BsidesNash 2017 April 22, 2017 to April 22, 2017, nashville,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Infosec Tools of the Trade: Getting Your Hands Dirty Jason Smith In this presentation we'll will be going over introductions to the various focuses in information ...
Security Guards -- LOL! Brent White During onsite “black box” penetration assessments, it is quite common that you will encounter a ...
Got Vendors? Armin Smailhodzic How many vendors does your company have? Do you have a list of all the ...
How to learn reverse engineering, kick ass at bug bounties, and being a bad ass SOC analyst Ben Actis How to learn reverse engineering, kick ass at bug bounties, and being a bad ass ...
Windows Operating System Archaeology Casey Smith The modern Windows Operating System carries with it an incredible amount of legacy code. The ...
Emerging Legal Trends in Cybersecurity Rodney Hampton How can you make a bad event like a major security breach even worse? By ...
A Pyrate looks at 40 Adam John At 40, everyone is obligated to take that mid-life look at one's self and take ...
Intro to drone tech Ron Foster For the noob, or the expert, this talk will cover types of drones, typical components, ...
Trust, But Verify, Your SAML Service Providers Bruce Wilson BLUF: This talk will provide an overview of how SAML Authentication works, the basics of ...
Springtime for code reviews Ryan Goltry You come upon a long running project that has never had a security centric code ...
Weaponizing Splunk: Using Blue Team Tools for Evil Ryan Hays Splunk is a log aggregation and correlation tool that is normally used for defensive analysis ...
Does DoD Level Security Work in the Real World? Jeff Man After spending nearly 13 years working for the Department of Defense, I ventured out into ...
Marrying Incident Response and Threat Intel Within Your Enterprise Joe Gray Having actionable Threat Intelligence is vital to preventing attacks. Having a strong Incident Response team ...
Chunky Cookies: Smashing Application Aware Defenses Russell Butturini In recent years, defensive technologies have moved past the traditional filtering and anomaly detection at ...