Monday, April 21, 2014
This is the first con I have ever submitted a CFP to where I didn't get selected. Am I bitter. Heck NO! Not when you see a lineup of presenters like Jack Daniel, Paul Coggin, Rafal Los, Jason Street, and others. This first year con is STACKED! Add to this lineup a Metasploit class (only $300) by Georgia Weidman and you have what promises to be a great couple of days.
If you can make it on May 17th, feel free to stop by and say "Hi." I have decided to volunteer for the video crew. If you have never met me, I will be the handsome but portly fellow behind one of the cameras.
Feel free to check out their website http://www.bsidesnash.org/ It is one of the best B-Sides websites I have ever seen. Perhaps a bit of foreshadowing?
P.S. This blog was meant to post in April but didn't due to operator error. I decided to leave it intact but add an update. I was asked to present! Woo hoo! Make sure you come to my presentation: Sun Tzu was a punk! Confucius was an InfoSec rockstar!
Friday, April 18, 2014
Are you going to be in the Huntington, WV area next week? If so, stop by the Appalachian Institute of Digital Evidence annual conference. What you will get is a week long training and presentation conference that only costs $60. This will be my 3rd time to attend and I am proud to say, my 2nd time selected to speak. This time I will be sharing the stage with my daughter Emily. We will be giving a first hand account of building and deploying a RachelPi educational computer to Kenya. In addition to this, we will give an update of our return trip.
Check out the AIDE website at www.appyide.org What you will find is an organization dedicated to forensics, e-discovery, and Information Security.
I hope to see you all there!
Thursday, April 17, 2014
1980's: Listened to "Alternative" music on my boombox while playing on my TRS80 Color Computer 2
1990's: Listened to "Grunge" on my Walkman while installing computers and pulling cables
Late 1990's: Listened to "Rock" streaming on my computer while installing and managing Cisco routers
2000's: Listened to "progressive-house music" streaming on my computer while pentesting and doing reverse MALWARE analysis
2010's: Listen to blues, classical, and jazz while writing security policy
I think I may be going down hill...