The Keys To Running A Successful DEF CON Group By DC612

DEF CON 18

Presented by: Jared Bird, David Bryan (Videoman)
Date: Thursday July 29, 2010
Time: 14:00 - 15:00
Location: Royale 5
Track: Track 3

Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. We have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service, Flooding, and Packet Fragmentation. The presentation will review some of the common attack types, what they are, and how they can be used to disrupt service. I will also review the steps that led us to choose the cloud computing environment, why these environments are good for most, but also why they may not meet your regulatory requirements. And lastly, I will review mitigation strategies and response programs that can reduce the operational risks when responding to these events.

David Bryan

David M. N. Bryan has been working to keep the lights and utilities paid with the DC612 Group.

Jared Bird

Jared Bird has been working to keep the lights and utilities paid with the DC612 Group.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats