bsideswellington 2017 Nov. 23, 2017 to Nov. 24, 2017, wellington,new zealand

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Communication: An underrated tool in the infosec revolution Katie Ledoux Whether it’s closing the talent gap, improving security awareness, sharing threat intelligence, or getting the ...
Keeping on top of Ubuntu and Debian security advisories: host agents and wild goose chasing Michael Fincham , Filip Vujičić When ensuring a large number of heterogeneous Ubuntu and Debian machines are "up to date", ...
Confessions of a Red Teamer Pipes “Attackers have bosses and budgets too” — Phil Venables This is a talk for the ...
Beer, Bacon and Blue Teaming Chris Campbell A famous man once said that he didn’t need to attend intel briefings because “I’m, ...
Shining a light on the Internet of Terrible Dan Wallis In order to find out more about this wonderful world of the Internet of Things, ...
Pkit Finder Qasim Khan Phishing is the easiest and most successful attack vector to harvest credentials, deliver malicious file, ...
Layer 2 person spoofing and impostor syndrome Ben Hughes Now that infosec rock stars are appearing on TV shows, they're in headlines, and the ...
Realtime cyber alerting Jeremy Stott Getting tired of not looking at dashboards? Inbox full of alerts you send to trash? ...
Actually, it's about ethics in penetration testing Josh Brodie This talk will feature as a rough guide to not being a Nessus-rebranding, haphazard shell-popping, ...
IOP The Internet of Pancakes Peter Jakowetz 2015 was an important year. NASA confirmed the presence of water on Mars, 195 countries ...
Public WiFi isn't that bad, right? Oliver Ewert What I found while refreshing my knowledge on WiFi security, to protect myself while travelling ...
IoT - How to fight the tyre fire Tom Isaacson Everyone knows that IoT is a tyre fire but what can we do to start ...
Investigation of recent targeted attacks on APAC countries Noushin Shabab We have been tracking targeted attacks on countries and territories in APAC region for the ...
Journey to the top on BugCrowd: The untold tales of struggle and pain Ahmad Ashraff The bug bounty scene has evolved tremendously over the years. It is now very competitve ...
Gophers, whales and.. clouds? Oh my! Glenn Grant Go, Docker and Microservices; some great technologies and buzzwords that we hear so much about ...
Secrets of a High Performance Security Focused Agile Team Kim Carter Security does not have to be neglected when you’re planning, building & running a high ...
Operation Luigi: How I hacked my friend without her noticing Alex I’m at a ramen place with my friend Diana. Diana isn’t her real name, but ...
Avoiding armageddon: Defending your system like a CERT-er Michael Shearer SSH key? Yup. Strong encryption? Uh huh. Systems patched? You bet. So you think that ...
Let's think about drinking Petra Smith How often do you think about drinking? OK, but how often do you _really_ think ...
Mental Health in Infosec - Hackers, hugs, and drugs Amanda Berlin The infosec community is difficult to compare to any other. We are composed of intelligent, ...
Influencing Meat Puppets Through Memes Simon Howard The UK voted to leave the EU and The Donald is president, what a time ...
Rapid Reaction - Foundations of Incident Management Ahmed Elashmawy With the exception of a few organisations, it seems that the effort put into establishing ...
When do we Belong? Aurynn Shaw Impostor syndrome is rampant in the tech communities and it’s hard to understand why. Drawing ...
Reversing the Killchain - An Actionable Framework for Defending Against Common Threats Amanda Berlin The Intrusion Kill Chain, sometimes called the Cyber Kill Chain, is a model for actionable ...
Pandas and Rabbits: Xen Meets American Fuzzy Lop Matthew Daley Xen is an open-source hypervisor that powers some of the world’s biggest public and private ...
#cyberisnotanoun Creeture I'm going to put a strong case for why "cyber" and "cyberspace" are harmful not ...
Onionland Explorers! Ss23 An introduction to Tor, an introduction to Onionland! We'll discuss the basics of how Tor ...
Project Walrus, an RFID and Contactless Card App Daniel Underhay Project Walrus is an Android app we're developing to let pentesters make better use of ...
Crescent Wrenches and Debuggers: Building Your Own Toolkit For Rational Inquiry Kerri Miller Software exists in a constant state of failure, facing pressure on many fronts - malicious ...
Hacker: Crook or Crusader? Lauren Flutey I believe people hold particular ideas about hackers and hacking derived from media and pop ...
The CIO's new process Andrew Hood Have you ever wondered what would have happened if Hans Christian Anderson had lived 180 ...
Protect yourself against the bees Katie Mclaughlin In the meatsphere, you can utilise an apiarists cowl or smoke to protect yourself from ...
Reusing breach data for attack and defence Edward Farrell Data breaches and their disclosure have become commonplace and yet reusing contents from a breach ...
Mistakes were made John Grant #Mistakes were made "Mistakes were made" said by an engineer describing the issue of losing ...
Give your users better feedback about rubbish passwords with zxcvbn Jen Zajac An introduction to zxcvbn, an open source library that provides better password feedback, rating passwords ...
IT Risk and Security Management in Small and Medium Organizations - The Bare Minimum Andreas Drechsler This talk will show 1) a ‘bare minimum’ IT risk and security management (ITRSM) framework ...
Security for Small to Medium-sized Businesses Sai Honig You may think you are small business and not a target group for cybercriminals! MBIE ...
Design for Security Serena Chen This is BSides, so you already know how crucial security is. Yet it's a rare ...
Take a Lesson from Snowboarding and Recruit Kickass Women Toni James 15 years in the snowboard industry driving the initiative to raise the level of female ...
Let me secure that for you Kirk Jackson Writing secure applications is hard, and often vulnerabilities are found after your application has already ...
When Bugs Bite - why neglecting your edge cases can kill Attacus Two people died because of a Unicode support error. Another died because of a camera’s ...