[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0DAB602EAD833D44B10F51A28F258A11011CDA0C@helix1.secure-dna.com>
Date: Tue, 19 May 2009 12:39:31 -1000
From: "Shakacon" <info@...kacon.org>
To: <bugtraq@...urityfocus.com>
Subject: Shakacon Security Conference - Trainers and Speakers Finalized
Aloha from Hawaii:
Due to the global economic meltdown there has never been a better time
to travel to Hawaii. Why not take a cheap trip to paradise and catch
some world class training and talks at the same time?
Training and speakers are finalized for the conference. Some special
discounts are in place so check the site for details - www.shakacon.org.
Special hotel rates have been negotiated with the Ala Moana Hotel which
is across the street from the convention center.
SELECTED TRAINING COURSES:
Deviant Ollam - 1 Day Course
\__Mastery of Physical Security
Joe McCray - 2 Day Course
\__Crash Course on Penetration Testing & Web Application Security
Jared DeMott - 3 Day Course
\__Application Security: For Hackers and Developers
Scott Lambert & Jason Geffner - 3 Day Course
\__Introduction to Malware Analysis
Ryan Wentzel - 3 Day Course
\__Computer Forensics: Handling Live Systems with Open-Source Tools
SELECTED SPEAKERS:
Mark Ryan Talabis
\__Dangerous Minds: The Art of Guerilla Data Mining
Wendel Guglielmetti Henrique and Sandro Gauci
\__The Truth about Web Application Firewalls
Mark Stamford
\__$1.7 Trillion Under Siege
Jared DeMott
\__Exploit or Exception?
Riley Hassell
\__Exploiting Rich Content
Matthieu Suiche
\__Challenge of Windows physical memory acquisition and exploitation
Moti Joseph
\__Microsoft patches little sister but forgets big brother
Deviant Ollam
\__Packing and the Friendly Skies
Luke McOmie (Pyr0)
\__The Art of Espionage
Tiller Beauchamp
\__Dynamic Tracing for Exploitation and Fuzzing
Sarah Blankinship and Jon Pincus
\__Securing With the Enemy: Social Strategy and Teams of Rivals
Alberto Revelli and Nico Leidecker
\__Playing with Heyoka: Spoofed Tunnels and Undetectable Data
Daniel Blander
\__Emerging Trends in Security and Risk Management
Andrea Barisani & Daniele Bianco, Inverse Path
\__Sniff keystrokes with lasers/voltmeters: Side Channel Attacks
Paul Craig
\__Rage Against the Kiosk
Joe McCray
\__Advanced SQL Injection
http://www.shakacon.org
ALOHA FROM THE SHAKACON CREW!
Follow Status on:
http://www.twitter.com/shakacon
#######################################
ShakaCon III Crew
Hawaii: Home of Sun, Surf, and C Shells
#######################################
This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission. If verification is required please request a hard-copy version.
Powered by blists - more mailing lists