SOURCE Boston is still on

One of the best local security conferences is this week, and so far the agenda is a go, despite Monday's tragedy.

As news unfolded about the bombings at the Boston Marathon finish line yesterday, I found myself wondering if anyone here for this week's SOURCE Boston infosec event might have been there. Fortunately, everyone appears to be safe.

I also wondered if disruptions surrounding the investigation would interfere with SOURCE. It has not.

The agenda is outstanding, as always. Take a look, and listen to the several embedded podcasts.

Tuesday, April 16

 

Washington

Library

Shubert

10:00AM-11:45AM

Registration

11:45AM-12:00PM

Opening Remarks

12:00PM-12:50PM

Podcast

1:00PM-1:50PM

Podcast
Podcast
Inside the Black Hole Exploit Kit (BHEK)

Chester Wisniewski

Sophos

2:00PM-2:50PM

I Built My House On Sand - Embedded Security at the Firmware Layer

Ryan Permeh

Cylance, Inc

Attacking Cloud Services with Source Code

Jonathan Claudius

Trustwave

Bring Your Own Device: Keeping it Simple and Effective

Andy Jaquith

Perimeter E-Security

2:50PM–3:30PM

Free Time

3:30PM-4:20PM

Strategic Analysis of the iOS Jailbreak Development Community 

Dino Dai Zovi

Trail of Bits

Podcast
The Base Rate Fallacy: Information Security Needs to Understand This

Patrick Florer

Risk Centric Security

4:30pm–5:30pm

 Speed Networking

Hosted by Jonathan Cran

We See The Future And It's Not Pretty

Chris Wysopal

Veracode

Podcast

Wednesday, April 17

 

Washington

Library

Shubert

9:50AM-10:00AM

Opening Remarks

10:00AM-10:50AM

Keynote  - Dan Geer/Richard Thieme keynote

11:00AM-11:50AM

Theory and Application of Realistic Capture The FlagCompetitions

Julian Cohen

Third Party Security Assurance: The Service Provider Perspective

John Nye

BitSight Technology

Podcast

12:00PM-1:30PM

Lunch

 

1:30PM-2:20PM

Practical MitM Pentesting

Jonathan Cran

Pwnie Express

Distributed Security: Expanding the Toolkit for Institutional Resilience

Sam Curry & Sandy Carielli

RSA

Analysis of The BroBot DDOS Attack

Eric Kobrin

2:30PM-3:20PM

Hiring/Recruitment

Hosted by Lee Kushner

Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques

Vicente Diaz

Kaspersky

Analyzing the Chemistry of Data

Wendy Nather

451 Group

3:20PM–4:00PM

Free Time

4:00PM–4:50PM

Adversarial Resilience at the Planetary Scale

Christian Ternus

Akamai

"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate 

Jack Whitsitt

Energysec

Hooked on Packets: 

Reading Pcaps for D students

Ryan Linn & Mike Ryan

Trustwave

5:00PM-5:30PM

Big Data? Big Liability!

Jake Kouns

Markel

Punch and Counter-punch with .Net Apps

J Wolfgang Goerlich

"Hacking Back" is a Bad Idea

Steven Maske

5:30pm–6:30pm

Reception

Thursday, April 18

 

Washington

Library

Shubert

8:50AM-9:00AM

Opening Remarks

10:00AM-10:50AM

Keynote – Andy Ellis

11:00AM-11:50AM

Practical Exploitation of Embedded Systems

Andrea Barisani

Inverse Path

Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World

Ed Skoudis

SANS Institute

Podcast

12:00PM-1:30PM

Lunch

1:30PM-2:20PM

Data Analysis and Visualization for Security Professionals

Bob Rudis, Liberty Mutual & Jay Jacobs, Verizon

Protecting sensitive information on iOS devices

David Schuetz

Intrepidus Group

Adversarial Decision Making in Critical Infrastructure Cyberattacks

Aunshul Rege

Temple University

2:30PM-3:20PM

A Brief History of Physical Security

Schuyler Towne

Blitzing with your Defense

Ben Jackson

Mayhemic Labs

HTTP Header Hunting - A Behavioral Approach to Malware Detection

Rodrigo Montoro & Jonathan Claudius

Trustwave

3:30PM-4:20PM

Podcast
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)

Andrew Hay

Cloud Passage

Attacking NFC Mobile Wallets: Where Trust Breaks Down

Max Sobell

Intrepidus Group

4:30PM–5:30PM

Wait! Wait! Don't Pwn Me

5:30PM–6:00PM

Closing Remarks

To comment on this article and other CSO content, visit our Facebook page or our Twitter stream.
Insider: Hacking the elections: myths and realities
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.