WOPR Summit 0x01

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
13:00
13:00
25min
Opening Comments
Talk Room
13:30
13:30
50min
Lessons learned from a breach
Bryan Bechard

Incidents don't have to be major to significantly alter the security posture of an organization. I will walk through how an incident happened, our reaction to it and what we would have done differently.

Talk Room
14:30
14:30
30min
Stop Doing this - Useless Vulnerability Management
Omer Farooq

Over the past 10 years, the cybersecurity industry, including the OWASP community, has been all about risk management through Vulnerability Management. At Auxin Security, we not only think about the current holistic Vulnerability Management, but we also show how it wastes thousands of expensive engineering man-hours are wasted daily on useless metrics and data collection. This talk talks about how traditional top-down or bottom-up Vulnerability Management is flawed and outdated. Stop using it.

Talk Room
15:00
15:00
15min
Are you smarter than a deepfake?
Rachel Bleiman

This talk presents a study that examines people’s ability and decision-making processes in detecting deepfakes. Survey respondents viewed a series of deepfake or AI generated/altered videos, images, and audios, mixed alongside a series of real media. Following their viewing of each piece of media, respondents rated their believability of it and provided factors that influenced their decision. The presentation will include a discussion of some of the possible dangers associated with the growing use and ease of creating deepfakes, examples of deepfakes that were used in the survey, and preliminary qualitative and quantitative findings from the study.

Talk Room
16:00
16:00
50min
Soft Skills, Soft Hearts: A Customer Success Directors Guide to Communication & Empathy.
Danny Akacki

Before the Cyber Security industry, there were Hackers. Ours is a proud culture of "hey what's this thing do?" Some of us are content to stay in the shadows. Poking, prodding, learning. What about those that want a seat at the table? Especially those to whom public speaking is as natural as breathing water. Let's chat about how to speak to those who don't innately speak out language. Let's hack our way to that seat at their table.

Talk Room
10:00
10:00
55min
Antennas 101 - How a weirly shaped piece of metal pulls in your cat videos
Tyler

Antennas are used by everyone, but not well understood. The basics aren't that tough. If it's not explained by Dr. R. F. Field or Mr. Mark E. Ting, then the concepts and theories are easily grasped.

Talk Room
11:00
11:00
50min
Hands on BLE Workshop
Libertyunix

This was previously accepted just offering to run this. Leo reached out and said to submit for tracking purposes.

Talk Room
12:00
12:00
90min
Lunch Break
Talk Room
13:30
13:30
50min
Networks of Philly: Exploring Philadelphia’s Hidden Network Infrastructure
Mike Dank / @Famicoman

Philadelphia’s network infrastructure is messy, clumsy, and often unseen by the general public. Wandering the streets, you may get a vague understanding of what’s going on—a manhole cover sits unassumingly on the crosswalk, or maybe a mysterious box with an antenna sits high upon a wall in a back alley, humming into the night. Under your feet and above your eye line, data is soaring by through brightly-lit fiber cable and ethereal radio transmission. The city is alive, but few may ever understand to what extent. Through this talk, we will take a look at pieces of networking infrastructure that are often hidden in plain sight and use them to understand the underlying communication networks that connect us all on a daily basis.

Talk Room
14:30
14:30
50min
Couch to 500k: An IR Marathon Survival Guide
Moose

We play how we practice, and there's no time like the present to hit the SIEM, flex that change control, and make sure all your business units are in shape.
Join LitMoose, a global incident responder who has handled single disk to 500k+ endpoint environments in the throws of attack, to talk about things you can be doing to prep yourself and your team for surviving the IR marathon. You never know when you'll wake up and find yourself running.

Talk Room
15:30
15:30
50min
An Introduction to Cloud Penetration Testing
Libertyunix

Cloud Penetration testing, while still similar to traditional penetration test, can provide it own set a challenges and nuances. Understanding how to apply common offensive security techniques to cloud environments is quickly becoming a critical skill set for penetration testers. This talk will introduce attendees to a practical approach of cloud penetration testing, tools of the trade, as well best practice work flows using IAC.

Talk Room
16:35
16:35
25min
Closing Cermony
Talk Room