CircleCityCon 2015 Building an Incident Response Program Lesley Carhart

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=DsNq-QqLixc



Duration: 3:06:01
6 views
0


CircleCityCon - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CircleCityCon
https://circlecitycon.org/

Our “Code of Conduct” is “Be Excellent to Each Other” AKA the Golden Rule.
Failing that, it is “Do not be an Ass* or we will kick your ass out!”.

Asking questions of a speaker during their talk to get clarity or debate a
point is not being an ass – heckling or haranguing the speaker is. If you are
not sure, ask, or err on the side of basic decency and common courtesy. If what
you are doing would not be acceptable to have done to you, your best friend,
your worst enemy, your sister, niece, daughter, brother, nephew, son, mother,
father, or any human being. don’t do it. Also do not let another person treat anyone else that way – whether you know them or not. If someone asks you to stop – stop.

If you are having an issue with a CircleCityCon participant of any badge type,
find a radioed member of our Security Operations Team in the red CircleCityCon t-shirts (or any staff member, in purple shirts) or the moderators on Discord if you are a virtual only participant. They will call our Safety &Medical Response Team (S.M.R.T), who will assist you in determining the next steps for you to feel safe and heard.

“Ham radio isn’t just what your grandpa does in the shed out back. Radios are an important piece of technology we use everyday, and amateur (“ham”) radio has been at the forefront of its development since day one — we are some of the original hardware hackers! DIY, exploration, and sharing has always been a vital part of our community and the goal of Ham Radio Village is to nurture this growth into the next generation of hams.”

The mission of the Open Organization Of Lockpickers is to advance the general public knowledge about locks and lockpicking. By examining locks, safes, and other such hardware and by publicly discussing our findings we hope to strip away the mystery with which so many of these products are imbued.

The more that people know about lock technology, the better they are capable of understanding how and where certain weaknesses are present. This makes them well-equipped to participate in sportpicking endeavors and also helps them simply be better consumers in the marketplace, making decisions based on sound fact and research.

The Open Organisation Of Lockpickers, or TOOOL, is an international group of lockpicking enthusiasts dedicated to advancing the general public knowledge about locks and lockpicking through teaching, research, and competition. TOOOL in the United States is a 501(c)(3) non-profit organization with Chapters in more than 20 states, including affiliated Chapters in Canada.

Welcome to the CircleCityCon Hardware Hacking village

Learn to solder (or up your game) in person with Blenster. Want to bring a kit to learn? Order one from Cyber City Circuits here:

https://shop.cybercitycircuits.com/products/mr-blinky-bling-8-led-round-soldering-kit

These kits were designed by Mr. Blinky Bling to be as beginner-friendly as possible and make a handy flashlight once completed. Batteries included! While you’re there check out their other projects and their amazing subscription

CHV is an interactive village with the goal of teaching, demonstrating, and gamifying car hacking. Visit us this year to see our Car Hacking 3D Simulator that we built for the goal of introducing the fundamentals of vehicle networks, vehicle diagnostic messages, and general vehicle hacking to the masses. The Simulator is also a CTF so whether you are new to car hacking or a seasoned professional, you’ll have a lot of fun competing and learning about this exciting field of hacking.




Other Videos By All Hacking Cons


2022-03-20CircleCityCon 2015 Smuggling Plums Using Active Defnse techniques to hide your web apps from your at
2022-03-20CircleCityCon 2015 Making Androids Bootable Recovery Work For You Drew Suarez
2022-03-20CircleCityCon 2015 Simulating Cyber Operations Do you want to play a game Bryan Fite
2022-03-20CircleCityCon 2015 Lessons Learned from Implementing Software Security Programs Todd Grotenhuis
2022-03-20CircleCityCon 2015 Shooting Phish in a Barrel and Other Terrible Fish Related Puns Amanda Berlin
2022-03-20CircleCityCon 2015 Keynote SpaceRogue
2022-03-20CircleCityCon 2015 Security Culture in Development Wolfgang Goerlich
2022-03-20CircleCityCon 2015 Wireless Intrusion Detection System with Raspberry Pi Chris Jenks
2022-03-20CircleCityCon 2015 Is that a psvsvc in your pocket Jake Williams
2022-03-20CircleCityCon 2015 I Amateur Radio And So Can You Kat Sweet
2022-03-20CircleCityCon 2015 Building an Incident Response Program Lesley Carhart
2022-03-20CircleCityCon 2015 Security Auditing Android Apps Sam Bowne
2022-03-20CircleCityCon 2015 Using Evernote as an Threat Intelligence Management Platform Grecs
2022-03-20CircleCityCon 2015 How to Budget for IDS Brian Heitzman
2022-03-20CircleCityCon 2015 Building a Comprehensive Incident Management Program Owen Creger
2022-03-20CircleCityCon 2015 Running Away from Security Web App Vulnerabilities and OSINT Collide Micah Hoffma
2022-03-20CircleCityCon 2015 Ruby Not just for hipster Carl Sampson
2022-03-20CircleCityCon 2015 Using Evernote as an Threat Intelligence Management Platform Grecs part2
2022-03-20CircleCityCon 2015 How not to Infosec Dan Tentler
2022-03-20CircleCityCon 2015 Analyzing the Entropy of Document Hidden Code Adam Hogan
2022-03-20CircleCityCon 2015 Reverse Engineering Windows AFDsys Steven Vittitoe



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering