Ohio Information Security Forum

Event Information:

Event Date: July 13th, 2013

Location:SCC Research Park Auditorium

Time: 8:00AM-5:00PM

Registration/Payment:Link

Speakers:Link



OISF July Anniversary

Time/Place

The July Anniversary meeting will be held on July 13th at:

Miami Valley Research Park - Sinclair Learning Center
1900 Founders Drive
Suite 100
Dayton, Ohio 45420


Registration/Payment:

In order to attend this event, registration is required. This can be done in advance through the Paypal link below:

In addition, cash ($10 payment) will be accepted on the day of the event.

Speakers

Here is a list of the speakers(in no particular order) that will be at this year's Anniversary Event. Additional information will be posted as it becomes available.

Click on a link to find out more about a speaker.

Chris Eagle
Georgia Weidman
Martin Bos
Deviant Ollam
Adrian Crenshaw

Chris Eagle

Chris Eagle is a Senior Lecturer of Computer Science at the Naval Postgraduate School (NPS) in Monterey, CA. A computer engineer/scientist for 28 years, his research interests include computer network operations, computer forensics and reverse/anti-reverse engineering. He has been a speaker at conferences such as Black Hat, Infiltrate, Shmoocon, and Defcon and is the author of "The IDA Pro Book". In his spare time he is the Dean of Hacking for the Sk3wl of r00t, past champions of the Defcon CTF, and a core member of DDTEK, the most recent organizers of Defcon CTF.

Go Back

Georgia Weidman

Georgia Weidman is the Founder and CEO of Bulb Security, LLC, a security consulting and research firm. Georgia is a penetration tester, security researcher, and trainer. She has presented her work at top conferences around the world including the Blackhat Briefings, Shmoocon, Derbycon, and many others. Georgia has delivered highly technical security trainings covering topics such as penetration testing, mobile hacking, and exploit development for conferences, schools, corporate clients, and online to excellent reviews. Georgia's primary research area is mobile device security. Her groundbreaking work in mobile botnets and assessing the security posture of smartphones has been featured on news programs such as 16x9 The Bigger Picture on Global TV Canada and Fox News Live.

Additionally, Georgia has been quoted as a subject matter expert in publications such as PC World, CNN Money, MIT Technology Review, and Ars Technica. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security, culminating in the release of the Smartphone Pentest Framework (SPF) which allows pentesters to assess the security of mobile devices in an environment. Georgia holds an M.S. in computer science with emphases in secure software and information security as well as CISSP, CEH, OSCP, and NIST 4011 certifications.

Go Back

Martin Bos
Kali Linux: Backtrack-Linux reborn

After a successful run of seven years and five versions of Backtrack Linux, the core development team decided it was time for a change. Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. This talk will cover the development and reasoning behind the name change, as well and the switch to the Debian platform. Kali is a Linux distribution specifically geared towards professional penetration testing and security auditing. We will discuss what is new in Kali and what is the same, as well as getting started with Kali on a pentest.

Martin Bos is a principal security consultant with the Accuvant LABS attack and penetration team with multiple years of experience in information technology. Martin specializes in black-box penetration testing, social engineering, physical security testing and red team engagements. Martin Bos is a core developer of the Kali Linux project and one of the founders of the Derbycon security conference held in Louisville, Kentucky annually.

Go Back

Deviant Ollam

Deviant Ollam's first and strongest love has always been teaching. A graduate of the New Jersey Institute of Technology's Science, Technology, & Society program, he is always fascinated by the interplay that connects human values and social trends to developments in the technical world. While earning his BS degree at NJIT, Deviant also completed the History degree program at Rutgers University.

While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant is also a member of the Board of Directors of the US division of TOOOL, The Open Organisation Of Lockpickers. Every year at DEFCON and ShmooCon Deviant runs the Lockpick Village, and he has conducted physical security training sessions for Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, ekoparty, AusCERT, GovCERT, CONFidence, the FBI, the NSA, DARPA, and the United States Military Academy at West Point. His favorite Amendments to the US Constitution are, in no particular order, the 1st, 2nd, 9th, & 10th.

Go Back

Adrian Crenshaw
Webshells: History, Techniques, Obfuscation and Automated Collection

Web shells are a common tool attackers use to give themselves a backdoor and greater control of a website/host after they have initially gotten in via other vulnerabilities. This talk will be on the history, function and obfuscation tricks used by web shells, as well as the automated collection techniques Adrian has been using to collect them.

Adrian Crenshaw has worked in the IT industry for the last fifteen years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for the tests himself. He holds a Master of Science in Security Informatics and is also one of the co-founders of Derbycon.

Go Back