BsidesNova 2018 Feb. 24, 2018 to Feb. 24, 2018, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE Jack Daniel , Matt Devost Matthew Devost is a technologist, entrepreneur, and international security expert specializing in cybersecurity, counterterrorism, critical ...
Fingerprints, Passcodes, and Self Incrimination Wendy Knox You’re arrested and your phone is held up to your face to be unlocked by ...
Deep Dive in the Dark Web (OSINT Style) Kirby Plessas The Dark Web cases you see in the news (Silk Road, Alphabay/Hansa, OxyMonster) hinge on ...
The Value of Design in Cyber Threat Intelligence Devon Rollins The hyper-focus of Cyber Threat Intelligence (CTI) on structured tradecraft techniques aimed at understanding patterns ...
DNC Hacked Data in the Hands of a Trained Intelligence Professional Dave Marcus , Wally Prather When exposed or leaked data comes into the public eye what happens? News media skims ...
Adding Pentest Sauce to your Vulnerability Management Recipe Luke Hudson, Andrew Mcnicol Adding Pentest Sauce to your Vulnerability Management Recipe, will discuss the question we often get ...
Your Facts Are Not Safe With Us: Russian Information Operations as Social Engineering Meagan Keim Over the past few years, Russia has proven itself to be an undeniable master of ...
Rethinking Threat Intelligence Tim Gallo Our current vendors and methods for leveraging threat intelligence seem to be broken. They are ...
DECEPTICON: Deceptive Techniques to Derail OSINT attempts Joe Gray When we think of the process for attacking an organization, OSINT comes to the front ...
I Thought Renewing the Domain Name Was Your Job? Allan Liska Domain registration is rarely thought of as a security issue, until the domain is hijacked ...
Automating Unstructured Data Classification Malek ben Salem Organizations use documents to communicate, perform business transactions, collaborate and innovate. These documents, which include ...
Vulnerability Patched in Democratic Donor Database Josh Lospinoso A weak link-generation algorithm exposed Democratic Party donor information in the NGP VAN service to ...
Living in a world with insecure Internet of Things (IoT) Marc Schneider The world around us is continually and rapidly becoming connected to the Internet via a ...
Vulnerability Accountability Levers and How You Can Use Them Amélie Koran With the advent of bug bounties and vulnerability equities process (VEP), issues have arisen in ...
Cyber Mutual Assistance – A New Model for Preparing and Responding to Cyber Attack David Batz Owners and operators of the electric grid in the United States are facing an unprecedented ...
What Color Is Your Cyber Parachute? Cliff Neve , Amélie Koran , Candace King , Trey Maxam , Kazi Islam This moderated panel will address the process of finding your niche in a broad cyber ...
Feds Meet Hackers Beau Woods , Ariel Robinson , Alyssa Feola , Gray Loftin , Amélie E. Koran The history of the relationships between hackers and the government is long, complicated, and always ...
How to get started in Cybersecurity John Stoner Over the course of the last year, I have mentored several people who are just ...
Improving Technical Interviewing Forgotten Sec Have you ever been put into a position to interview a co-worker, but struggle with ...
Recruiting in Cyber Kathleen Smith , Kirsten Renner , Dan Waddel , Sabrina Iacaruso , Suzie Grieco , Karen Stied Dan Waddel will be moderating the discussion
Ask An Expert: Cyber Career Guidance and Advice Sarah Edwards , Chris Gates , Ovie Carroll , Micah Hoffman , Kirby Plessas , Tigran Terpandjian , Bob Gourley , John Terbush , Lea Hurley , Neal Mcloughlin , Willie Lumpkin There are many instances where having someone more experienced help you out can be beneficial. ...
DEFEND AND CONQUER Arash Parsa This CTF is a boot2root CTF. There will be several machines for each team to ...
Good Fishing for Phishers John Laycock This workshop walks you through the analysis of a credential harvesting phishing email. You are ...
Defining TTPs from Incident Data Monty St. John DEFINING TTPS FROM INCIDENT DATA Monty St John, Director of Intelligence This analytics workshop walks ...
The IDS Formerly Known as Bro Andam Pumphrey , Andrew Beard $BRO is gaining a significant amount of buzz in the community, but for those interested ...