BSidesOrlando 2017 April 8, 2017 to April 8, 2017, orlando,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Pwning the Enterprise with PowerShell Beau Bullock The last few years have seen a dramatic increase in the number of PowerShell-based penetration ...
Institutional Cybersecurity Preparedness: Trends and Best Practices Faisal Amin The objective of the presentation is to share with the participants key study findings of ...
Landing an Infosec/Cybersec Job Ed Spencer The goal is to show people how to land the infosec/cybersec job of their dreams. ...
Soft-Skills for Infosec Professionals Jason Blanchard This course will cover the very important but not technical aspects of working in the ...
Let's hunt some bad guys! John Strand In this talk we will discuss how we can hunt down bad guys outside of ...
Exploring Exploit Kits David A. Vargas Exploit kits (EKs) first appeared in 2006 but their initial growth was limited by the ...
How to Train Your Dragons: Effectively Transforming ITers into Infosecers Grecs With the constant flow of reports and organizations whining about the lack of adequate cyber ...
Mining Meteor Tim Medin Meteor is a game-changing framework for rapid software development and is the top-rated web framework ...
Unmasking Chatbots: Hacking API Interfaces and Countermeasures Stephen Singam , Christian Dehoyos A chatbot is an interactive chat robot based on artificial intelligence that is designed to ...
Building Defensible Solutions to Weird Problems Scott Arciszewski Conventional wisdom says, “Don’t roll your own crypto,” but conventional wisdom is eerily silent when ...
Pentesting 101 Hector Bermudez How I started in this field by actually doing a hands-on pentest exercise. Audience will ...
Promoting Innovation by Thinking Inside the Box (Out-Hacking Those Who Attack Us in Cyberspace) Ernest Wong Ever since the origins of the Republic, the American people have demonstrated that they possess ...
Mistaken Identity: Lack of 2FA Gets You Owned Larry “@haxorthematrix” Pesce The story begins with an old, never used gmail address that one day started getting ...
Digital Poltergeists: IoT Hacking Demonstrated Through Lightbulbs Thomas Wilson As the IoT becomes more pervasive, household items with arbitrary WiFi capabilities are becoming ubiquitous. ...
Tabletop Crypto Frank Cash During this presentation we will explore many fun classic versions of cryptography, none of which ...
CTF101 Alex Lynch , Hack@ucf Ever wanted to play in a Capture the Flag competition but didn’t know where to ...
Personal Digital Security 101 Derek Banks Data breaches and digital theft are now so frequent in the daily news cycle we ...
Teaching Evil Chris Niemira Users don’t pay attention to your security guidance and they tune out during those training ...
Risk: It’s not just a game from Parker Brothers Michael Brown As IT Security professionals we know very well the threats and vulnerabilities that affect our ...
I'll Let Myself In: Tactics of Physical Pen Testers Deviant Ollam Many organizations are accustomed to being scared at the results of their network scans and ...
We're all Script Kiddies: Domains for Evil Dave Switzer Main topic will be discussing quick and easy ways to prep domains you plan to ...
Cult of the Dirty Cow Joseph N. Wilson This presentation will tell you more about the Dirt Cow vulnerability and exploit (which had ...