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Organizers
avatar for Paul Drapeau

Paul Drapeau

Principal Security Researcher, Confer Technologies Inc.
Paul Drapeau (@pdogg77) is currently the Principal Security Researcher for Confer Technologies Inc. Prior to joining Confer Paul was the Principal IT Security Engineer for a Boston area pharmaceutical company for over 13 years. He has helped organize the 2013 and 2014 BSides Boston CTF, as well as the 2013 SOURCE Boston CTF events. Paul wishes he had more spare time to capture more flags... :)


Friday May 9, 2014 5:00pm - 5:45pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142
 
Saturday, May 10
 

8:00am

Registration / Networking
Saturday May 10, 2014 8:00am - 12:00pm
Registration 1 Memorial Dr #1, Cambridge, MA 02142

9:00am

Saturday's Opening Remarks
Speakers
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.


Saturday May 10, 2014 9:00am - 9:10am
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

9:00am

Lockpicking By TOOOL Boston - (LP)
Try and test your hands on using various picks to open different locks sponsored by TOOOL Boston.

Saturday May 10, 2014 9:00am - 5:00pm
Lockpick Village 1 Memorial Dr #1, Cambridge, MA 02142

9:20am

Keynote: Heartbleed As Metaphor - Dr. Dan Geer - (K3)
Heartbleed as Metaphor, Lawfare http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor

Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Dan Geer

Dan Geer

CISO, In-Q-Tel
Dan Geer is currently the CISO for In-Q-Tel, a not-for-profit investment firm that works to invest in technology that supports the missions of the Central Intelligence Agency and the broader U.S. intelligence community. His history within the security industry is both extensive and striking. Looking at just a few of his accomplishments, Geer was a key contributor to the development of the X Window System as well as the Kerberos... Read More →


Saturday May 10, 2014 9:20am - 10:10am
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

10:00am

Paul Drapeau: Capture The Flag (CTF) 101 - (1)
If you have ever thought about trying your hand at a Capture the Flag game at a con or online but didn't know where to start, now is your chance. We will look at some of the reasons to play or run these games, some of the basic tools and skills involved, various types of games and how to get involved. This introduction is intended for absolute beginners to CTFs and will be hands on with some walk through exercises on challenges. Bring a laptop! We will also be demoing and walking you through challenges used in this years BSides Boston CTF throughout the day on Saturday in the CTF room so feel free to stop by.

Organizers
avatar for Paul Drapeau

Paul Drapeau

Principal Security Researcher, Confer Technologies Inc.
Paul Drapeau (@pdogg77) is currently the Principal Security Researcher for Confer Technologies Inc. Prior to joining Confer Paul was the Principal IT Security Engineer for a Boston area pharmaceutical company for over 13 years. He has helped organize the 2013 and 2014 BSides Boston CTF, as well as the 2013 SOURCE Boston CTF events. Paul wishes he had more spare time to capture more flags... :)


Saturday May 10, 2014 10:00am - 11:00am
CTF Room 1 Memorial Dr #1, Cambridge, MA 02142

10:10am

Steve Coley: Not Just a Number: CVE in the End of Days - (2)
Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Steve Coley

Steve Coley

Principal Information Security Engineer, The MITRE Corporation
Steve Christey Coley is a Principal Information Security Engineer in the Security and Information Operations Division at The MITRE Corporation.  He likes changing his last name every two decades or so. Steve is the editor of the Common Vulnerabilities and Exposures (CVE) list, Chair of the CVE Editorial Board, and technical lead for the Common Weakness Enumeration (CWE), CWSS, and the CWE/SANS Top 25 Software... Read More →


Saturday May 10, 2014 10:10am - 10:50am
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

10:10am

Paul Braren: Run OpenVPN In Your Home - (PB)
Moderators
avatar for Frank Quinn

Frank Quinn

Information Security Pro,
Infosec topics, & the evolution of technology in general.... " Yeah Baby ! " | Defensive Specialist + student of, & experimenter with, Virtualization labs, Private Cloud, & Infosec techniques, tools, & practices. Love SANS & BSides, especially Boston. My strategy in a nutshell: "Patch your Apps & O.S.'s, Limit Admin acct use, Reduce attack surfaces, Scan for vuln's & remediate. Identify & backup critical data offsite, White-list Apps! Rinse... Read More →

Speakers
avatar for Paul Braren

Paul Braren

TinkerTry.com, LLC - Founder, IBM - Storage Technical Advisor
I'm happy to be an IBMer, and an independent creator of a popular site about IT @ home, where I tinker with efficient virtualization, storage, backup, and more. | VMware Certified Professional (VCP 2.5/3/4/5) VCP5-DCV and 2014 vExpert. | Innovator, author, webmaster, photographer, videographer, software maven, hardware enthusiast, tireless technologist. | Master of none.


Saturday May 10, 2014 10:10am - 10:50am
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

10:30am

HallwayCon Lightning Talks

First come, first served! (Sign-up and put your name and topic on the board!) These lightning talks are 15-minute each and will go throughout the entire day.


Saturday May 10, 2014 10:30am - 12:00pm
Hallway Con Room 1 Memorial Dr #1, Cambridge, MA 02142

11:00am

Ming Chow: Abusing Mobile Games - (8)
Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Ming Chow

Ming Chow

Senior Lecturer, Tufts University
Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile security and web and mobile engineering. He teaches courses largely in the undergraduate curriculum including Data Structures, Web Programming, Web Engineering, Music Apps on the iPad, Mobile Medical Devices and Apps, Senior Capstone Project, and Introduction to Computer Security. His course Introduction to Game... Read More →


Saturday May 10, 2014 11:00am - 11:40am
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

11:00am

David Dumas: Running Cyber Tabletop Exercise and Lessons Learned - (4)
Moderators
avatar for Frank Quinn

Frank Quinn

Information Security Pro,
Infosec topics, & the evolution of technology in general.... " Yeah Baby ! " | Defensive Specialist + student of, & experimenter with, Virtualization labs, Private Cloud, & Infosec techniques, tools, & practices. Love SANS & BSides, especially Boston. My strategy in a nutshell: "Patch your Apps & O.S.'s, Limit Admin acct use, Reduce attack surfaces, Scan for vuln's & remediate. Identify & backup critical data offsite, White-list Apps! Rinse... Read More →

Speakers
avatar for David Dumas

David Dumas

Sr. Network Security Engineer, Verizon
David Dumas, CISSP, CISM, ISSA Distinguished Fellow | | David is a Senior Network Security Engineer working directly for the Chief Network  | Security Officer of Verizon's Wireline Security Operations group. His current work  | involves outsourcing, offshoring, Global cyber and privacy regulations, customer visits/ | presentations, and he is a Verizon representative on outside committees. David was  | the Director of Verizon's... Read More →


Saturday May 10, 2014 11:00am - 11:40am
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

12:00pm

Lunch Provided & Break / Networking
Saturday May 10, 2014 12:00pm - 1:00pm
All Areas 1 Memorial Dr #1, Cambridge, MA 02142

12:05pm

General Announcements
Saturday May 10, 2014 12:05pm - 12:20pm
All Areas 1 Memorial Dr #1, Cambridge, MA 02142

1:00pm

HallwayCon Lightning Talks

First come, first served! (Sign-up and put your name and topic on the board!) These lightning talks are 15-minute each and will go throughout the entire day.


Saturday May 10, 2014 1:00pm - 3:00pm
Hallway Con Room 1 Memorial Dr #1, Cambridge, MA 02142

1:10pm

Keynote: Target, Snowden, Heartbleed … Oh my!: Rob Cheyne - (K4)
Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Rob Cheyne

Rob Cheyne

CEO, Big Brain Security
Rob Cheyne is a highly regarded technologist, security expert, trainer, public speaker and entrepreneur. He has 24 years of experience in the information technology field and has been working in information security since 1998. He was the co-founder and CEO of Safelight, a leading provider of information security e-learning and education programs. He has taught in-person information security training classes to well over 20,000 developers... Read More →


Saturday May 10, 2014 1:10pm - 2:00pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

2:10pm

Will Schroeder: Pwnstaller 1.0 - (10)
Moderators
Speakers
avatar for Will Schroeder

Will Schroeder

Security Researcher, Adaptive Threat Division, Veris Group, LLC
Will Schroeder (@harmj0y) is a security researcher and pentester/red-teamer for Veris Group’s Adaptive Threat Division. He is a co-founder of the Veil-Framework, developed PowerView and PowerUp, is an active developer on the PowerSploit project, and is a co-founder and core developer of the PowerShell post-exploitation agent Empire. He has presented at a number of security conferences on topics spanning AV-evasion, post-exploitation, red... Read More →


Saturday May 10, 2014 2:10pm - 2:50pm
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

2:10pm

Matt Bernhardt: 3D printing for fun and science? A conversation about digital fabrication & You - (9)
Moderators
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Speakers
avatar for Matthew Bernhardt

Matthew Bernhardt

Web Developer, Massachusetts Institute of Technology
Coming soon ...


Saturday May 10, 2014 2:10pm - 2:50pm
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

3:00pm

HallwayCon Resume Room
Bring extra resumes to speak with organizations that are looking for information security people like you! Feel free to drop by and talk to your colleagues and get advice. This is meant to be an open area to get people talking.

Saturday May 10, 2014 3:00pm - 4:00pm
Hallway Con Room 1 Memorial Dr #1, Cambridge, MA 02142

3:10pm

Robert Kiss: Detecting malicious activity in the cloud - (12)
Moderators
avatar for TH

TH

Hart Consulting
I am trying to be the person that my dog deserves. | | Have been a techie for many years (Programmer, Analyst, Systems Programmer, Network Programmer and the really dirty one Auditor). | | Now working my way into Cyber / Information Security field. Yes I believe there are two distinct components. Cyber to me is the architecture comprised of hardware/software. Information to me refers more to actual data that gets processed... Read More →

Speakers
RK

Robert Kiss

IT Security Engineer, Prezi Inc.
Used to work as a penetration tester for 2 years then switched to the "defensive side" and now tries to protect Prezi from the not-so-whitehat hackers. During his university studies, participated in a couple of CTF events like CSAW Finals and iCTF (2nd place).


Saturday May 10, 2014 3:10pm - 3:50pm
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

3:10pm

Zeeshan Shah: Pre-emptive Detection of Cyber Threat - (14)
Moderators
avatar for Macy Cronkrite

Macy Cronkrite

Prof Serv, SPLUNK
There is nothing more dangerous | to my health than boredom. | Sherlock Holmes

Speakers
avatar for Zeeshan Ali Shah

Zeeshan Ali Shah

HPC/Cloud Sys-Admin and PhD researcher cyber defence, KTH Royal Institute of Technology
Zeeshan Ali Shah, is an HPC/Cloud sys-admin and an PhD researcher with focus on cyber defence. In 2006 he earned his MS in Information security from Royal Institute of Technology and recently resumed his academic venture as a security researcher besides Sys-admin stuff.


Saturday May 10, 2014 3:10pm - 3:50pm
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

4:00pm

Information Security Careers and Education Panel - (7)
Come to this informal session to learn from current information security professionals and faculty members regarding their thoughts about working in the industry. Where do you start? What are the most important skills? What is more important: experience or education or certifications? How do you make yourself more marketable? Are there any additional resources? Bring your questions and comments to this session!

Moderators
Speakers
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.
avatar for Paul Asadoorian

Paul Asadoorian

Product Evangelist, Tenable Network Security
Paul Asadoorian is the Founder & CEO of Security Weekly, where he has led the content and production of one of the longest running computer security podcasts/Internet TV shows. By day he is the Product Strategist for Tenable Network Security. Paul produces and hosts the various shows at Security Weekly, all dedicated to providing the latest security news, interviews with the industries finest and technical how-to segments. Paul has extensive... Read More →
avatar for Rob Cheyne

Rob Cheyne

CEO, Big Brain Security
Rob Cheyne is a highly regarded technologist, security expert, trainer, public speaker and entrepreneur. He has 24 years of experience in the information technology field and has been working in information security since 1998. He was the co-founder and CEO of Safelight, a leading provider of information security e-learning and education programs. He has taught in-person information security training classes to well over 20,000 developers... Read More →
avatar for Ming Chow

Ming Chow

Senior Lecturer, Tufts University
Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile security and web and mobile engineering. He teaches courses largely in the undergraduate curriculum including Data Structures, Web Programming, Web Engineering, Music Apps on the iPad, Mobile Medical Devices and Apps, Senior Capstone Project, and Introduction to Computer Security. His course Introduction to Game... Read More →

Sponsors

Saturday May 10, 2014 4:00pm - 4:40pm
Track 1 1 Memorial Dr #1, Cambridge, MA 02142

4:00pm

TOOOL: Introduction To Lockpicking
Moderators
avatar for TH

TH

Hart Consulting
I am trying to be the person that my dog deserves. | | Have been a techie for many years (Programmer, Analyst, Systems Programmer, Network Programmer and the really dirty one Auditor). | | Now working my way into Cyber / Information Security field. Yes I believe there are two distinct components. Cyber to me is the architecture comprised of hardware/software. Information to me refers more to actual data that gets processed... Read More →

Sponsors
TW

Tom Williams

Tom's House of Beer
I'm a US Marine Corps and US Army Veteran. I was hurt on active duty, and now suffer from chronic back pain. I grew up in a little town in Massachusetts, and the Marine Corps sent me to a big city (San Diego). I have an amazing wife (love you baby), and a great life. My wonderful wife gave birth to my amazing twin boys July 2009 and a daughter in August 2011.


Saturday May 10, 2014 4:00pm - 4:40pm
Track 2 1 Memorial Dr #1, Cambridge, MA 02142

5:00pm

Closing Remarks
Speakers
avatar for Roy

Roy

adviser, security bsides boston
Roy Wattanasin is the former conference lead organizer of Security Bsides Boston. He works in the healthcare industry. He is now an adviser.

Organizers
avatar for Frank Quinn

Frank Quinn

Information Security Pro,
Infosec topics, & the evolution of technology in general.... " Yeah Baby ! " | Defensive Specialist + student of, & experimenter with, Virtualization labs, Private Cloud, & Infosec techniques, tools, & practices. Love SANS & BSides, especially Boston. My strategy in a nutshell: "Patch your Apps & O.S.'s, Limit Admin acct use, Reduce attack surfaces, Scan for vuln's & remediate. Identify & backup critical data offsite, White-list Apps! Rinse... Read More →
I

InternMike

Sponsor Coordinator, SOURCE Conference
Sponsor Coordinator at: | BSidesLV | SOURCE Conference Boston
avatar for Macy Cronkrite

Macy Cronkrite

Prof Serv, SPLUNK
There is nothing more dangerous | to my health than boredom. | Sherlock Holmes
avatar for Paul Drapeau

Paul Drapeau

Principal Security Researcher, Confer Technologies Inc.
Paul Drapeau (@pdogg77) is currently the Principal Security Researcher for Confer Technologies Inc. Prior to joining Confer Paul was the Principal IT Security Engineer for a Boston area pharmaceutical company for over 13 years. He has helped organize the 2013 and 2014 BSides Boston CTF, as well as the 2013 SOURCE Boston CTF events. Paul wishes he had more spare time to capture more flags... :)
avatar for TH

TH

Hart Consulting
I am trying to be the person that my dog deserves. | | Have been a techie for many years (Programmer, Analyst, Systems Programmer, Network Programmer and the really dirty one Auditor). | | Now working my way into Cyber / Information Security field. Yes I believe there are two distinct components. Cyber to me is the architecture comprised of hardware/software. Information to me refers more to actual data that gets processed... Read More →


Saturday May 10, 2014 5:00pm - 5:30pm
Keynote Theater 1 Memorial Dr #1, Cambridge, MA 02142

6:00pm

After-Conference Reception
Join us at the after-party for some good food and networking!

Saturday May 10, 2014 6:00pm - 10:00pm
Offsite 1 Memorial Dr #1, Cambridge, MA 02142