BsidesOklahoma 2017 March 24, 2017 to March 24, 2017, oklahoma,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Keynote Johnny Long N/A
Topic TBA Rich Lay , Fbi Special Agent N/A
Sniffing Out Security Flaws in Your Web App Mic Whitehorn-gillam Sniffing Out Security Flaws in Your Web App A skilled attacker is probably not going ...
The Beginner's Guide to ICS: How to Never Sleep Soundly Again Dan Bougere The Beginner's Guide to ICS: How to Never Sleep Soundly Again Are you tired of ...
Scary Tech that Tracks You Online Luke Crouch Scary Tech that Tracks You Online Abstract: There are over 5,000 online trackers that use ...
Eating the Elephant: Leveraging Data Analytics to Tackle Everyday Security Tasks and Provide Actionable Intelligence Ramece Cave Eating the Elephant: Leveraging Data Analytics to Tackle Everyday Security Tasks and Provide Actionable Intelligence ...
How one line of Python can bring your network to its knees - and how to prevent it. Bobby Simpson How one line of Python can bring your network to its knees - and how ...
Afternoon Keynote: Put on Your Own Mask Before Helping Others Jack Daniel Put on Your Own Mask Before Helping Others We hear it every time we fly, ...
Canary Tokens: Attacks and Defense Nathan Keltner Canary Tokens: Attacks and Defense This talk covers leveraging canaries for offensive and defensive use. ...
How did that get there? The ICS attack surface you may be missing Jason Holcomb How did that get there? The ICS attack surface you may be missing With media ...
Pirates Be Lurkin' at the Single Sign-On Watering Hole Rodney D. Beede Pirates Be Lurkin' at the Single Sign-On Watering Hole Enterprises have standardized on offering web-based ...
Uncovering IoC using PowerShell, Event Logs, and Nagios Dallas Haselhorst Uncovering IoC using PowerShell, Event Logs, and Nagios What security concerns keep you up at ...
Security Risk Management: Risk Assessment and Beyond Greg Guhin Security Risk Management: Risk Assessment and Beyond My presentation will concentrate on using the results ...
Crypto: 500 BC - WWII Luke Crouch Crypto: 500 BC - WWII "Crypto Before Computers": A 60-minute overview of content from The ...
Tracking Down the R0uge N0de Donovan Farrow Tracking Down the R0uge N0de We live in a world today where most security analyst ...
Ransomware: History, Analysis, & Mitigation Andy Thompson Ransomware: History, Analysis, & Mitigation Just as the title says, we go over the humble ...
Your Crypto is Broken Frank Gifford Your Crypto is Broken Cryptography provides protection of data that is inside one trusted unit ...