BSidesNola 2017 April 1, 2017 to April 1, 2017, new orleans,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
History Repeating: Patterns in the Evolution of the Security Industry Mike Murray The old cliche is that those who don't learn history are doomed to repeat it. ...
A Case Study in Attacking KeePass Will Schroeder , Lee Christensen KeePass is one of the most commonly used password managers in modern enterprises, with the ...
Andromeda – bringing sexy back with PowerShell Jared Greenhill Organizations commonly face older malware threats that are being retooled with modern, sophisticated delivery and ...
Cross-Site Scripting: To Alert() and Beyond! Joshua Barone Cross-Site Scripting is often reported, in the news and as findings in analysis reports. People ...
Defining "Reasonable Security" in 2017 David A. Stampley In 2016, a shared legal understanding of what reasonable security looks like continued to evolve, ...
DFIR from the LEO side Stephen A. Villere Learn from a local law enforcement forensics lab supervisor how local law enforcement handles digital ...
Finding Haystacks in Your Needles: Threat Hunting Problems in Real World Data Sarah Miller Resources such as SANS's "Know Normal, Find Evil" and MITRE's ATT&CK framework are a great ...
Intro to Darknets Golden Iii This talk introduces key darknet technologies, such as Tor, I2P, Freenet, ZeroNet, and cryptocurrencies such ...
Logs Unite! - Forensic Analysis of Apple Unified Logs Sarah Edwards Apple has introduced a new unified way of logging across devices and operating systems. Now ...
Murder Mystery – How Vulnerability Intelligence is Poisoning your Information Security Program Gordon Mackay Integrating vulnerability scanning results into one’s security ecosystem involves a serious hidden challenge which results ...
One Script To Triage Them All! Asif Matadar Triage of 100’s or even 1000’s of *nix based systems during an incident can be ...
Ransomware Stories From the Front Lines Thomas Pace Ever wonder how ransomware negotiations look? How much they actually cost? How successful the negotiations ...
SIEM is dead? Not so fast: How to use SIEM as an analysis/IR tool Erika Noerenberg Recently there has been talk of moving away from traditional SIEM platforms into a security ...
Web App Forensics Vassil Roussev , Shane Mcculley Web applications present a qualitatively new target for digital forensics/incidents response: the server component is ...
Windows IR made easier and faster Michael Gough Windows systems are still king of the desktop and server operating systems, thus the #1 ...