BsidesCleveland 2016 June 24, 2016 to June 25, 2016, cleveland,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Keynote Ian Amit N/A
Ask a CISO Jamie Murdock There are a lot of different talks that are on specific topics, but it's not ...
Elementary, my dear Watson – A story of indicators Nir Yosha A real story of the cyber attack on the Israeli Police Department during 2012 and ...
Preventing credential theft & lateral movement after initial compromise. Cameron Moore You’ve done the patch work, you have good perimeter defenses, and even application whitelisting, however, ...
Fun with One Line of Powershell Matthew Turner This talk shows how to use one line of PowerShell in different ways to get ...
Crime Prevention Through Environmental Design Michael Mendez Learn how to use non-traditional design elements to enhance physical security. Capitalizing on environmental aspects ...
Better life through Models Steven Legg Models play a major role in our lives - we start using them as an ...
Learning From Pirates of the Late 1600s - The first APT Adam Hogan "In an effort of general threat intelligence I sought to understand what understanding of other ...
AfterNoon Keynote - Chris Roberts TBA Chris Roberts CSH and Senior Consultant, Sentinel Global Roberts is credentialed in many of the top IT ...
Security Automation in your Continuous Integration Pipeline Jimmy Byrd Developers use unit tests and acceptances tests in continuous integration (CI) to find bugs early ...
Playing Doctor: Lessons the Blue Team can Learn from Patient Engagement Stefani Shaffer-pond , J wolfgang Goerlich At CircleCityCon 2015 in the presentation “Turn Your Head and Cough”, Nathaniel "Dr. Whom" Husted ...
The Art of Bit-Banging: Gaining Full Control of (Nearly) Any Bus Protocol Aaron Waibel Most buses have dedicated hardware that a system uses to communicate with attached devices. This ...
The WiX Toolset, How to Make Your Own MSIs Charles Yost A 20 minute crash course on the basics of: Using the WiX Toolset to create ...
A Rookie PoV: The Hollywood Fallacy Raquel Milligan Most people have seen TV Shows such as CSI Cyber or Scorpion, just to name ...
Responder for Purple Teams Kevin Gennuso This talk will focus on the tool Responder and how it can be used by ...
Port Scanning the Hermit Kingdom: Or What NMAP Can Teach Us About Geopolitics Thomas Pieragastini This talk will center on a project that has been active since July 2015, which ...
Splunk for IR and Forensics Tony Iacobelli Data Analysis: it sucks. Make it not suck with Splunk, a 21st century approach for ...
Bridging the Gap or: How I Learned to Stop Worrying, and Love the Developers Eric Mikulas The relationship between security professional, and developers often seems adversarial. In this presentation I will ...
SafeCracking on a Budget Redux David Hunt , Zack Nagaich Lesson learned in applying knowledge from the "SafeCracking on a Budget" presentation. http://2014.ruxcon.org.au/assets/2014/slides/rux-safe-cracking.pdf. We had ...
Process Ventriloquism Spencer Mcintyre This talk will present and outline various techniques for the manipulation of processes at runtime ...
Gamify Security Awareness: Failure to Engage is Failure to Secure Michael Woolard We call it security awareness training, but all we ever give our employees is regurgitated ...
The Digital Beginning of the Analog End Brad Hegrat "Throughout human history, we have been dependent on machines to survive. Fate, it seems, is ...
Cleveland Locksport Jeff ( Dark Tangent ) Moss , Doug Hiwiller An overview of physical security - How locks work and how we pick them.
Cons and Conjurers: Lessons for Infiltration Paul Blonsky I will examine how the techniques of con artists and magicians are relevant to physical ...
State of Emergency: We're Under "Cyber" Attack Jeremy Mio When there is a natural disaster or catastrophic event... who ensures responsibility for recovery or ...