Loading…
Wild West Hackin' Fest - Deadwood 2024
Attending this event?
Track 2 clear filter
arrow_back View All Dates
Thursday, October 10
 

10:00am MDT

Tackling the AI Spin Cycle: A Briefing on AI Governance, Laws, and Tools
Thursday October 10, 2024 10:00am - 10:50am MDT
This presentation titled "Tackling the AI Spin Cycle: A Briefing on AI Governance, Laws, and Tools" will introduce the conference attendee to the complex landscape of artificial intelligence (AI) governance and regulation. As AI technologies continue to evolve rapidly, it has become increasingly important to establish robust frameworks to ensure ethical and responsible deployment.
Everything is Piling Up! We will explore the mess of AI governance, including legal, ethical, and technical considerations. We will navigate through the spin cycle of existing laws and regulations governing AI, highlighting both their strengths and limitations in addressing the unique challenges posed by AI applications.
We'll sort the delicates from the heavy duty by looking at emerging tools and methodologies designed to facilitate effective AI governance, including transparency mechanisms, accountability frameworks, and ethical AI guidelines.
By providing insights into the current state of AI governance and offering practical guidance on navigating this evolving landscape, this presentation aims to sort through the mess and give the conference attendee of feeling comfortable in their own clothes by understanding AI governance better.



Speakers
avatar for Kelli Tarala

Kelli Tarala

Kelli Tarala is a cybersecurity consultant, author, and speaker. She is the founder of Enclave Security and Auditscripts.com, and currently enjoys Governance, Risk, Compliance, and Privacy consulting at Black Hills Information Security.As an industry-recognized subject matter expert... Read More →

Thursday October 10, 2024 10:00am - 10:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

11:00am MDT

I didn't waste my life gaming - I learned cyber security
Thursday October 10, 2024 11:00am - 11:50am MDT
This presentation offers an exploration into the origins, innovations, and implications of hacking in the gaming industry. In a virtual world where pixels and code meet human creativity, video games have taken off in popularity within the last 70 years. Beginning with a look at the rudimentary hacks of early classics, we will explore how the earliest video game hacks shaped the future of gaming and cybersecurity. From memory manipulation and code injection using tools like GameShark and Cheat Engine, to the creative exploitation of glitches and zero day discoveries such as Log4Shell, video games have always been a target for manipulation aimed at gaining an unfair advantage. There have been notable video game hacks that have impacted security as a whole, and these could continue to get more severe as more complex technology emerges with the rise of virtual reality. This journey will walk through the evolution and predictions for what video game and virtual reality hacking could mean for the future of security. By examining the intersection of video gaming and security, this can offer insights that are relevant to practitioners, researchers, and gamers alike.
Speakers
avatar for Jenna Lawrence

Jenna Lawrence

Jenna Lawrence is a Security Engineer at L2 Cyber Solutions based in Denver, Colorado. Most of her day-to-day work is consulting on a government contract with a focus on maintaining security related documentation and managing vulnerabilities in the organization. Previously, she was... Read More →
avatar for Samantha Peters

Samantha Peters

Samantha Peters is an industry professional and Army veteran currently working full time as an enterprise penetration tester. I've always had a natural curiosity and stubbornness which led to a lot of late nights trying to understand why and how video games and their exploits worked... Read More →

Thursday October 10, 2024 11:00am - 11:50am MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

1:00pm MDT

The Hackening: Lessons learned compromising MSPs!
Thursday October 10, 2024 1:00pm - 1:50pm MDT
The security community often criticizes MSPs, claiming they offer lax security, don't take security seriously, and generally implement weak practices. Some presentations even use "fake" MSP breaches as their foundation.
But what if we actually tested this ourselves?
Join Matt Lee and Jason Slagle as they delve into the data and lessons learned from attempts to breach MSPs. We'll review findings from our efforts to assess and breach a sample of 60 MSPs that volunteered for this study.
Will we succeed? Will we be blocked? What commonalities and weaknesses will we uncover? Join us to discover what we learned.
Speakers
avatar for Matt Lee

Matt Lee

Matt Lee has dedicated the last 13 years to raising the cyber security tide in the SMB, and MSP markets. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction, and security/compliance, protected... Read More →
avatar for Jason Slagle

Jason Slagle

Jason Slagle is a many year veteran of systems and network administration. Having worked on everything from Linux systems to Cisco networks and SAN storage, he is always looking for ways to make his work repeatable and automated.  Jason has recently taken up a more active interest... Read More →

Thursday October 10, 2024 1:00pm - 1:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

2:00pm MDT

Hack the Boardroom: Mastering the Art of Communicating Cyber Risks to Secure Funding
Thursday October 10, 2024 2:00pm - 2:50pm MDT
In today’s relentless cybersecurity battlefield, technical teams often find themselves lost in translation when conveying complex risks and vulnerabilities to senior executives and board members. Breaking through this communication barrier is essential for securing the support and funding necessary to drive pivotal cybersecurity initiatives.
Speakers
avatar for Jaclyn (Jax) Scott

Jaclyn (Jax) Scott

Jaclyn "Jax" Scott is a distinguished leader within the cybersecurity sector, bringing together nearly 16 years of in-depth experience both from the military and civilian sectors spanning IT and cybersecurity. A key highlight of her career includes critical strategic support to global... Read More →

Thursday October 10, 2024 2:00pm - 2:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

3:00pm MDT

A Post-Incident Case Study for SMB Response Teams
Thursday October 10, 2024 3:00pm - 3:50pm MDT
This presentation will delve into a real-world cybersecurity incident involving a masked application attack on an SMB environment. Using an anonymized incident narrative, we'll walk through the response process from the perspective of a small to medium-sized business team. The presentation will highlight the importance of early detection, the challenges of identifying sophisticated threats, and the critical role of proper incident response procedures.

We'll examine the attack timeline, from the initial malware download disguised as legitimate software to the attacker's lateral movement and attempts at data exfiltration. Key focus areas will include the significance of user awareness, the value of multi-layered security controls, and the effectiveness of SIEM and endpoint detection solutions in identifying suspicious activities.

The presentation will also cover practical lessons learned, including the importance of least privilege principles, robust password policies, and regular security testing. We'll discuss how SMBs can improve their security posture by implementing these lessons and leveraging available tools and best practices.
By analyzing this incident, attendees will gain valuable insights into real-world attack techniques, effective response strategies, and proactive measures to enhance their organization's cybersecurity resilience. The session will conclude with actionable takeaways for SMBs to better prepare for and respond to similar threats in their own environments.
Speakers
avatar for Amanda Berlin

Amanda Berlin

(@infosystir) Amanda Berlin is a Lead Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author for a Blue Team best practices book called Defensive Security Handbook: Best Practices for Securing Infrastructure... Read More →
Thursday October 10, 2024 3:00pm - 3:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

5:00pm MDT

Counter-Terrorism with Strings
Thursday October 10, 2024 5:00pm - 5:50pm MDT
Several real-world case studies will be presented in which analysis of network-based evidence was sufficiently done with nothing more sophisticated than 'strings'.
Speakers
JH

Jonathan Ham

Jonathan Ham is an anthropologist who was academically kidnapped in 1992 and forced into cybersecurity by well-meaning college friends. He was made to learn TCP/IP at the bit-level of protocol structures, and to learn to fight evil at all 7 layers of the OSI model. From the ashes... Read More →

Thursday October 10, 2024 5:00pm - 5:50pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD

7:00pm MDT

Old Time Photos
Thursday October 10, 2024 7:00pm - 10:00pm MDT
Thursday October 10, 2024 7:00pm - 10:00pm MDT
Deadwood Mountain Grand - Track 2 1906 Deadwood Mountain Dr, Deadwood, SD
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -