Getting a list going of talks at these conferences that are being delivered by Crowd members… BSides speakers aren’t published on the website yet and the final round CFP just closed, so I may be missing folks. Please add on!
@jduck - Black Hat: Stagefright: Scary Code in the Heart of Android and again at Defcon
@jcran - Black Hat Arsenal: INTRIGUE
@jhaddix - Black Hat Arsenal: SecLists
@kymberlee - Black Hat: HI THIS IS URGENT PLZ FIX ASAP - Critical Vulnerabilities and Bug Bounty Programs
@kymberlee & Jake Kouns - Black Hat: Stranger Danger: What is the Risk From Third Party Libraries?
@jhaddix - Defcon: How to Shot Web: Web and mobile hacking in 2015
@pwn - Defcon: Backdooring Git
@kymberlee That’s a nice list. I am speaking at BSidesLV for the first time.
I’ve updated the original post with talks by
@jcran and @pwn, will update again with @krodzon and @Exodus’s BSides talks once they update their website and I’ve got something to link to…
@pwn - Skytalks: Financial Apocalypse Now. How to crack financial systems.
Looks like my talk is up at 11:25 on August 4th.
do you have an abstract to share and time of the talk?
We put together a guide to this week in Vegas, aka ‘Hacker Summer Camp’. There’s some shoutouts to the folks in this thread, as well as a wealth of other talks worth checking out:
Our blog has a full schedule of talks and presentations that we think people should check out this week at DEFCON, Black Hat and BSidesLV.
We also recorded a podcast, featuring interviews with
@jhaddix, @arcwhite, and @kymberlee. We give @pwn, @Exodus and @jduck a shoutout in the show.
Listen to our Hacker Summer Camp Guide podcast below and stay tuned for more podcasts coming later this week.
Read the full guide here.
Welcome to Bugcrowd’s 2015 Guide to Hacker Summer Camp, an overview of…
It is Sat. - 4pm -
The brief abstract:
Join John Menerick to learn the techniques to exploit and defend cyber financial crimes. Learn through live demos, war stories, and puzzles how to check if your financial software is securing the hardest to find places. Understand how cyber criminals may steal data or make money out of thin air, and disrupt key business programs.