theSummit(year = 2014);

Featured Guests

The following exness Def Con, Passwords 14, and BSidesLV speakers have confirmed they will be attending theSummit.

The Crowdtilt for VIP access to theSummit's featured guests has ended but you can still skip the line by picking up a exness register general admission ticket early at the standard admission Crowdtilt. Thanks to everyone who donated theSummit is well on its way to its best year yet.

Guest Conference Talk
Jayson Street @jaysonstreet Def Con "Around the world in 80 cons” - A Perspective
Jessy Irwin BSidesLV #edsec: Hacking for Education
Gregory Pickett @shogun7273 Def Con Abusing Software Defined Networks
Josh Perrymon @packetfocus Def Con Advanced Red Teaming: All Your Badges Are Belong To Us
Evan Davison BSidesLV Allow myself to encrypt...myself!
Greg Foss BSidesLV Attacking Drupal
Dan Cvrcek Passwords 14 Authentication in the Cloud – Building Service
David Lister BSidesLV Back Dooring the Digital Home
Dimitri Fousekis Passwords 14 Beam Me Up Scotty! – Passwords in the Enterprise
Nir Valtman Def Con Bug Bounty Programs Evolution
Zoltan Balazs @zh4ck Def Con Bypass firewalls, application white lists, secure remote desktops under 20 seconds
Aaron Crawford BSidesLV C.R.E.A.M. - The Art Of Social Engineering Report Writing
Adrienne Merrick BSidesLV Can I Code Against an API to Learn a Product?
Dhia Mahjoub @dhiaLite Def Con Catching Malware En Masse: DNS and IP Style
David Wyde Def Con Client-Side HTTP Cookie Security: Attack and Defense
Philip Polstra, Dr. @ppolstra Def Con Cyberhijacking Airplanes: Truth or Fiction?
Peter Teoh Ptzero @pteoh Def Con Data Protection 101 - Successes, Fails, and Fixes
Joe Grand Kingpin @Joegrand Def Con Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
Larry Pesce @haxorthematrix Def Con DEF CON Comedy Jam Part VII, Is This The One With The Whales?
Alex Rothman Shostack @ars_infosectica Def Con DEF CON Comedy Jam Part VII, Is This The One With The Whales?
Steve Thomas Passwords 14 Defense with 2FA; Bitslice DES with LOP3.LUT
Robert Rowley Def Con Detecting and Defending Against a Surveillance State
Grant Bugher @fishsupreme Def Con Detecting Bluetooth Surveillance Systems
Paul Vixie, Dr. Def Con Domain Name Problems and Solutions
Zoz Def Con Don't Fuck It Up!
Adrian Crenshaw @irongeek_adc Def Con Dropping Docs on Darknets: How People Got Caught
Tess Scrodinger Def Con From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
Philip Young Soldier of fortran @mainframed767 Def Con From root to SPECIAL: Pwning IBM Mainframes
Brandy Bloxham Def Con Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
Maggie Jauregui @magsjauregui Def Con Girl… Fault-Interrupted.
Mike Baker @gtvhacker Def Con Hack All The Things: 20 Devices in 45 Minutes
Amir Etemadieh @cj_000 Def Con Hack All The Things: 20 Devices in 45 Minutes
CJ Heres @zenofex Def Con Hack All The Things: 20 Devices in 45 Minutes
Cristian Dameff Quaddi @CDameffMD Def Con Hacking 911: Adventures in Disruption, Destruction, and Death
Peter Hefley @PeterHefley Def Con Hacking 911: Adventures in Disruption, Destruction, and Death
Jeff Tully R3plicant @JefftullyMD Def Con Hacking 911: Adventures in Disruption, Destruction, and Death
Tod Beardsley @todb Def Con How to Disclose an Exploit Without Getting in Trouble
Elie Bursztein Def Con I am a legend: Hacking Hearthstone with machine learning
Celine Bursztein Def Con I am a legend: Hacking Hearthstone with machine learning
Yiannis Chrysanthou T0XIC @yiannistox Passwords 14 I have the #cat so I make the rules
Shahar Tal Def Con I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Tony Robinson BSidesLV Cut the Sh**: How to reign in your IDS
Mike Larsen Def Con Impostor - Polluting Tor Metadata
Charlie Vedaa @charlievedaa Def Con Impostor - Polluting Tor Metadata
Guillaume Ross BSidesLV iOS URL Schemes
Greg Anderson @rgbkrk Def Con Is This Your Pipe? Hijacking the Build Pipeline.
Kyle Kelley Def Con Is This Your Pipe? Hijacking the Build Pipeline.
Scott Erven Def Con Just What The Doctor Ordered?
Shawn Merdinger Def Con Just What The Doctor Ordered?
Jesus Molina @verifythetrust Def Con Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment
Ryan Lackey Def Con Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
Dan Tentler @viss Def Con Mass Scanning the Internet: Tips, Tricks, Results
Alex Pinto @alexcpsec Def Con Measuring the IQ of your Threat Intelligence feeds
Geoff McDonald Def Con Meddle: Framework for Piggy-back Fuzzing and Tool Development
Felix Leder Def Con NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
Anthony Czarnik BSidesLV No InfoSec Staff? No Problem.
Teddy Reed Def Con NSA Playset: DIY WAGONBED Hardware Implant over I2C
Nicholas Jacobsen Loki Def Con NSA Playset: GSM Sniffing
Miles Crabill Def Con NSA Playset: PCIe
Joe Fitzpatrick @securelyfitz Def Con NSA Playset: PCIe
Dean Pierce Def Con NSA Playset: PCIe
Tim Mcguffin Medic @notmedic Def Con One Man Shop: Building an effective security program all by yourself
Carlos Munoz BSidesLV Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
Jason Malley Noobz Def Con Paging SDR... Why should the NSA have all the fun?
Jeff Thomas Xaphan Def Con Paging SDR... Why should the NSA have all the fun?
Jolly A. @Jolly Def Con Panel - Diversity in Information Security
Jennifer Imhoff-Dousharm Lil Jinni @lil_jinni Def Con Panel - Diversity in Information Security
Kristin Paget Def Con Panel - Diversity in Information Security
Carl Vincent Vyrus @Vyrus001 Def Con Panel - Diversity in Information Security
Jean-Philippe Aumasson Passwords 14 Password Hashing Competition: the Candidates
Jarred White Passwords 14 Password Security in the PCI DSS
Nathan Power Passwords 14 Penetrate your OWA
Glenn Wilkinson Def Con Practical Aerial Hacking & Surveillance
Bob Bathurst evilrob @peaksec Def Con PropLANE: Kind of keeping the NSA from watching you pee
Mark Carey Phorkus Def Con PropLANE: Kind of keeping the NSA from watching you pee
Russ Rogers Def Con PropLANE: Kind of keeping the NSA from watching you pee
Aaron Bayles Alxrogan @Aalxrogan Def Con Protecting SCADA From the Ground Up
Casey Dunham BSidesLV Pwning the Hapless or How to Make Your Security Program Not Suck
John Fulmer Dakahuna Def Con RF Penetration Testing, Your Air Stinks
Rick Mellendick RMellendick @rmellendick Def Con RF Penetration Testing, Your Air Stinks
Elijah Def Con Saving Cyberspace by Reinventing File Sharing
Michael Mcatee Def Con ShareEnum: We Wrapped Samba So You Don’t Have To
Lucas Morris Def Con We Wrapped Samba So You Don’t Have To
Heather Plikington BSidesLV So, you want to be a pentester?
Mike Petruzzi Wiseacre @wiseacre_mike Def Con Standing Up an Effective Penetration Testing Team
Paul Drapeau @pdogg77 Def Con Steganography in Commonly Used HF Radio Protocols
Brent Dukes @TheDukeZip Def Con Steganography in Commonly Used HF Radio Protocols
Tom Holt @spartandevilshn Def Con Stolen Data Markets: An Economic and Organizational Assessment
Nicholas Percoco @iamthecavalry Def Con The Cavalry Year[0] & a Path Forward for Public Safety
Sam Crowther Passwords 14 The future of mobile authentication is here
Eric Rand BSidesLV The Lore shows the Way
Michael Ossmann Def Con The NSA Playset: RF Retroreflectors
Richard Thieme @neuralcowboy Def Con The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
Patrice Coles BSidesLV Third-Party Service Provider Diligence: Why are we doing it all wrong?
Danny Howerton Metacortex @metacortex Def Con Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
Nathaniel Davis BSidesLV Training with Raspberry Pi
Mickey Shkatov Def Con USB for all!
Christian Rechberger Passwords 14 Using cryptanalysis to speed-up password cracking
Shane Macaulay Def Con Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Jeremi Gosney Passwords 14 Welcome to Passwords14 Las Vegas!
Nick Rosario MasterChen BSidesLV What I've Learned as a Con Man
Marsh Ray Passwords 14 What Microsoft would like from the Password Hashing Competition
Greg Zaverucha Passwords 14 What Microsoft would like from the Password Hashing Competition
Dustin Hoffman Def Con What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)
Thomas Kinsey TK Def Con What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)

About EFF

Blending the expertise of lawyers, policy analyst, activists and technologists, EFF achieves exness com significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits, even when that means taking on the U.S. Government or large corporations.



About Vegas 2.0

A transient, a local or a weekend Vegas Warrior, however you peg us, we are THE Las Vegas InfoSec group. Our members are long time DEF CON and Computer Security Industry avant gardes. When we are not planning theSummit, we spend our fee cycles conjuring up Social Engineering, Web and Windows attacks. We are always looking for new locals to Las Vegas OR frequent visitors to stop by our labs for a beer and some InfoSec foo!

Content © 2014. Vegas 2.0. All rights reserved.