{"id":936,"date":"2018-03-26T08:58:10","date_gmt":"2018-03-26T12:58:10","guid":{"rendered":"http:\/\/www.cnyhackathon.org\/?p=936"},"modified":"2018-03-26T08:58:10","modified_gmt":"2018-03-26T12:58:10","slug":"spring-2018-speaker-profiles-talks","status":"publish","type":"post","link":"https:\/\/www.cnyhackathon.org\/?p=936","title":{"rendered":"Spring 2018 &#8211; Speaker Profiles &#038; Talks"},"content":{"rendered":"<h4>Mike Lisi<\/h4>\n<p><a href=\"https:\/\/new.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/mikelisi-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/new.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/mikelisi-2-225x300.jpg\" alt=\"\" width=\"225\" height=\"300\" class=\"alignleft size-medium wp-image-938\" srcset=\"https:\/\/www.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/mikelisi-2-225x300.jpg 225w, https:\/\/www.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/mikelisi-2-768x1024.jpg 768w, https:\/\/www.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/mikelisi-2-1568x2091.jpg 1568w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/a><\/p>\n<p><b>Title:<\/b> <i>Show Me What You Got &#8211; Advice for Landing a Job in Infosec<\/i><\/p>\n<p><b>Abstract:<\/b><\/p>\n<p>\nAs the realm of information security has continued to grow, so has the demand for qualified people to work in the industry. This has also led to an increase in the number of applicants that are looking to get hired for these jobs, so it takes more effort than ever before to stick out from the crowd. I\u2019ll be discussing some of the things that you can do to improve your odds of getting hired.\n<\/p>\n<p><b>Bio:<\/b><\/p>\n<p>\nMike Lisi is a Senior Consultant at HALOCK Security Labs and a co-founder of the hacker meetup group IthacaSec. He has also worked as a network administrator, a programmer\/analyst, and a developer of offensive and defensive DoD technologies. Mike received a BS in Computer Science from SUNYIT (now SUNY Poly) as well as a handful of infosec certifications including the CEH, OSCP, and GWAPT. Mike is also the lead designer for the CNY Hackathon CTF.\n<\/p>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n<h4>Jennifer Allen<\/h4>\n<p><a href=\"https:\/\/new.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/jenniferallen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/new.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/jenniferallen-2-288x300.jpg\" alt=\"\" width=\"288\" height=\"300\" class=\"alignleft size-medium wp-image-937\" srcset=\"https:\/\/www.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/jenniferallen-2-288x300.jpg 288w, https:\/\/www.cnyhackathon.org\/wp-content\/uploads\/2018\/03\/jenniferallen-2.jpg 546w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/a><\/p>\n<p><b>Title:<\/b> <i>Workshop &#8211; Embedded Systems Hacking with the ESP32<\/i><\/p>\n<p><b>Abstract:<\/b><\/p>\n<p>\nStudents will connect and provision the ESP32 with code to connect to securely the game service over wifi to receive the first half of the challenge key. They will then reprovision the ESP32 with a different operating platform and upload code to connect to a second game service over Bluetooth to receive the second half of the challenge flag.\n<\/p>\n<p><b>Bio:<\/b><\/p>\n<p>\nJennifer Allen is a cybersecurity professional with a focus on offensive security and ethical hacking, and 19 years in IT. She also volunteers for the DEFCON Darknet (dcdark.net), the DEFCON Biohacking Village (dcbhv.org), and community hacking and maker groups. She is certified GCIH, GPEN, GXPN, OSCP, and an Amateur Extra licensed ham operator.\n<\/p>\n<p>&nbsp;<br \/>\n&nbsp;\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mike Lisi Title: Show Me What You Got &#8211; Advice for Landing a Job in Infosec Abstract: As the realm of information security has continued to grow, so has the demand for qualified people to work in the industry. This has also led to an increase in the number of applicants that are looking to<a class=\"more-link\" href=\"https:\/\/www.cnyhackathon.org\/?p=936\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,14],"tags":[36,34,26,35,23,22],"class_list":["post-936","post","type-post","status-publish","format-standard","hentry","category-hackathon","category-utica-college","tag-abstracts","tag-bios","tag-cny-hackathon","tag-profiles","tag-speakers","tag-talks"],"_links":{"self":[{"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=\/wp\/v2\/posts\/936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=936"}],"version-history":[{"count":0,"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=\/wp\/v2\/posts\/936\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cnyhackathon.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}