Profile

Cover photo
Valerie Fenwick
Attended Purdue University
304 followers|36,970 views
AboutPostsPhotosVideos

Stream

Valerie Fenwick

Shared publicly  - 
 
BHUSA15: Black Hat Roundup
I just got back from my first Black Hat conference!  This may seem strange, that I've never been, but it always  seemed to expensive and many of the talks were repeated at DefCon.  My first DefCon was DC2 - I was still basically a kid. I could not drink nor...
I just got back from my first Black Hat conference!  This may seem strange, that I've never been, but it always  seemed to expensive and many of the talks were repeated at DefCon.  My first DefCon was DC2 - I was still basica...
1
1
g barry's profile photo
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BHUSA15: Hi This Is Urgent Plz Fix ASAP: Critical Vulnerabilites and Bug Bounty Programs
Kymberlee Price , Bugcrowd.(aka @kym_possible) We won't be talking about low level bug bounty programs today, just the critical bugs. Kyberlee has extensive background as a developer and has been working lately on a "red team". Google does a vulnerability r...
Kymberlee Price, Bugcrowd.(aka @kym_possible) We won't be talking about low level bug bounty programs today, just the critical bugs. Kyberlee has extensive background as a developer and has been working lately on a "red team"...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Black Hat Panel – Beyond the Gender Gap: Empowering Women in Security
Kelly Jenkins, Moderator, Dark Reading This is a growing industry, but women are leaving. We need more people, so how do we empower the women we have? Panelists:  Justine Bone, Independent Consultant Joyce Brocaglia , Founder Alta Associates (executive sear...
Kelly Jenkins, Moderator, Dark Reading This is a growing industry, but women are leaving. We need more people, so how do we empower the women we have? Panelists:  Justine Bone, Independent Consultant Joyce Brocaglia , Founder...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BHUSA15: Where? You can't Exploit What You Can't Find
Christopher Liebchen  &  Ahmad-Reza Sadeghi  &  Andrei Homescu  &  Stephen Crane  We're concerned with many problems that are actually 3 decades old. Nowadays, everyone has access to cell phones. Many developers with different intentions and different backg...
Christopher Liebchen & Ahmad-Reza Sadeghi & Andrei Homescu & Stephen Crane  We're concerned with many problems that are actually 3 decades old. Nowadays, everyone has access to cell phones. Many developers with different inte...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Panel: Getting it Right: Straight Talk on Threat & Information Sharing
Panelists: Trey Ford(@treyford) is the Global Security Strategist at Rapid7, Kevin Bankston (@kevinbankston) is the Director of the Open Technology Institute and Co-Director of the Cybersecurity Initiative at New America, and @brianaengl and @hammem (speak...
Panelists: Trey Ford(@treyford) is the Global Security Strategist at Rapid7, Kevin Bankston (@kevinbankston) is the Director of the Open Technology Institute and Co-Director of the Cybersecurity Initiative at New America, and...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Gameover Zeus: Badguys and Backends
Speakers: Elliott Peterson is a Special Agent with the FBI in the Pittsburgh Field Office. Michael Sandee is a key member in the Fox-IT financial malware intelligence unit. Tillmann Werner is the Director of Technical Analysis at CrowdStrike Intelligence. G...
Speakers: Elliott Peterson is a Special Agent with the FBI in the Pittsburgh Field Office. Michael Sandee is a key member in the Fox-IT financial malware intelligence unit. Tillmann Werner is the Director of Technical Analysi...
1
Add a comment...
Have her in circles
304 people
Gordon Ross's profile photo
Randy Colby's profile photo
Fleur Prinsen's profile photo
Nancy Bordelon's profile photo
Caroline Smith's profile photo
Rodney Whitehouse's profile photo
Lucas Nelson's profile photo
Masafumi Ohta's profile photo
Fred Liu's profile photo

Valerie Fenwick

Shared publicly  - 
 
BHUSA15: The Lifecycle of a Revolution
Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society . Jennifer and Jeff Moss (aka Dark Tangent) met at DefCon III in 1995 - they immediately connected, and she became the go-to lawyer for hackers ever since. We’re s...
Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer and Jeff Moss (aka Dark Tangent) met at DefCon III in 1995 - they immediately connected, and she became the go-to lawyer ...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: When IoT Attacks: Hacking a Linux-Powered Rifle
Runa A. Sandvik is a privacy and security researcher, working at the intersection of technology, law and policy.  Michael Auger is an experienced IT security specialist with extensive
experience in integrating and leveraging IT security tools. Runa and Mik...
Runa A. Sandvik is a privacy and security researcher, working at the intersection of technology, law and policy.  Michael Auger is an experienced IT security specialist with extensive experience in integrating and leveraging ...
1
1
g barry's profile photo
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Information Access and Information Sharing: Where We Are and Where We Are Going
Alejandro Mayorkas, Deputy Secretary of Homeland Security. Homeland security means security of our institutions, security of our way of life and most importantly security of our values.  Security of the Internet is very much a part of what we do. It is clea...
Alejandro Mayorkas, Deputy Secretary of Homeland Security. Homeland security means security of our institutions, security of our way of life and most importantly security of our values.  Security of the Internet is very much ...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BHUSA15: The Memory Sinkhole – Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation
Chris Domas is an embedded systems engineer and cyber security
researcher, focused on innovative approaches to low level hardware and
software RE and exploitation. There has been a bug in x86 architecture for more than 20 years... just waiting for Chris D...
Chris Domas is an embedded systems engineer and cyber security researcher, focused on innovative approaches to low level hardware and software RE and exploitation. There has been a bug in x86 architecture for more than 20 yea...
1
2
Warren Strange's profile photoMatthias Pfützner's profile photo
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Stranger Danger! What is the Risk from 3rd Party Libraries?
Kymberlee Price, Bugcrowd, and Jake Kouns is the CISO for Risk Based Security. It's well known that vulnerability statistics suck (see Steve Christey's (MITRE)  Black Hat 13 talk). But, the truth is - we are getting attacked, lots of new (and old) vulnerabi...
Kymberlee Price, Bugcrowd, and Jake Kouns is the CISO for Risk Based Security. It's well known that vulnerability statistics suck (see Steve Christey's (MITRE)  Black Hat 13 talk). But, the truth is - we are getting attacked,...
1
Add a comment...

Valerie Fenwick

Shared publicly  - 
 
BH15: Executive Women's Forum
Alta Associates hosted Black Hat's Executive Women's Forum. EWF focuses on women making decisions in security and privacy, hosting an annual conference where women can spend time with other women working in security. Women who have attended past conferences...
Alta Associates hosted Black Hat's Executive Women's Forum. EWF focuses on women making decisions in security and privacy, hosting an annual conference where women can spend time with other women working in security. Women wh...
1
Add a comment...
People
Have her in circles
304 people
Gordon Ross's profile photo
Randy Colby's profile photo
Fleur Prinsen's profile photo
Nancy Bordelon's profile photo
Caroline Smith's profile photo
Rodney Whitehouse's profile photo
Lucas Nelson's profile photo
Masafumi Ohta's profile photo
Fred Liu's profile photo
Work
Occupation
Software Engineer
Basic Information
Gender
Female
Story
Introduction
Valerie is has over a decade of experience with computer security and operating systems. Her interests include reading, skiing, singing, dancing, women in science and computing and... beer :)
Education
  • Purdue University
    Computer Science, 1992 - 1996