A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Louisville Infosec 2014 Videos

Louisville Infosec 2014 Videos

        Below are the videos from the Louisville Infosec 2014 conference. Thanks to @theglennbarrett, @f0zziehakz and @bridwellc for helping me record.

Opening Ceremony

All of Your Compliance Needs with One Methodolgy
Jim Czerwonka

Lockade: Electronic Games for Locksport
Adrian Crenshaw

What's Hiding in Your Software Components? Hidden Risks of Component-Based Software Development: Seeing the Forest Through the Trees
Ryan Berg (No show?)

Mining Data from the Windows Registry
Jason Hale

Identity Theft: Who's in YOUR Wallet?
Richard Starnes & Rick Nord

Mobile Telephony for InfoSec Practitioners
Daniel Helton

A Crosswalk of the Department of Defense (DoD) Information Assurance Certification and Accreditation Process (DIACAP)
John McLain

Building an Enterprise DDoS Mitigation Strategy
Mitchell Greenfield

Practical interception of mobile device traffic
Jeremy Druin

Changing What Game- One Future for Information Security
Michael Losavio

Trash Talkin - IT Audit Guide to Dumpster Diving
John Liestman

Linking Users to Social Media Usage on Android Mobile Devices
Ryan Ferreira

Origin of CyberSecurity Laws - An Insider's Story
Steve Riggs

A Place at the Table
Kristen Sullivan

What your Web Vulnerability Scanners Aren't Telling You
Greg Patton

ISSA Awards

Creating the Department of How: Security Awareness that makes your company like you.
Ira Winkler

Are You Really PCI DSS Compliant? Case Studies of PCI DSS Failure!
Jeff Foresman

Where does Data Security fit into the Data Quality strategy?
Michael Vincent

Closing Ceremony

Downloads
https://archive.org/details/LouisvilleInfosec2014
 

 

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast