The Rocket City – TAKEDOWNCON will provide a unique conference and training event to Huntsville and its surrounding region as this event will be made up of a series of high-end and relevant IT security briefs.
Attend this mind-blowing event as you witness the cream of the crop unveil the latest attacks, techniques, tactics and practices of today’s hackers. Plus, gain insight and understanding into ways to effectively protect yourself so you can implement this information immediately when you return to your Organization.
Steve Graham, EC-Council
Tom Baumbach, President of Dynetics
Mayor Tommy Battle, City of Huntsville
Exploring The Cyber Landscape,
Lt. General Ronald L. Burgess, Cyber Programs and Military Affairs at Auburn University
The Disintermediation of Government in Cyber Defense,
Dave Aucsmith, Microsoft Institute for Advanced Technology in Governments
“I’m From the Government and I’m Here to Help”: Boards and Cyber Security,
Jim Simon, CEO, i.e., LLC
Research Advancements Towards Protecting Critical Assets
Dr. Richard Raines, Oak Ridge National Laboratory
Time to Eat!
Bending and Twisting Networks
Paul Coggin, Dynetics
What do you mean the friend of my friend is MY ENEMY?
Gregory Carpenter, Army Research Laboratory
In the Line of Fire – The Morphology of Cyber Attacks
Dennis K. Usle, Director of Security Solutions, Radware
Introduction to Cryptanlysis : How codes get broken
Chuck Easttom, Author, Instructor, Inventor
Global CyberLympics High School Competition Awards Ceremony
TakeDownCon Reception at US Space and Rocket Center sponsored by Dynetics and Cyber Huntsville
Key Note – Webshells: History, Techniques, Obfuscation and Automated Collection
Adrian Crenshaw, irongeek.com
Reconnaissance; finding the client in a sea of IPs,
Ben Miller, Parameter
Offense in Depth
Raphael Mudge, Strategic Cyber LLC
Time to Eat!
Technology Deathmatch – Ever so Sweet…the Arms Race is On…
Sean Bodmer, Chief Researcher, CounterTack, Inc.
Cyber Security via Technology FAILS – Stop the FUD!
Jeremy Conway, SudoSecure
White Hat Anonymity: Current Challenges Security Researchers Face Performing Actionable OSINT
Christopher Barber, Threat Analyst, Solutionary
Can You Hear Me Now? Leveraging Mobile Devices on Pentests
Georgia Weidman, Bulb Security LLCDigital
Josh Morin, Codenomicon Senior Systems Engineer