Hacker Halted

/Tag:Hacker Halted

Hacker Halted: SWAG Edition

Because Techno Security 2008 and the Access Data User's Conference was held during the same time as Hacker Halted, there were a decent amount of vendors on the expo floor. Most of the vendors were forensics oriented like Guidance and Access Data, but I was happy to see Core Security there. Even the NSA, FBI, [...]

2008-06-05T23:50:54-07:00 June 5th, 2008|Security Conferences|2 Comments

Hacker Halted: Summary

  This was my first time at the Hacker Halted conference, and it was quite enjoyable. I loved the venue, and the talks were informative. One major disappointment was that Howard Schmidt didn't talk as planned due to travel issues. It's not the conference's fault, but I thought his talk would be the highlight of [...]

2017-03-12T17:40:27-07:00 June 4th, 2008|Security Conferences|1 Comment

Hacker Halted: Day 3 Notes

Here are my notes from the third day of the Hacker Halted conference. An Ethical Hacker's Perspective to Network Access Control Antivirus software is just a checkbox to most companies Layered security is a must Ghosts in the Browser paper - Tons of drive by downloads Gartner said by the end of 2007, 75% of [...]

2008-06-03T23:23:46-07:00 June 3rd, 2008|Security Conferences|0 Comments

Hacker Halted: Day 2 Notes

Here are my notes from the second day of the Hacker Halted conference. Inside the Storm Brandon Enright - Exposing Stormworm presentation Virtual Worlds - A Wild Frontier Or New World Order? NDU IRMC - Information Resources Management College Virtual worlds provide an easy environment for users to get profiled Many new virtual environments are [...]

2017-03-12T17:40:27-07:00 June 2nd, 2008|Security Conferences|0 Comments

Hacker Halted: Day 1 Notes

Here are my notes from the first day of the Hacker Halted conference. Keynote Address - OSI Exposed & Examined Level 8 politics, level 9 religion, level 10 economics $200 per workstation is average for IT budget 10% of that budget should be the security budget at the least If no security budget, do one [...]

2017-03-12T17:40:27-07:00 June 1st, 2008|Security Conferences|0 Comments