BSidesBoston 2017 April 14, 2017 to April 15, 2017, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Training class: Being MEAN - Attacking the MEAN development stack Casey Dunham For years the LAMP (Linux, Apache, MySQL, PHP) stack was the de facto for a ...
Training class: Industrial Control System Network Analysis Dennis Murphy Industrial Control Systems (ICS) are the silent machines that control the world all around us. ...
Keynote Jack Daniel , Dave Kennedy N/A
Escaping Alcatraz: Breaking out of Application Sandboxed Environments Kirk Hayes Application sandboxing has become extremely popular. This technology makes it easier to manage a network ...
Sink or Swim: Learning How to Take a Deep Dive into Research Tracy Z Maleeff I'm from the library and I'm here to help! Librarians were the original search engines ...
Threat Intelligence in Numbers Nir Yosha Threat intelligence data is all about helping enterprises block or protect against the newest threats.However, ...
Why Does the Industry Make Insecure Software? Game Theory Applied: Software Security is a Social Dilemma Craig Chamberlain The computer / information security business is now decades old and we're still growing negative ...
I Mentor and Now You Can Too! Casey Dunham The hacker community has a reputation of a lust for knowledge and for sharing that ...
From Rogue One to Rebel Alliance: Building Developers into Security Champions Peter Chestna There just aren’t enough security experts to go around. You have to support the multitude ...
Learn How to Speak Malware: A New Approach to Combat Attacks Todd O'boyle In order for an attacker to steal from you, they need persistent access. This means ...
Does Dod Level Security Work in the Real World? Jeff Man After spending nearly 13 years working for the Department of Defense, I ventured out into ...
Panel: Breaking Into InfoSec Ming Chow , Justin Pagano , Tracy Z Maleeff , Keith Hoodlet Are you interested in Information Security, but you don't know where to start?Are you a ...
Heisenberg Cloud: At-Scale Cross-Cloud Adversary Analytics Bob Rudis We may not have Imperial Stormtoopers in our cloud "cyber-cities", but attackers regularly probe these ...
How to Defend Against Penetration Testers ... and Win Paul Asadoorian Do you believe you have what it takes to secure a network against a penetration ...
Security in S, M, L, and XL Vik Solem , Pedro Marcano Security is not a one size fits all solution. Currently most small businesses are incapable ...
Panel: Roles in InfoSec That Don't Require You to be an Engineer Patrick Laverty , Jordan Bowen , Susan Kaufman , Jordan Larose With an estimated shortage of 1.5 million people in cyber security by 2020 and terrible ...
Murder Mystery - How Vulnerability Intelligence is Poisoning your Information Security Program Gordon Mackay Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results ...
Ghost in the Droid Josh Wright Ghost detection apps take many forms in the Google Play store, with an active social ...
Next Generation Application Security Technologies Mike Milner When people think of application security technologies, they think SAST, DAST, WAF, and maybe SCA. ...
Coding in Scratch for Kids Mckenna Laverty Scratch is a coding language for kids created by MIT. Come and find out about ...
Back to Basics: Our Journey of Building a Security Program at a Small Startup Julian Defronzo , Dan Erxleben Building a security program from scratch is hard enough, but it’s even harder for small ...
Scripting Social Engineering Attacks Dave Comstock Script all the things! Streamline phishing, vishing, and gaining physical access to restricted areas by ...
Web Scraping for Fun and Profit Nick Delena , Scott Goodwin Pastebin.com and other public ‘paste’ sites are rich sources of sensitive information. Hackers will often ...
Introduction to Modern Cryptography Amirali Sanatinia Today we use cryptography in almost everywhere. From surfing the web over https, to working ...
Finding Haystacks in Your Needles: Threat Hunting Problems In Real World Data Sarah Miller Resources such as SANS's "Know Normal, Find Evil" and MITRE's ATT&CK framework are a great ...