Schedule 2014

Thursday


Time/Track T-Rex Velociraptor Stegosaurus Brontosaurus
8:45 AM Welcome to GrrCON
hosted by EggDropX
9:00 AM Around the world in 80 Cons (A tale of perspectives)
Jayson E Street
10:00 AM Infosec in the 21st century
Tim Crothers
Beating the Infosec Learning Curve Without Burning Out
Scott ‘secureholio’ Thomas
Advanced Threats and Lateral Movement Protection
Terrance Davis
Executive Summit
Setup
10:30 AM Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data
Todd Bursch
11:00 AM Securing our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin Johnson
Picking Blackberries
Thomas ‘G13′ Richards
New World, New Realities: Endpoint threat Detection, Response and Prevention
Brian Orr
Executive Summit
Setup
11:30 AM Reducing Your Organization’s Social Engineering Attack Surface
Jen Fox
NOON -= Lunch Break =-
1:00 PM Social Engineering Can Kill Me, But It Can’t Make Me Care
Gavin ‘Jac0byterebel’ Ewan
Exercising with Threat Models
J Wolfgang Goerlich
Memory Forensics with Hyper-V Virtual Machines
Wyatt Roersma
Executive Summit
Invite Only
2:00 PM Closed for setup
Henry Rollins
Seeing Purple: Hybrid Security Teams for the Enterprise
B3ltfac3
$#!T My Industry Says. . .
Kellman Meghu
3:00 PM CryptoRush – Rising from the Ashes
King Dragon
Bringing PWNED To You: Interesting Honeypot Trends
Elliott Brink
3:30 PM The Security Implications of Software Defined Networks
Shane Praay
4:00 PM Autonomous Remote Hacking Drones
Dr. Phil Polstra
Lessons from the front lines: Top focus areas for information security leaders
Shogo Cottrell
4:50 – 5:50 After Party w/Dinner
6:00 PM Guest Enterntainment
Henry Rollins

Friday

Time/Track T-Rex Velociraptor Stegosaurus Brontosaurus
9:00 AM Finding Our Way – From Pwned to Strategy
David Kennedy
10:00 AM Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez
Proof That Windows Computer Forensics is Sexy
Kyle ‘Chaoticflaws’ Andrus
How to budget IDS’s
Brian ‘Arcane’ Heitzman
Hack the Hustle! Career Strategies For Information Security Professionals
Eve Adams
10:30 AM LEVIATHAN: Command and Control Communications on Planet Earth
Kevin Thompson
11:00 AM Security Hopscotch
Chris Roberts
BioHacking: Becoming the Best Me I Can Be
Leonard
Red Teaming: Back and Forth, 5ever
FuzzyNop
The Challenge of Natural Security Systems
Rockie Brockway
NOON -= Lunch Break & Board Breaking Challenge =-
12:30 PM Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x
Vulnerable By Design – The Backdoor That Came Through the Front
Matthew ‘mandatory’ Bryant
GrrCON TAP overview
Abe Jones
GrrCON TAP moved to Stegosaurus Ballroom
Abe Jones
1:00 PM Look Observe Link (LOL) – How I learned to love OSINT
NinjaSl0th
OAuth2.0 – It’s the Implementation Stupid!!
Tony Miller
Intelligence Driven Security
Shane Harsch
Application Pen Testing
Chris Pfoutz
2:00 PM ZitMo NoM
David “HealWHans” Schwartzberg
Breach Stains
Matt ‘The Streaker’ Johnson
Security for the People: End-User Authentication Security on the Internet
Mark Stanislav
Advanced Breaches of 2013 vs. Behavioral Detection
Charles Herring
3:00 PM Bigger Boys Made Us
Mike Kemp
Are you a janitor, or a cleaner?
John ‘geekspeed’ Stauffacher & Matthew ‘Mattrix’ Hoy
Hackers Are People Too
Infosystir
Security On The Cheap
Joel Cardella
4:00 PM Full Douchesclosure
Duncan Manuts
PCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former
Vaccinating APK’s
Milan Gabor
Hacking Android
Godfrey Nolan
5:00 PM Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron ‘Finux’ Finnon
6:00 PM Closing Ceremony
hosted by EggDropX