pyth0n3 Posted December 18, 2010 Report Share Posted December 18, 2010 Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction HoppingJohn Strauchs, @strauchs: Security and IT ConvergenceRichard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security WorkJon McCoy: Ninja Patching .NETMarco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You Network using Nepenthes/Shaolin ToolsDave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your VictimsBrian Baskin, @bbaskin: P2P ForensicsBrian Baskin, @bbaskin: Internationalized Domain Names & Investigations in the Networked World Deviant Ollam, @deviantollam: Don't Punch My JunkMichael Shearer, @theprez98: How to 0wn an ISP in 10 MinutesChristopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'CheapBen Smith: Printer ExploitationAdrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?Chris Nickerson, @indi303: The State of (In)SecurityGal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk ProfessionsMichael Smith, @rybolov: DDoSSource: Irongeek Quote Link to comment Share on other sites More sharing options...