{"id":224,"date":"2009-04-09T12:35:01","date_gmt":"2009-04-09T17:35:01","guid":{"rendered":"http:\/\/www.webadminblog.com\/?p=224"},"modified":"2009-04-09T12:38:02","modified_gmt":"2009-04-09T17:38:02","slug":"thoughts-on-the-trisc-2009-conference","status":"publish","type":"post","link":"https:\/\/www.webadminblog.com\/index.php\/2009\/04\/09\/thoughts-on-the-trisc-2009-conference\/","title":{"rendered":"Thoughts on the TRISC 2009 Conference"},"content":{"rendered":"<p>This was my third consecutive year attending the TRISC Conference and it gets better and better every year.\u00a0 This year, the location was outstanding, the presenters were top-notch, and the Keynotes were pretty good.\u00a0 This was my first time actually presenting at the TRISC Conference and I thought they did an excellent job from the presenter point-of-view as well.\u00a0 They kept the presentations on time, they had my notes all printed up and ready for attendees, and A\/V equipment worked well.\u00a0 No complaints from me there.<\/p>\n<p>My favorite Keynote speaker was far and away Johnny Long.\u00a0 His talk was on &#8220;No Tech Hacking&#8221; and he is as entertaining as he is talented.\u00a0 If you ever get a chance to see him speak, definitely do so.\u00a0 Also, be sure to check out his website at <a href=\"http:\/\/www.ihackcharities.org\" target=\"_blank\">IHackCharities.org<\/a>.<\/p>\n<p>My least favorite Keynote speaker was Ken Watson.\u00a0 He spoke all monotone and the presentation on these centers around the country that the government is using to team up with industry to prevent attacks on critical infrastructure was pretty lame.\u00a0 I guess I just expected more and from talking with others it seems like I&#8217;m not alone.<\/p>\n<p>My favorite presentation was Robert Hansen and Rob MacDougal&#8217;s talk on &#8220;Assessing Your Web App Manually Without Hacking It&#8221;.\u00a0 It was a simple concept that everyone from managers to developers to IT guys can follow to get an idea as to how many vulnerabilities their application might contain.\u00a0 RSnake!<\/p>\n<p>My least favorite presentation was &#8220;The Importance of Log Management in Today&#8217;s Insecure World&#8221; by Ricky Allen and Randy Holloway from ArcSite.\u00a0 Too vendory, not technical enough, and kinda a lame presentation in general.\u00a0 Maybe I&#8217;m just bitter because I heard that the other presentations that took place while I was in this session were really good.<\/p>\n<p>This was the first year that TRISC had a Casino Night and it was awesome.\u00a0 I played Texas Hold &#8216;Em most of the night and took Nathan Sportsman&#8217;s money and a bunch of Rob MacDougal&#8217;s as well.\u00a0 They had Roulette, Blackjack, and Craps tables there as well and the goal was to start with $10,000 in chips and for every $5,000 you had at the end of the night you got a raffle ticket.\u00a0 I ended up with over $40,000 and 9 raffle tickets and won three different items.\u00a0 Score.<\/p>\n<p>Overall, TRISC 2009 was not the best conference that I&#8217;ve ever attended, but was certainly the best TRISC to date.\u00a0 I was very impressed and am looking forward to next year.\u00a0 FYI, all presentations from the conference are online and available for viewing <a href=\"http:\/\/trisc.org\/presentations\/\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This was my third consecutive year attending the TRISC Conference and it gets better and better every year.\u00a0 This year, the location was outstanding, the presenters were top-notch, and the Keynotes were pretty good.\u00a0 This was my first time actually presenting at the TRISC Conference and I thought they did an excellent job from the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[222],"tags":[244,249,251,626,140,255,241,245,129,242,252,250,254,248,247,138,622,253,243,246],"class_list":["post-224","post","type-post","status-publish","format-standard","hentry","category-texas-regional-infrastructure-security-conference-2009","tag-244","tag-allen","tag-casino","tag-conferences","tag-hansen","tag-infrastructure","tag-johnny","tag-ken","tag-keynote","tag-long","tag-night","tag-randy-holloway","tag-regional","tag-ricky","tag-robert","tag-rsnake","tag-security","tag-texas","tag-trisc","tag-watson"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pfI0c-3C","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/posts\/224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":4,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":227,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/posts\/224\/revisions\/227"}],"wp:attachment":[{"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webadminblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}