BSidesSLC 2015 March 20, 2015 to March 21, 2015, Salt Lake City,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE BREAKING in BAD! (I'm the one who doesn't knock) Jayson E. Street I’ve come to realize that while I may not do a lot of social engineering ...
What To Do When "Something Bad" Has Happened Jason Wood Someone calls you up and asks you to check out a system. "It's acting weird ...
Drones Behaving Badly Jon A review of the past few years of rapid technical progress of the civilian & ...
Fighting Hardware Attacks With Software Doktor Unicorn When a program is executed, it causes subtle changes in the physical state of the ...
Bad USB Weaponized Dan Anderson , Steve Fink Explore the world of Bad USB. How to build, deploy, and optimize the Bad USB ...
Social Engineering: The Good, the Bad, and the Ugly Stephanie Carruthers Stephanie will be sharing her experience at DEF CON last year, where she won the ...
Building AppSec In Seth Law Strategies, tools, and techniques for implementing an effective application security program. Alternatively, a how to ...
Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For Joshua Danielson Applying security standards consistently across environments has typically been a struggle for security practitioners. Maintaining ...
The Secret Lives of Debuggers Lance Buttars Binaries are files like any text file or a bitmap. They can be modified and ...
Malware Fun Kenny Long Common malware techniques will be displayed and discussed
Psst, Come Check Out My Lair!! #notacreeper Justin Larson Are you a lone wolf pentester or do you run in a pack? Lair will ...
You Must Search Before You Destroy Adam Steed Its amazing what you can find out about a target using public information from the ...
Hey Guys, I'm a Pentester! Metacortex It seems like everyone wants to be a pentester. And for good reason...exploitation is sexy ...
Infosec, just doing it. Robert Jorgensen Want to break into infosec or get out of your current infosec rut? This talk ...
The Inception Framework: Cloud Based Targeted Attack Infrastructure Waylon Grange During the summer of 2014, we discovered a highly automated and extremely sophisticated framework for ...
Asymmetric Warfare and Corollaries in Network Defense Jason Tracy Years ago the concept of Asymmetric Warfare was adopted in Military Defense Circles as a ...
Feeding The Shark Jeremy Pierson How and where to get packets. Let's talk about Linux, Windows, Switches, Firewalls and more. ...
Leading Change John Overbaugh Change is difficult, especially cultural change. As security leaders, our biggest challenges are often in ...
From Vim Muggle to Wizard in 10 Easy Steps Erik Falor Vi is more than just a text editor; it has become a way of life ...
Fundamentals That Time Forgot Jup1t3r We'll discuss the fundamentals of network security that many people continue to ignore as fundamentals. ...
Manipulating GUI Elements Deven Fore Line of Business applications are often designed without the best security practices in mind. Through ...
Cloud Security Scott Arveseth The Cloud is here to stay. Organizations are moving to the cloud to reap the ...
How to Prevent Eavesdropping on Office VoIP Calls Dmitry Dessiatnikov Voice over Internet Protocol (VoIP) allows for the voice and multimedia traffic to be sent ...
Authenticode in-depth Scott Piper Code signing provides a way for software publishers to identify an executable came from them. ...
PlagueScanner: An Open Source Multiple AV Scanner Framework Robert Simmons PlagueScanner is an open source framework for organizing any number of AV scanners into one ...
Trends In Exploit Kits Jeffrey Doty "Exploit Kits" are the software that perform driveby downloads. These kits are sold on hacker ...
Take Charge of Your Infosec Career! Glen Roberts You spent $5,000, a plane trip, a hotel and a full workweek on your last ...
RBAC is Dead. So now what? Adam Fisher Role based access control is a key part of any business security implementation. However, in ...
Security Onions and Honey Potz Ethan Dodge Set up a honey pot, tap your network, and see the script kiddies at work. ...
NGINX Can Do That? Test Drive Your Config File! Jeff Anderson I have had countless conversations with developers, projects managers, and even executives that end up ...