Help Irongeek.com pay for bandwidth and research equipment:
AIDE 2011 Conference Videos (Hacking Illustrated Series InfoSec Tutorial
AIDE 2011 Conference Videos
These are the presentations from the
AIDE 2011 conference at Marshall
University. We had some issues early on with the schedule not matching the
talks, so descriptions are incomplete. The descriptions I do have are largely Ligatted from the
Common Darknet Weaknesses
Presented by Adrian Crenshaw MCSE NT 4, CNE, A+, Network+. i-Net+ "Irongeek"
Ok, this talk did not come out quite as well as I hoped. I should be able to
polish it more before Defcon
Darknets/Cipherspaces such as Tor and I2P have been covered before in great
detail. Sometimes it can be hard to follow attack strategies that have been used
against them as the papers written on the topic have been academic and abstract.
What this talk will attempt to do is step back and give an overview of the topic
in a manner hopefully more conducive to the understanding of security
practitioners, giving more concrete examples. While little to nothing in this
talk will be "new and groundbreaking" it should lead to a better understanding
of how encrypted anonymizing networks can be subverted to reveal identities.
Recent HIPAA/HITECH Changes
Presented by Caleb Knight
As part of the American Recovery and Reinvestment Act of 2009, Congress enacted
the Health Information Technology for Economic and Clinical Health (HITECH) Act
to broaden and increase HIPAA's scope of protecting the privacy and security of
personal health information. This talk will provide an overview of the HITECH
Act and examine some of the recent changes.
Hacking A Mature Security Program
Presented by David Kennedy, OSCE, OSCP, GSEC, MSCE, CISSP "ReL1K" http://www.secmaniac.com/
Most organizations are acclimated to the standard penetration tests we see in
the industry. For those companies that have proactively been increasing their
overall security posture through years of program maturity and hard work need
something different. This talk will cover tailoring a penetration test based on
the security level of the target and ripping through their security environment
with some crazy sophistication. We'll be going into depth on the future of
penetration testing through the Penetration Testing Execution Standard (PTES)
and what it takes in order to elevate your security posture in today's crazy
world.This is a technical talk, not for the faint of heart, and some direction
on where we need to head in the security industry.