Bsidesamsterdam 2017 Sept. 1, 2017 to Sept. 1, 2017, amsterdam,netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Bots Combine! : Behind the Modern Botnet Andrea Scarfo Botnets are part of the dynamic infrastructure seen in modern large scale cyber attacks, spy ...
V!4GR4: Cyber-Crime, Enlarged Ben herzberg Trafficking of counterfeit pharmaceuticals is a massive industry, and have been known for its persistent ...
I Boot when U-Boot Bernardo Maia Rodrigues , Vincent Ruijter Personal computer systems are now considerably more secure than embedded devices. Trusted Platform Module (TPM) ...
Demystifying the Ransomware and IoT Threat Christopher Elisan We have seen a rise in Ransomware attacks in the past year. While we are ...
Automating security with PowerShell Jaap Brasser There is no doubt that security has been in the spotlight over the last few ...
To click or not to click, or how to build awareness about behavior online Jelena Milosevic One of the largest problem we face in and about cyber security is human error. ...
To pin or not to pin: an introduction into SSL pinning for Android & iOS Jeroen Willemsen Should you pin? And if so: on what? On the certificate? On the public key? ...
The hidden horrors that 3 years of global red-teaming have revealed to me Jos Peet My last 3 years of global reteaming in small and large organisations has shown me ...
Behavioral Analysis using DNS, Network Traffic and Logs Josh Pyorre Multiple methods exist for detecting malicious activity in a network, including intrusion detection, anti-virus, and ...
What if we really assumed breach? Kevin Jonkers Every large organization that takes security seriously is supposedly doing it: “assume breach”. working under ...
I Thought I Saw a |-|4><0.- Thomas Fischer Threat Hunting refers to proactively and iteratively searching through networks or datasets to detect and ...
Requiem For An Admin Walter Legowski Orchestrating BloodHound and Empire for Automated AD Post-Exploitation. Lateral Movement and Privilege Escalation are two ...
Building Secure Software with OWASP Martin Von Knobloch This presentation is about tools and guide OWASP.org offers to developers to increase security in ...
WebGoat CTF workshop Nanne Baars In the world of application security a 'Capture the Flag' event is a competition where ...