been told frequently to put it away in public; otherwise, youll find him at work devoid of any form of social life. In the live demo, we leverage Amazon Web Services EC2 Cloud-Init scripts and object storage for provisioning automated security configuration, integrating encryption, including secure encryption key repositories for secure server's communication. Zack Allen is an RIT graduate, majoring in Information Security. Having progressed through the ranks to hiring manager and director level, he has experienced the pain from both sides of the hiring process and desires to improve the situation for the InfoSec community. Gregory Pickett cissp, gcia, gpen has a background in intrusion analysis for Fortune 100 companies but now heads up Hellfire Securitys Managed Security Services efforts and participates in their assessment practice as a network security subject matter expert. Return to Top REpsych: Psychological Warfare in Reverse Engineering Chris Domas Security Researcher Your precious 0-day?
Can who you are reveal what patterns you create? From BBSin' back in the day to placing second in the network forensics challenge last year he knows what he's doing. Twitter: @parttimesecguy Éireann Leverett hates writing bios in the third person. Regin (fvey) and snowglobe aka. He is the CTO of Resilient Systems. In this role, Gorenc leads the Zero Day Initiative (ZDI) program, which is the worlds largest vendor-agnostic bug bounty program. Richo and Mike will investigate the security of several popular skateboards, including Boosted's flagship model and demonstrate several vulnerabilities that allow complete control of a an unmodified victim's skateboard, as well as other attacks on the firmware of the board and controller directly. As an independent researcher, he has investigated a variety of well-known products and network protocols for design and implementation flaws. His influential newsletter Crypto-Gram and his blog Schneier on Security are read by over 250,000 people. These low-tech strategies are effective, but recently a new, high-tech scam strategy has emerged relying upon malware specifically targeting the Steam micro-economy.