BSidesphilly 2017 Aug. 12, 2017 to Aug. 12, 2017, philladelphia,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Your Facts Are Not Safe With Us: Russian Information Operations As Social Engineering Meagan Keim Over the past few years, Russia has proven itself to be an undeniable master of ...
Supercharge Your SOC with Sysmon Christopher A. Lee , Matt Giannetto "Our SOC was ready for an endpoint detection and response solution, but we couldn't justify ...
Disinformation and Hiding Your Personal Information James Macready If the Equifax breach has taught us anything, it's that our personal information is no ...
Threat Hunting: Defining the Process While Circumventing Corporate Obstacles Kevin Foster , Matt Schneck , Ryan Andress Threat hunting is a hot topic spurred on by the thought that it’s not a ...
Put up a CryptoWall and Locky the Key - Stopping the Explosion of Ransomware Erich Kron Ransomware is spreading at an alarming pace and infecting networks across all industries and company ...
Web Hacking 101 Hands-on with Burp Suite David Rhoades This is a half-day hands-on training course. Let me know if this is something you ...
Pack your Android: Everything you need to know about Android Boxing Swapnil Deshmukh Android malware authors may enforce one or a combination of protection techniques like obfuscators, packers ...
Hacker Mindset David Brown Throughout the history of information security people have asked a simple question; why do people ...
Keynote - Innovating for 21st Century Warfare Ernest Wong What the Demi-Gods at NSA have Gotten Wrong! Since the origins of the Republic, the ...
MFA, It’s 2017 and You’re Still Doing Wrong Chris Salerno , Dan Astor We can all agree that having single-factor remote access gateways (VPN, Citrix, Remote Apps, etc.) ...
IoT devices are one of the biggest challenges Charles Sgrillo IoT devices are one of the biggest challenges for security professionals now and will continue ...
Evading C2 Detection with Asymmetry Andrew Johnston , Anthony Motto Detecting callouts to command-and-control (C2) servers used to be straightforward, but attackers in your network ...
Abusing Normality: Data Exfiltration in Plain Site Aelon Porat As a defender, you can recognize a potential compromise when a new WMI class appears ...
Smarter ways to gain skills, or as the DoD puts it P. Shane Gallagher , Evan Dornbush Smarter ways to gain skills, or as the DoD puts it: Leveraging the right learning ...
Game of the SE: Improv comedy as a tool in Social Engineering Danny Akacki Security Monkey: No scene is ever about the words being spoken. - Del Close What ...
File Polyglottery; or, This Proof of Concept is Also a Picture of Cats Evan Sultanik A polyglot is a file that can be interpreted as multiple different filetypes depending on ...