BSidesCleveland 2017 June 23, 2017 to June 24, 2017, cleveland,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Keynote Wendy Nather Wendy Nather is Principal Security Strategist at Duo Security. She was previously the Research Director ...
PANDA, walking loud in the cloud Doug Burks , Seth Hall , Logan Hicks , Kelsey Hightower , Laura Taylor Free Access to Datacenters, Infrastructure, and DevOps technology with PANDA
Better manual web application testing through automation Brian Mead Web application security is much more then running a security scanner and turning over the ...
Blue-Teamin' on a Budget [of Zero] Kyle Bubp Even though large breaches have hit headline news in years past, some companies are still ...
Diary of a Security Noob Tj Toterhi Being new to infosec can be exciting and overwhelming. With the field going through such ...
Enterprise Monitoring From Zero Andrew Johnson You're new(-ish?) to the environment. Security Monitoring is new to the environment. How do we ...
Delete Yourself: Cognitive Bias during incidence response Dru Streicher How does cognitive bias hinder incident response? This presentation will explore the bias that you ...
What They're Teaching Kids These Days Chaim Sanders , Rob Olson Security is hard but security education may be harder. Few academic institutions have the skills ...
Mid-Day Keynote John Strand N/A
IoT Device Pentesting Erik Daguerre This talk is based on the "Basics of Hardware Hacking" (https://engage.securestate.com/basics-of-hardware-hacking-using-the-amazon-iot-button) with a primary focus ...
Cyber, Cyber, Cyber - Using the killchain to accomplish something Amanda Sullivan Berlin Everyone talks about the cyberkill chain(tm). I want to show you how to map some ...
Decentralization For Security and Freedom: A Discussion of Asymmetric and Decentralized Technologies Tom Pieragastini The centralization of the internet in the hands of large telecommunications companies, ISPs and service ...
Getting back to the old school Jamie Murdock Technology keeps advancing and with next gen this, machine learning that, a lot of organizations ...
Building your Human Firewall Christopher Jones , John Winkler How to proactively train an organization to respond to security threats such as phishing attempts, ...
Quantifying Security's Value - It Can Be Done! Arianna Willett Security has long been considered a cost center within organizations. It's time to change the ...
The Python in the Apple Spencer Mcintyre This talk will be equal parts runtime manipulation of OS X processes via Python, and ...
Spy vs. Spy - Tips from the trenches for red and blue teams Thomas Mcbee , Jeff Mccutchan This talk outlines some common red team tactics as well as some of the defensive ...
Election Security Defense: Can we swing it? Jeremy Mio So, we have all survived the elections... most of us in the InfoSec community following ...
Eye on the Prize - a Proposal for Legalizing Hacking Back Adam Hogan The myriad objections to legalizing hacking back all agree that an undisciplined horde of skids ...
Choose Django for Secure Web Development Vince Salvino Why choose Django for your next web development project? We'll explore Django security features, show ...
Don the (cyber) Jacket Marissa Q. Cybersecurity: It's all the rage right now - even relatives talk about it over dinner. ...
MacOS - An easy exploit 2-ways. Cody Smith MacOS has a flaw that revolves around the OS's "Automator" tool. This tool coupled with ...
Bypassing Next-Gen Tech David Kennedy Next-Gen-.... everything is being touted as the savior of all our security needs. Enhanced detection ...
Bug Bounty Submission Tips From A Very Overworked BB Analyst Ben Holley We will discuss tips for Bug Bounty submitters to: a. Write submissions that companies will ...
Hacking in Highschool: Inspiring the next generation of security professionals Michael Benich Statistics show Information Security is a rapidly-growing field where the growth of available opportunities outpaces ...