bsidesdc 2016 Oct. 21, 2016 to Oct. 23, 2016, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Bro Crash Course Liam Randall In the last three years the Bro Platform has taken the network monitoring scene by ...
Binary Reverse Engineering for Beginners Benjamin Demick Binary reverse engineering is a critical skill in the infosec world, from verifying crypto algorithms ...
Welcome Alex Norman N/A
Keynote Marcia Hofmann N/A
WCTF Magic as told by a clumsy Magician Timothy Allmon I am not going to show you how to break WEP or WPA. What I ...
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk Gordon Mackay Vulnerability management (VM) solutions and products that are central to every information security program contain ...
Detecting Malicious websites using Machine Learning Ajit Thyagarajan We present a set of newly tuned algorithms that can distinguish between malicious and non-malicious ...
CryptKids Keynote Liam Randall N/A
Applying data science to identify malicious actors in enterprise logs Balaji Balakrishnan Applying data science to identify malicious actors in enterprise logs The presentation will provide guidelines ...
PowerShell Security: Defending the Enterprise from the Latest Attack Platform Sean Metcalf PowerShell is a boon to administrators, providing command consistency and the ability to quickly gather ...
Attacking Patient Health: The Anatomy of Hospital Exploitation Jacob Holcomb This research results from our assessment of numerous healthcare related facilities and several medical devices ...
Beyond Automated Testing Zachary Meyers Have you ever run a vulnerability scan and thought “Okay… now what?” This talk is ...
Adversarial Post-Exploitation: Lessons From The Pros Justin Warner With the recent evolution in red teaming and a shift towards adversary emulation for network ...
How to Join the Infosec Community Micah Hoffman In 2005, I was happy. I’d earned my CEH and CISSP certifications and was content ...
Act and Think like an Epidemiologist to Combat Digital Diseases Efrain Ortiz My presentation is about changing the way we communicate and the way we tackle the ...
Abusing Windows with PowerShell and Microsoft debuggers in user-land and kernel-land Pierre-alexandre Braeken PowerMemory is a post-exploitation tool and an Active Directory recognition tool. It can bypass antivirus ...
I got a shell... now where's the Power Raymond Gabler Intro to Powershell by dissection. In this class we will download a tool/script and use ...
Building Blocks: The Security Analyst's Toolbox Kerry Hazelton To understand security analysis, it is important to know and understand the concepts, methods, and ...
We Should Talk About This: Data Security as an Issue for Communication Research Claire Tills Data security is a very hot topic but, as is frequently the case, getting clear ...
YAYA (Yet Another YARA Allocution) John Laycock Are you a security professional looking for ways to identify and classify malware families? While ...
A Hacker’s Guide to Usability Testing Greg Norcie Tor. PGP. OTR. We have privacy enhancing technologies (PETs), but when was the last time ...
Tales from the Crypt...(analyst) Jeff Man As a certified Cryptanalyst for the National Security Agency, the speaker was classically trained in ...
Tipping the Scales Back In Our Favor Rene Aguero The economics of attacks heavily favor the attackers. 0 day vulnerabilities and malware kits are ...
“Knowing the Enemy”- Creating a Cyber Threat Actor Attribution Program Jack Johnson Cyber-attacks have continued to rise, with the existing threats progressively evolving at a rapid pace ...
Practical Cyborgism: Getting Start with Machine Learning for Incident Detection David J. Bianco Organizations today are collecting more information about what's going on in their environments than ever ...
What’s the Big Deal with Assessing ICS/SCADA? Jim Gilsinn Traditionally, assessing networks has involved hammering on them using a variety of passive and active ...