BSidesNashville 2016 April 16, 2016 to April 16, 2016, nashville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
…And bad mistakes…I've made a few… Jayson E. Street In an industry that does so much to uncover and expose the mistakes of others. ...
AppSec Enigma and Mirage - When Good Ideas Can Go Awry Frank Catucci The enigma of AppSec and the mirages of mitigating risk is something I often see ...
The Art of the Jedi Mind Trick Jeff Man The hacker/security community continues to struggle with how to get our message across to others. ...
How to get into ICS security Mark Heard This talk is about how to get into ICS security — because we don’t have ...
The Ransomware Threat: Tracking the Digital Footprints Kevin Bottomley The continuing evolution of ransomware is a constant threat to businesses of all types. Taking ...
InfoSecs in the City - Starting a Successful CitySec Meetup Johnny Xmas , Fletcher Munson , Chris Carlis , Kate Vajda Founding members of Chicago's (in)famous "BurbSec" meet-ups have assembled a POWERHOUSE panel of influential members ...
Breaking Through Cellular Gateways and How I Gained Access to One of the US's Largest Energy Companies Mike Brancato With cellular networks gaining bandwidth, many organizations are deploying cellular network gateways in remote locations ...
Ever Present Persistence - Established Footholds Seen in the Wild Evan Peña , Chris Truncer Penetration tests don’t commonly require testers to establish a long-term presence within a network, but ...
Forging Your Identity: Credibility Beyond Words Tim Roberts , Brent White Abstract: Pretending to be an employee is one thing, but owning layers of identities is ...
IAM Complicated: Why you need to know about Identity and Access Management Ron Parker Do you know where identities are born? How can you tell what an identify can ...
Put a Sock(et) in it: Understanding and Attacking Sockets on Android Jake Valletta You’re probably wondering how someone could possibly fill a 45 minute slot talking about the ...
At the mountains of malware Wes Widner At the Mountains of Malware is a "how to" setup a malware pipeline of your ...
Collection and Detection with Flow Data: A Follow Up Jason Smith Last year I gave an introduction on what exactly flow data is, what it looks ...
Container Chaos: Docker Security Container Auditing Chris Huntington Docker is one of the hottest tech trends of the past few years. Containerized applications ...
It's Not If But When: How to Create Your Cyber Incident Response Plan Lucie Hayward , Marc Brawner A strong incident response plan is a key component of any organization's cyber defense. Many ...