BSidesZurich 2016 Sept. 17, 2016 to Sept. 17, 2016, zurich,switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How to defend from an attacker armed with a mathematician Antonio Sanso Diffie-Hellman key exchange is one of the most common public-key cryptographic methods in use in ...
Reporting the Kill Chain Sven Vetsch Everyone in the technical security industry has to do it, everyone hates it – reporting. ...
Indicators of compromise – wasting resources, revealing too much or following false flags? Candid Wüest Sharing indicators of compromise (IOC) is commonly used to fight against APTs; however, irrespective of ...
“Catch me if you can” The cat & mouse game. Roberto Martinez Each day the Digital Detectives have the challenge of discovering what was designed to be ...
badGPO – Using GPOs for Persistence and Lateral Movement Yves Kraft , Immanuel Willi Group Policy is a feature which provides centralized management and configuration functions for the Microsoft ...