Phooey, that sounds really interesting! Thanks for sharing it, now I wish I
had that day free.
On Mar 11, 2015 11:56 AM, "Thomas Lockney" <[email protected]> wrote:

> Earlier this year, Nike began hosting a series of tech talks covering a
> wide variety of topics. This month we'll be hosting the second of these
> featuring Stephen Ridley <http://about.me/s7ephen> of Xipiter
> <http://www.xipiter.com/> and Joe Grand <https://twitter.com/joegrand> of 
> Grand
> Idea Studio <http://www.grandideastudio.com/>. The talks will be of
> relevance to many in the DorkbotPDX community, so I thought I'd share them
> here. You can find more details and the RSVP link at
> http://niketechtalks-march2015.splashthat.com. If you have any questions,
> please email me directly or use the link on the event site.
>
> More detailed info:
>
> The Insecurity of Things - Stephen A. Ridley
>
> There is a latent distrust of the growing "Internet Of Things" market. The
> data collected by them is becoming more personal all while proliferation of
> internet connected devices is continuing without regard to privacy or
> security. Recent news stories has consumers concerned not only with privacy
> but also surveillance and data handling. There is no trusted third ­party
> "consumer advocacy" for privacy. To compound the problem, "IoT" and
> internet connected consumer devices are each made from custom hardware and
> software. This lack of homogeneity in design makes traditional software­
> based security (like "anti­virus") virtually impossible. These devices and
> apps are literally "black boxes" that we entrust our privacy to.
>
> At Xipiter we've been working on the security of embedded systems and IOT
> devices. Xipiter has built several industry unique trainings on mobile
> security and embedded device security. Each of which has sold out at
> BlackHat (the largest security conference in the world) for three years in
> a row. We've helped numerous manufacturers secure their embedded devices.
> From Point Sales and Entertainment Systems to the more esoteric vendors of
> Gaming systems (lotto, casino, etc) and Industrial Controls Systems. We
> also publicly blog about our exploitation of these devices.
>
> Our talk is about our experiences over the last several years and how
> we're tackling the problem of visibility into the security of these
> "blackbox" systems. Systems we all use and rely upon everyday (mostly
> unknowingly) These systems are woefully insecure. We'll talk about why and
> how we propose to solve the problem.
>
> About Stephen:
>
> Stephen A. Ridley is a security researcher at Xipiter. He has more than 10
> years of experience in software development, software security, and reverse
> engineering. Prior to Xipiter, Mr. Ridley served as the Chief Information
> Security Officer of a financial services firm and prior to that was a
> Senior Researcher at Matasano. He also was Senior Security Architect at
> McAfee, and a founding member of the Security and Mission Assurance (SMA)
> group at a major U.S defense contractor where he did vulnerability research
> and reverse engineering in support of the U.S. intelligence community. He
> has spoken about reverse engineering and software security at Black Hat,
> ReCon, CanSecWest, EuSecWest, Syscan and other prominent information
> security conferences. Stephen is a co-author of "The Android Hacker's
> Handbook" published by Wiley & Sons.
>
>
> ...and Hardware for All - Joe Grand
>
> The proliferation of electronic modules, development tools, and
> do-it-yourself communities has led to a world where the creation of
> hardware projects is accessible to people of all skill levels. With
> dedication and a willingness to learn, explore, experiment, fail, and
> succeed, one can build just about anything that comes to mind. In an
> attempt to inspire new and existing electronics enthusiasts, Joe will
> detail a few of his hardware-based projects, including interactive artwork,
> a tool for hacking embedded systems, and giant, ridiculous contraptions
> made for television.
>
> About Joe:
>
> Joe Grand was born as a hacker. In a time when tinkering with computers
> and electronics was a guarantee for ridicule and torment, Joe (formerly
> known as Kingpin) pushed back to forge his own path: figuring out how to
> make free telephone calls as a 7-year-old in 1982, helping set the standard
> for computer security vulnerability research and disclosure with the
> infamous hacker group L0pht Heavy Industries, bringing engineering to the
> masses on Discovery Channel's Prototype This, and running his own product
> design firm, Grand Idea Studio (www.grandideastudio.com).
>
> --
> Thomas Lockney
> [email protected]
> http://thomas.lockney.net
>
> _______________________________________________
> dorkbotpdx-blabber mailing list
> [email protected]
> http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber
>
_______________________________________________
dorkbotpdx-blabber mailing list
[email protected]
http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber

Reply via email to