BSidesMSP 2016 June 10, 2016 to June 11, 2016, minneapolis,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote Cryptography Law and general Q&A with the EFF Nate Cardozo Nate Cardozo is a Senior Staff Attorney on the Electronic Frontier Foundation’s digital civil liberties ...
Training - Security 101 boot camp Leonard Jacobs Security 101 Bootcamp covers some of the cyber security analysis fundamentals that a beginning cyber ...
Training - Spy Game: Red Teaming in the real world Kizz Myanthia During "Spy Game" we will look at the entire methodology of what it takes to ...
Inside real APT Tim Crothers We'll delve into comm's resulting from infiltrating C2 (command and control) so attendees can see ...
Fast Furious and Secure: DevOps Edition Ty Sbano DevOps and the agile mindset have arrived at large organizations, but security often gets bolted ...
Maintaining Focus inside the security Maturity Curve Russ Steiger Lots of companies are building security rapidly, but how will you know what to do ...
Automating Malware Analysis for Proactive Detection Paul Melson , Joe Petroske Analyzing malware can lead to valuable information about adversaries, their capabilities, and intentions. This talk ...
“Bridgeing the Gap: Lessons in Adversarial Tradecraft” Matt Nelson , Will Schroeder As companies scramble for a way to keep from being the next Sony, they’ve started ...
Botnet C&C: up close and personal Alex Holden Malware and viruses get more complicated and evasive. Defensive postures concentrate around malware isolation and ...
The Enforcement Awakens Kellman Meghu There is a new hope for transformation in IT services. Let's explore a cautionary tale ...
Workshop: How to get a job in Information Security Anthony J. Stieber Looking to break into a career in Information Security? Join Anthony J. Stieber, Co-Author of ...
Universal Attack Surfaces Jame Renken The network is segmented. There’s aggressive IDS/IPS all over the place. You’ve fired everyone who ...
Micro versus Macro Megan Carney Companies that specialize in endpoint security look for patterns across their customer base, then apply ...
CTF/Red Team Challenge Kizz Myanthia Not your typical "own the box" CTF, this Red Team Challenge will be team based ...
Setting up a test lab with VMWARE Nicholas Chapel If you aren't fortunate enough to have access to a production environment or on-the-job training, ...
Accessible Threat Intelligence with the Splunk app- Optiv Threat Intel Derek Arnold Optiv Threat Intel is a Splunk App that automatically correlates your data with several popular ...