Phooey, that sounds really interesting! Thanks for sharing it, now I wish I had that day free. On Mar 11, 2015 11:56 AM, "Thomas Lockney" <[email protected]> wrote:
> Earlier this year, Nike began hosting a series of tech talks covering a > wide variety of topics. This month we'll be hosting the second of these > featuring Stephen Ridley <http://about.me/s7ephen> of Xipiter > <http://www.xipiter.com/> and Joe Grand <https://twitter.com/joegrand> of > Grand > Idea Studio <http://www.grandideastudio.com/>. The talks will be of > relevance to many in the DorkbotPDX community, so I thought I'd share them > here. You can find more details and the RSVP link at > http://niketechtalks-march2015.splashthat.com. If you have any questions, > please email me directly or use the link on the event site. > > More detailed info: > > The Insecurity of Things - Stephen A. Ridley > > There is a latent distrust of the growing "Internet Of Things" market. The > data collected by them is becoming more personal all while proliferation of > internet connected devices is continuing without regard to privacy or > security. Recent news stories has consumers concerned not only with privacy > but also surveillance and data handling. There is no trusted third party > "consumer advocacy" for privacy. To compound the problem, "IoT" and > internet connected consumer devices are each made from custom hardware and > software. This lack of homogeneity in design makes traditional software > based security (like "antivirus") virtually impossible. These devices and > apps are literally "black boxes" that we entrust our privacy to. > > At Xipiter we've been working on the security of embedded systems and IOT > devices. Xipiter has built several industry unique trainings on mobile > security and embedded device security. Each of which has sold out at > BlackHat (the largest security conference in the world) for three years in > a row. We've helped numerous manufacturers secure their embedded devices. > From Point Sales and Entertainment Systems to the more esoteric vendors of > Gaming systems (lotto, casino, etc) and Industrial Controls Systems. We > also publicly blog about our exploitation of these devices. > > Our talk is about our experiences over the last several years and how > we're tackling the problem of visibility into the security of these > "blackbox" systems. Systems we all use and rely upon everyday (mostly > unknowingly) These systems are woefully insecure. We'll talk about why and > how we propose to solve the problem. > > About Stephen: > > Stephen A. Ridley is a security researcher at Xipiter. He has more than 10 > years of experience in software development, software security, and reverse > engineering. Prior to Xipiter, Mr. Ridley served as the Chief Information > Security Officer of a financial services firm and prior to that was a > Senior Researcher at Matasano. He also was Senior Security Architect at > McAfee, and a founding member of the Security and Mission Assurance (SMA) > group at a major U.S defense contractor where he did vulnerability research > and reverse engineering in support of the U.S. intelligence community. He > has spoken about reverse engineering and software security at Black Hat, > ReCon, CanSecWest, EuSecWest, Syscan and other prominent information > security conferences. Stephen is a co-author of "The Android Hacker's > Handbook" published by Wiley & Sons. > > > ...and Hardware for All - Joe Grand > > The proliferation of electronic modules, development tools, and > do-it-yourself communities has led to a world where the creation of > hardware projects is accessible to people of all skill levels. With > dedication and a willingness to learn, explore, experiment, fail, and > succeed, one can build just about anything that comes to mind. In an > attempt to inspire new and existing electronics enthusiasts, Joe will > detail a few of his hardware-based projects, including interactive artwork, > a tool for hacking embedded systems, and giant, ridiculous contraptions > made for television. > > About Joe: > > Joe Grand was born as a hacker. In a time when tinkering with computers > and electronics was a guarantee for ridicule and torment, Joe (formerly > known as Kingpin) pushed back to forge his own path: figuring out how to > make free telephone calls as a 7-year-old in 1982, helping set the standard > for computer security vulnerability research and disclosure with the > infamous hacker group L0pht Heavy Industries, bringing engineering to the > masses on Discovery Channel's Prototype This, and running his own product > design firm, Grand Idea Studio (www.grandideastudio.com). > > -- > Thomas Lockney > [email protected] > http://thomas.lockney.net > > _______________________________________________ > dorkbotpdx-blabber mailing list > [email protected] > http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber >
_______________________________________________ dorkbotpdx-blabber mailing list [email protected] http://music.columbia.edu/mailman/listinfo/dorkbotpdx-blabber
