BSidesChicago 2017 July 15, 2017 to July 15, 2017, chicago,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome and Opening remarks. Evilkat Over 25 years in the Security field, focusing on building strong security teams and strong ...
Keynote Garrett Gross While we sometimes think of new and emerging technology as the ‘future’ of information security, ...
Industrial Control Systems (ICS) - The good, The bad & The ugly Matt Cowell Industrial Control Systems (ICS) - The good, The bad & The ugly. A higher level ...
Defending Cyberspace with "Inside-the-Box" Thinking Ernest Wong Innovation is a buzzword within the US military and is shaping the vision for our ...
Wait, my wireless is doing WHAT?! Dale Meredith A host of sources, threaten our networks. Most common is the use of wireless networks ...
Vulnerability Hunting on Network Devices Bobby Kuzma Vulnerability hunting on network devices has long been an arcane, occult art-form owing to squamous ...
An Employee, their Laptop and a Hacker walk into a Bar Shannon Fritz If one of your company laptops were lost, what might an attacker be able to ...
Developing a Threat Modeling Mindset Robert Hurlbut Nearly every day we hear about another compromise of a system that involves a breakdown ...
Between You and Me and the Network Security Boundary Patrick Fussell Many organizations have IT environments with zones of varying security requirements. These zones are usually ...
Herding Purple Squirrels: An Experienced, Whistle-Blowing Insider's Look at The Dreadful World of Tech Recruiting Eve Adams Ever feel frustrated, exploited - even objectified - by a technical recruiting experience? Understatement of ...
Sucker Punches: Social Engineering Scams and Trends Erich Kron Phishing and other social engineering scams continue to proliferate and evolve with new hybrid attacks ...
Hackers Interrupted Alex Holden Going beyond a breach or initial damage, let’s examine the minds of the hackers. What ...
Removing Haystacks to find needles - Playing to our Strengths Monica Jain We all have been fighting the cyber war with SIEMs to detect all the known ...
"Humans, right?" Soft Skills and Security Ariel Robinson Bridging the socio-technical divide is imperative to creating a secure future. The thing is, technologists ...
Cloudy with a Chance of Persistence: AWS Post Compromise Persistence Techniques Peter Ewane The use of Amazon Cloud as a base of operations for businesses is increasing at ...
Murder Mystery – How Vulnerability Intelligence is Poisoning your Information Security Program Gordon Mackay In order to solve many modern information security use-cases, organizations have evolved from making decisions ...
x-ways forensics mother fucker, do you use it? Reno Zenere This talk will be a tool review of x-ways forensics. Even though this is commercial ...
Cashless Society: a Credible Death Threat to Privacy Skye Elijah The idea of a cashless society could be one of the greatest threats to freedom ...
War Stories on Embedded Security: Pentesting, IoT, Building Managers, and how to do Better Jared Demott If security were easy, we’d have solved it 20 years ago. Unfortunately for complex networks ...
Identity Theft Through OSINT/Social engineering Zee Abdelnabi This talk will demonstrate how easy identity theft has become because of OSINT and the ...
Sophisticuffs: The rumble over adversary sophistication Paul Jaramillo It has been a reoccurring theme for corporate victims of a major breach to publicly ...