Akamai Diversity

The Akamai Blog

Full SOURCE Boston 2014 Schedule Released

The full schedule has been released for next month's SOURCE Boston security conference. This year's keynote speakers are:

  • Internationally renowned security technologist and author Bruce Schneier;
  • Justine Aitel, who manages cyber security and identity programs at Dow Jones; and 
  • Dr. Andrea M. Matwyshyn, an academic studying technology innovation and its legal implications, particularly corporate information security regulation and commercial and consumer privacy.
The SOURCE website includes podcast interviews with the keynoters as well as many other speakers.

Here's the full schedule:

Tuesday, April 8

Application Security
Washington

Security & Technology
Library

Business & Security
Shubert

10:00am - 11:45am

Registration

11:45am - 12:00pm

Opening Remarks (Ballroom)

12:00pm - 12:45pm

KEYNOTE - Justine Aitel (Ballroom)

1:00pm - 1:45pm

How to Implement New
Security Features and
Fix Broken
 Stuff with
Feature Flags and A/B Tests

Kenneth Lee

Setup for Failure: Defeating SecureBoot

John Butterworth

Diablo Security: What Can Infosec Learn From Video Games?

Dwayne Melancon

2:00pm - 2:45pm

Hybrid Analysis Mapping: Making Security and Development Tools
Play Nice Together

Dan Cornell 

Measuring Security Outcomes: From Data to Insight for Third Party Risk Management

Stephen Boyer

Top 50 Non-State Hacker Groups of the World

Christopher Ahlberg

2:45pm - 3:30pm

FREE TIME

3:30pm - 4:15pm

Akamai

Offensive Defense through Attacker Mimicry

Stephan Chenette

Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Economic & Social Systems

Allison Miller

4:30pm - 5:15pm

iOS App Reversing:
A Practical Approach

Patrick Wardle

Mackerel: A Progressive School of Cryptographic Thought

Justin Troutman

Risk, Audit, and Compliance
for Hackers & Defenders

John Nye 

7:30pm - 9:00pm

Speaker Party


Wednesday, April 9

Application Security
Washington

Security & Technology
Library

Business & Security
Shubert

9:50am - 10:00am

Opening Remarks (Ballroom)

10:00am - 10:45am

KEYNOTE - Bruce Schneier (Ballroom)

11:00am - 11:45am

Case Study: How to Build an
Application Security
Metrics Program

Jared Pfost 

Trapping Hacks With Ensnare

Scott Behrens
Andy Hoernecke

Hacking The US Trademark System: A Cautionary Tale

Paul Asadoorian
Kas R. DeCarvalho

11:45am - 1:30pm

LUNCH BREAK

1:30pm - 2:15pm

Security Testing WITHOUT
an Army of Ninjas

Ripped From the Headlines: What the News Tells Us About Information Security Incidents

Kevin Thompson
Suzanne Widup

Delivering Security
at Big Data Scale

Davi Ottenheimer

2:30pm - 3:15pm

Hiring/Recruiting Workshop

NO SESSION

Speed Networking

3:15pm - 4:00pm

FREE TIME

4:00pm - 4:45pm

Reality Checking Your
Security Testing Program

Darren Meyer

PANEL: Information-sharing Tools, Taxonomies, and Trust: Babel or Better?

Trey Darley (moderator)
Douglas Wilson
Sean Barnum
Kyle Maxwell
Tom Millar

The Privileged User Discussion: Security Enforcer or Threat?

Michael Crouse 

5:00pm - 5:30pm

[TURBO]

URL Scheme Security on iOS

Guillaume Ross

How to Save the Environment, or Why Nobody Takes Your Security Advice

Daniel Crowley

Aligning Threats and Allies Through Stories

J. Wolfgang Goerlich
Steven Fox

5:30pm - 6:30pm

Vendor Reception


Thursday, April 10

Application Security
Washington

Security & Technology
Library

Business & Security
Shubert

9:50am - 10:00am

Opening Remarks (Ballroom)

10:00am - 10:45am

KEYNOTE - Andrea Matwyshyn (BALLROOM)

11:00am - 11:45am

Introducing idb - Simplified Blackbox iOS App Pentesting

Daniel Mayer

Too Many Fallen:#SecBurnOut Pt3 "Prevention & Introspection"

Madeline Wallach

5,500 Hackers +
Your Code = ???

Casey Ellis

11:45am - 1:30pm

LUNCH BREAK

1:30pm - 2:15pm

Marauder or Scanning your DNSDB for Fun and Profit

Dhia Mahjoub

The Cavalry Isn't Coming; It Falls To Us: How you can help!

Joshua Corman, Beau Woods, Jen Ellis

Painting a Company
Red and Blue

Ian Amit

2:30pm - 3:15pm

IT Security Risk Assessment:
Measuring What Matters

Reed Augliere

The Internet of Things: We've Got to Chat

Mark Stanislav
Zach Lanier

Applied Security Metrics: Building the Financial Services Threat Report

Andrew Jaquith

3:15pm - 3:45pm

FREE TIME (PLEASE MAKE YOUR WAY TO THE BALLROOM)

3:45pm - 4:45pm

Wait Wait Don't Pwn Me! (Ballroom)

4:45pm - 5:30pm

Raffle Prizes and Closing Remarks (Ballroom)

Leave a comment