bsidesaugusta 2017 Sept. 16, 2017 to Sept. 16, 2017, georgia,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Black Mirror of Execution: How new artifacts have changed the 'O' and the 'D Alissa Torres Windows tracks system/user activity with growing sophistication and granularity. Let's walk through some of this ...
Hacking Food Chris Sanders , Jason Smith Being a hacker isn’t just about breaking into computers, it’s about looking for creative ways ...
Machine Learning Fueled Cyber Threat Hunting Tim Crothers Cyber Threat Hunting can be difficult to do well but most organizations have come to ...
Bet You Won't Block Google: Evil APIs on the Rise Michael Banks API’s are a significant utility in today’s information age. Some will argue it’s almost a ...
Unmasking Cybercriminals on the Open Internet Paul Melson Cybercriminals operate under the presumption of anonymity during their intrusions and thefts. Using easy-to-apply analysis ...
Lessons Learned ISAC – How to Get Wisdom as Cheaply as You Can Russell Eubanks Our failure to learn from others misfortune leads us down the same path that fellow ...
Burping for Joy and Financial Gain Tim “lanmaster53″ Tomes If you do application security and don't use Burp Suite, then you're likely doing it ...
Inception Presentation Jason Blanchard In less than 30 minutes, you'll smile, nod in agreement, be amazed, become incredibly self-aware ...
Don't Google 'PowerShell Hunting Josh Rykowski , Sean Eyre The pervasiveness of PowerShell in today's networks speaks to its usefulness to admins and users ...
Hunting Adversaries with Investigation Playbooks & OpenCNA Ismael Valenzuela As SOCs mature and start to formalize their operations, they typically focus on preparedness, escalation ...
Security Automation in the cloud Toni Fuente What it was hardware, now is software, it is just an API call. We deploy ...
Localization of Wireless Threat Actors and Evasion Tactics Tommy Chin Widely used throughout public space, mobile computing devices such as smartphones and Internet of Things ...
Necurs Botnet: Mass Distribution for all the Bad Things Paul Burbage This presentation will include the latest research on the Necurs botnet which has historically spammed ...
Building a Secure Environment for Operations using Docker Brian Stucker Running an environment with containerized applications can help drastically reduce security issues and mitigate risk ...
Managing Your Cyber Career & Job Hunt Bob Wheeler Despite the fact that Cyber Security / Info Sec professionals possess skills that are in ...
Simplified Home VPN Solution: A How To Guide David Peeler , Keaton Sadoski Overall, this will cover why the general public should be educated about privacy and VPN's ...
Zero Days and Zero Trust Part 2: Microsegmentation, Critical Infrastructure Protection, and a World of Many Jack Koons The role of microsegmentation, particularly when combined with advanced encryption and software defined networking, represents ...
Probing Toms: Creepy hackers on your house doorstep Brice Self It's something simple and small that everyone has done or does every day. We leave ...
Say hello to my little friend - An introduction to iOS security and forensics Wes Widner iPhone security is still a relatively obscure field. I'll walk you through a brief history ...
Be a Human nMAP! – Cultivating a ‘Renaissance & Reconnaissance Approach’ for the Social Engineer Tigran Terpandjian As a security analyst with an atypical entry into the information security world, one of ...
The Homeland of Things (HoT) Framework Daniel West During 2016, we witnessed the resiliency of our adversaries as they transitioned from zombifying personal ...
Automating Event Log Production and Testing for SIEM Detection Alek Rollyson When handling a large amount of detection input with limited resources, automation and proper reproducible ...
The Next Big Idea for Cyber Innovations--A Framework to Drastically Improve Cyber Defense (and Offense) Capabilities Ernest Wong Innovation is critical to improvements within our society and is a key component in the ...