If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

Stop wasting time looking for files and revisions. Connect your Gmail, Drive, Dropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account. View Edit

To edit this page, request access to the workspace. Already have an account? Log in! BSidesMemphis 2014 When: Saturday, September 13, 2014 9:00 AM - 6:00 PM Where: Southwest TN Community College Fulton Auditorium 5983 Macon Cove Memphis, TN 38134 Cost: FREE . Campus Map for Southwest TN Community College: macon.pdf Registration Is Now Open! Register With This Form: Online Ticketing for Security B-Sides Memphis 2014 powered by Eventbrite Secure Coding Training On Friday, Sept. 12, leading up to the conference day, Jim Manico (@manicode, manico.net) will teach a free course in secure coding at this year's BSidesMemphis. Registration for the course is separate from the conference registration and seating is limited. Use this form to register but please only register if you expect to attend. When: Friday, September 12, 2014 12:00 PM - 5:00 PM Where: Southwest TN Community College Farris Auditorium 5983 Macon Cove Memphis, TN 38134 Cost: FREE . Sell Tickets through Eventbrite Sponsors Sponsors make BSidesMemphis possible, and we appreciate all levels of sponsorship. Please see BSidesMemphis 2014 Sponsorship Kit for more details. Call for Presentations BSidesMemphis 2014 Call for Presentations is now closed. Schedule Friday September 12, 2014 12 PM - 5PM FREE Secure Coding Training Saturday September 13, 2014 9:00 AM - 9:30 AM Check-in & Registration 9:30 AM - 9:50 AM 3rd Year Kickoff & Keynote

10 AM - 10:50 AM Dave Chronister: Give me your data! 11:00 AM - 11:50 PM Roxy (@theroxyd) - Make space for STEM education

12:00 PM - 1:00 PM

LUNCH!!! / Firetalks

1:00 PM - 1:50 PM Kyle Maxwell (@kylemaxwell) - Hackertainment 2:00 PM - 2:50 PM Ben Miller (@securithid) - Why you can't prove you're PWND but you are! 3:00 PM - 3:50 PM Brian "Hermit" Mork (@hermit_hacker) - Cracking With The Enemy 4:00 PM - 4:50 PM Charline Nixon, Ph.D - The Art of Mobile Forensics 5:00 PM - 6:00 PM Prizes, Closing Remarks & Participant Feedback 7:00 PM - ??? BSidesMemphis After Party @ Brinson's Downtown Chicken Lounge (live Soul band) - Map & Direction: http://bit.ly/1uDX1Lx) , Sponsored by Parameter Security FIRE TALKS!!! If you have ideas for a talk that is 10-15 minutes long, be sure register for BSidesMemphis lunch fire talks. See registration table at the event for more details. Presentation Abstracts Why you can’t prove you’re PWND, but you are! (Why you are compromised and don’t know it.) 2013 was the year of the hacker. Network breaches made media headlines everywhere you turned. Was your company one of them? If not, did you check all of your systems, metrics, users, and logs to ensure unauthorized access did not occur? Did you find evidence of a breach? Of course not, you are GLBA/HIPAA/PCI compliant! That means you are secure, right? WRONG! In this eye-opening presentation, Ethical Hacker, Ben Miller reviews network baselines, how Trojan activity (which could be on your network RIGHT NOW) is extremely hard to detect if you aren’t properly looking for it. Using tools that are readily available to any wannabe malicious attacker, Miller demonstrates how hiding traffic in home and corporate networks can evade detection. The FUD will be kept to a minimum but the “secret” to protecting your networks will be unveiled. Make space for STEM education Roxy from TheLab.ms will talk about her experience from her first 2600 meeting and how important it is to provide learning experiences for both adults and children in order to provide opportunities. As a woman and a newb, it was hard for her to get the courage to even go to the first meeting. The community ended up being very welcoming. Along with this wonderful community, she found a few people willing to start up a makerspace. The Lab is creating a place for people to get together to learn, collaborate, and inspire new ideas. Roxy would like to share the process, along with lessons learned and inspire others to contribute to community projects to share information. Also, this talk will touch on the importance of STEM education at an early age, and inspire others to teach and educate no matter what level they are at.​ Hackertainment Rather than raid for more epic purples on your Level 90 Dwarven Warrior or boomheadshot some n00bs, you can spend your "gaming" time doing what we love best: hacking for sheer entertainment value. We'll talk about all sorts of different ways to do this, from hacking CTFs to mathlete coding competitions.



This talk has something for all skill levels, also. Whether you're an old hand at assembly coding since the 8088 or just started learning about HTML and Excel macros; whether you smashed the stack for fun before there was profit or think the padlock in your browser means the server is secure; there's something here for you.



Give me your data!

We hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this talk was from the idea that even today, data is still not stored securely. Ethical Hacker conducted a research project in which he wanted to find out if he could gain access to sensitive data. The catch? He would not hack any systems, all data must be collected legally. From buying devices on Facebook and bidding for Hard Drives on Ebay, to monitoring public photo sharing sites; Dave will discuss the methods to retrieve the information. Dave will show his findings, some of which is very surprising. Cracking With The Enemy It's becoming cliche to use distributed systems to tackle large volume sets, but have you ever considered how you might do it when every node, every participant, is against you? Cracking With The Enemy will discuss the design choices and approach that were used in the creation of CAS53214, a free, open source, distributed password cracker with a twist: it cryptographically isolates each node and doesn't trust any of the answers it receives.



Brian Mork (@hermit_hacker) was one of the two lead designers and implementers of this solution, which was used in the DefCon 19 Crack Me If You Can contest to allow two people to run the efforts of 20+ contributors. The Art of Mobile Forensics Abstract TDB Contact/Connect Info Social Media Twitter - @BsidesMemphis

Please use the tag #BsidesMemphis for content related to this event Planners Jimmy Butler - @Jimmy_Butler_14

Thomas Le - @lotusr00t Volunteers Eli Kirby - @E_Kirby

Daniel Lissner - @speakingcode

Josh Scott - @scottjosh

Charline Nixon - @CharlineNixon Invite your friends by posting this on Twitter: " #BSidesMemphis September, 13,2014: Discover the next big thing! http://bit.ly/1t2IR5X Tags for flickr, twitter, blog, etc. Please use the tag #BSidesMemphis for picture, tweets, and other social media posts. CPE Print this form and ask any of BSidesMemphis organizers to sign it if you need proof of attendance for your CPE (Continuing Professional Education) credits.

BSidesMemphis 2014 Tip: To turn text into a link, highlight the text, then click on a page or file from the list above. Printable version