Titanium Sponsors


Inquest

Inquest

Platinum Sponsors


Leonardo DRS

Leonardo DRS

Gold Sponsors


Modern Technology Solutions, Inc.

Modern Technology Solutions, Inc.


University of Dayton
Department of
Computer Science

University of Dayton - Department of Computer Science


Gluware

Gluware

Social Media

Our LinkedIn Group: OISF at LinkedIn


OISF on YouTube: OISF on YouTube


Presentation Archives


Miss a meeting? Forgot something in your notes?

Here are presentations previously done by Ohio Information Security Forum participants. They are organized by year and month, including Anniversary.

By Year:

2024

2023

2022

2021

2020

2019

2018

2016

2015

2013-2014

2011-2012

Archived Presentations:

2024:

February

Jason Adkin - A Gentle Introduction to Bitcoin

January

John Farrier - Active Career Management
An article on the content

Book List from the presentation: https://johnfarrier.com/non-fiction/
Books Mentioned:

  • Thinking, Fast and Slow
  • Principles: Life and Work

2023:

December

Dave Hatter - Software Security: The Critical Role of Software Bill of Materials
BONDS Robotics FRC 5811 - Introduction, mission, community support, and exploring tech

May

Solder-Defined Computers for Provable Immunity Against Hacking and Malware - Marc Abel

April

Relax: Humanizing Security - Ken Fanger

March

Differential Privacy for Privacy Protection in Federated Learning - Ahmed El Ouadrhiri

February

Intro to Reverse Engineering - Aaron Joiner

January

My Education - Greg Monett

2022:

December:

Network Protocols and Trust - Logan Prough

OISF 16th Anniversary Conference

(All presentations listed, available presentations linked)
Matt Scheurer - Becoming an IR Superstar
Scott Nusbaum - Ransomware Is NOT the problem
Dr. Phu Phung - Hybrid image-based approaches for modern malware classification
Micah Brown - How a 1993 CCG Prepared me for a Life in InfoSec
Jerod Brennen - Rethinking Cybersecurity in the Quantum Age
Deral Heiland - Evaluating the Security of an Enterprise IoT Deployment - From Acquisition to Support

Videos:
Videos
More links TBA

Original Agenda
Link

June

From the Current Events Presentation
2022 Data Breach Investigations Report(DBIR)
Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment

January

Mark Jeanmougin - Save Time with Modern Search Techniques
Mark Jeanmougin - Save Time with Modern Search Techniques
Alternate link

2021:

December

Ward Cunningham’s Txtzyme and Ken Boak’s SIMPL languages
OpenOffice format
Powerpoint format

Playbook for Threat Modeling Medical Devices
Download link

October

Toward a User-Centric and Code-Origin Policy Specification and Enforcement for Web-based Systems
Dr. Phu H. Phung, University of Dayton

September

Demo of REMnux (free VM created by SANS for malware analysis)
Presentation
Malware analysis cheat sheet
REMnux malware analysis tips

August

Recap of SANS Digital Forensics and Incident Response (DFIR) 2021 Conference - John Carls
Presentations from Recap
Reviewing this summer's critical Microsoft vulnerabilities - Jason Kinder

July

July Anniversary Conference Presentations:
Inside the Mind of a Threat Actor: Beyond Pentesting - Phillip Wylie
I Got 99 Problems but a WAF ain’t one - Micah Brown
Code Hedgehogs - Changing the "S" in SDLC to Secure - Penelope Rozhkova
Lend me your IR's! - Matt Scheurer

July Anniversary Conference Videos:
Opening Remarks - OISF President

Inside the Mind of a Threat Actor: Beyond Pentesting - Phillip Wylie

I Got 99 Problems but a WAF ain’t one - Micah Brown

Code Hedgehogs - Changing the "S" in SDLC to Secure - Penelope Rozhkova

A Look at Cellular Services in IoT technology - Deral Heiland

Chats, Cheats, and Cracks: Abuse of Collaboration Platforms in Malware Campaigns Edmund Brumaghin

Lend me your IR's! - Matt Scheurer

Video Download: Download Link

May

Infection Monkey and DNStwist - Jason Kinder

April

Cyberchef Workshop Lab File - Matt Scheurer

March

Covert Data Exfiltration - John Carls

All Presentations:
Link

Individual Presentations:
Air-Fi
aIR-Jumper
AiR-ViBeR
BitWhisper
Brightness
DiskFiltration
Fansmitter
GSMem
HVACKer
LED-it-GO
Magneto
Mosquito Speaker
Odini
Oops!...I think I scanned a malware
PowerHammer
POWER-SUPPLaY
USBee
xLED

February

Solarwinds Exploit (Solorigate)

January

Adaptive Security - Dale Shelinbarger

2020:

December

Links from December Presentation

October

Understanding and Getting Started with JupyterLab - Dale Shelinbarger
Link to Presentation

August

Defcon: Safe Mode Recap Links:
Defcon 28 main page (files)
Defcon on YouTube
Hack-A-Sat

July

Intro to NAND flash memory recovery - Deral Heiland
Reference Image 1
Reference Image 2
Reference Image 3

June

Free Hacking Resources Discovered during COVID-19 - John Carls

May

Introduction to Python - Dale Shelinbarger

February

LibraryBox and PirateBox Presentations - John Roberts
Open-Source Intelligence (OSINT) Reconnaissance - John Carls

January

Fruity Wi-fi - John Carls


2019:

November

Pi PoE - Raspberry Pi with Power over Ethernet - John Carls

September

Security Keys: Are they secure? - Dale Shelinbarger

August

Hacking With Critters - John Carls

July Anniversary

A Discussion of Secrets - Robert Stewart
Continuous Skills Improvement for Everyone - Matt Scheurer
DLP Demystified - Micah Brown
Pixel Tracking: How it’s used and abused - Barry Kimball

January

The path to IAM Maturity - Jerod Brennen
Hacking WordPress with WPScan - Zechary Carls


2018:

July Anniversary

Catching the Social Engineer - Robert Stewart
Hacking Identity, a PenTester's Guide to IAM - Jerod Brennen
Active Defense: Helping the Threat Actors Hack Themselves - Matt Scheurer
Planning and Executing a Red Team Engagement - Tim Wright

June

Kali Pi & Recon - John Carls

April

Making Kali Pi - John Carls


2016:

November

We're Watching You: An analysis of IP cameras through their firmware - Charles Monett
Link to scripts used in Charles' presentation


2015:

January

Simple Network Management Pwnd - Matthew Kienow
An Introduction to Bitcoin & Cryptocurrency - Josh Muller


Older Presentations (2013 - 2014):

February 2014

November 2013

October 2013

May 2013

March 2013


2011/2012

Disclaimer

The materials available here exclusively reflect the opinion of the author(s), and DOES NOT express the opinion or position of the Ohio Information Security Forum, its Board of Directors, and its Sponsors.

This material is available for educational purposes only. The Ohio Information Security Forum, its Board of Directors and sponsors are NOT RESPONSIBLE for its use or misuse. No warranties or guarantees implied or otherwise are in effect. Use of these tools, techniques and technologies are at YOUR OWN RISK.