“”Tick, Tick, Tick. Growth! You’re Dead.”” A?AˆA” Technology & the FTC

“”Tick, Tick, Tick. Growth! You’re Dead.”” A?AˆA” Technology & the FTC

Whitney Merrill Privacy, eCommerce & Consumer Security Counsel, Digital Arts

This talk will cover Active directory site DACLs in depth, our “”misconfiguration taxonomy””, and enumeration/analysis with BloodHound’s freshly launched feature ready. We are going to cover the misuse of post DACL misconfigurations for the intended purpose of domain rights elevation, such as common misconfigurations experienced in the open. We’re going to then include ways to design offer DACL backdoors, including ways to avoid current detections, and can conclude with protective mitigation/detection techniques for every little thing outlined.

Andy Robbins As a Red teams contribute, Andy Robbins has performed entrance studies and reddish group examination for a number of Fortune 100 commercial clients, also state and federal agencies. Andy recommended their analysis on a vital flaw from inside the ACH payment handling regular in 2014 at DerbyCon and the ISC2 globe Congress, and it has talked at other meetings such as DEF CON , BSidesLV, ekoparty, ISSA Global, and Paranoia Conf in Oslo. They have a desire for offending development and purple employees tradecraft, and helps to cultivate and train the “”Adaptive red-colored employees methods”” course at BlackHat United States Of America.

Will Schroeder Will Schroeder are an offensive engineer and reddish teamer. He’s a co-founder of Empire/Empyre, BloodHound, additionally the Veil-Framework, produced PowerView and PowerUp, is a working creator regarding the PowerSploit project, and it is a Microsoft PowerShell MVP. He’s presented at several meetings, such as DEF CON , DerbyCon, Troopers, BlueHat Israel, and different safety BSides.

Terrell McSweeny Commissioner, https://datingranking.net/tr/victoria-milan-inceleme/ Federal Trade Commission

The government Trade Commission are a police force service assigned with safeguarding consumers from unjust and misleading practices. Defending buyers on the Internet and from terrible tech is absolutely nothing latest for all the FTC. We’re going to take a peek straight back at exactly what the FTC got starting whenever DEF CON initially started in 1993, and everything we’ve been undertaking since. We’re going to discuss enforcement activities involving modem hijacking, FUD marketing, id theft, plus introduce you to Dewie the e-Turtle. Excited, we’ll speak about the FTC’s upcoming safeguarding people’ privacy and data protection and what you can do to help.

Whitney Merrill Whitney Merrill are a hacker, ex-fed, and attorney. She actually is at this time a confidentiality attorneys at Electronic Arts (EA), plus this lady spare-time, she runs the Crypto & confidentiality community (come say hi!). Lately, she supported the woman nation as a lawyer at the Federal Trade Commission where she done several buyers security things like data security, confidentiality, and deceitful marketing and advertising. Whitney got the girl J.D. and grasp’s level in Computer research from the University of Illinois at Urbana-Champaign.

Terrell McSweeny Terrell McSweeny serves as a Commissioner on the Federal Trade Commission. In 2010 marks the girl fourth opportunity at DEF CON . About tech dilemmas, Commissioner McSweeny enjoys dedicated to the important part scientists and hackers can enjoy shielding consumer data safety and confidentiality. She opposes bad plan and legislative proposals like required backdoors plus the criminalization of hacking and believes that enforcers like the FTC should utilize the researcher neighborhood to protect buyers. She wishes organizations to apply protection by-design, privacy by design and data ethics concept – but recognizes that, inside the lack of rules, administration and data will be the best method of holding companies accountable for your choices they generate inside techniques they keep and make use of customer facts.

Arrive at the HHV and learn the skill required for desoldering and reclaiming PCB equipment. If you should be already acquainted this method, after that take the time to clean up on your talent. Each period was about one hour very long and will include: introduction, protection, old-fashioned vs. RoHS procedures, right after which practical ingredient healing. These sessions tend to be initially appear initially served during the time of beginning, therefore appear early and get the learn on! No hardware or devices required!'” 2_monday,,,IOT,”principal Contest Area”,”‘IoT – the present that keeps on providing'”,”‘Alex “”Jay”” Balan ‘”,”‘