bsidestampa 2018 Feb. 17, 2018 to Feb. 17, 2018, tampa,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
OPENING ANNOUNCEMENT Joe Partlow N/A
OPENING KEYNOTE – CYBER ASSURANCE – TESTING FOR SUCCESS John Burger How do you know your investments in security controls are effective? Many traditional Red Team ...
HACKING COLLEGE 102 – MORE ON CHEAP/FAST COLLEGE EDUCATIONS Gene Cronk Cheap and Free ways to get college credits, and possibly even a degree.
USING YOUR SUPER POWERS BEYOND THE BITS – PEOPLE ARE ESSENTIAL TO YOUR EFFECTIVENESS & CAREER ADVANCEMENT – YOU HAVE AN AWESOME SET OF TOOLS Jeff Hicks You have Super Powers you use to: * assess complex situations * meet challenges from ...
ADVANCED SOCIAL ENGINEERING AND OSINT FOR PENETRATION TESTING Joe Gray Today, we keep hearing about massive data breaches and companies being hacked. While some of ...
LEADERSHIP’S ROLE IN CYBERSECURITY AND DATA BREACHES Felice Flake All members of leadership play a big role in the success or failure of security ...
RECRUITER PANEL – NAVIGATING A CAREER SEARCH Mike Wolford , Kristen Renner , Milicent Reed , Derek Porter Just like a pirate is always looking for their next treasure, a job seeker should ...
GOING SAVAGE: STRATEGIES FOR TAKING CONTROL OF YOUR CYBERSECURITY FATE Todd O’boyle When it comes to security programs, the average organization spends 80% of its energy on ...
A VERY PARTICULAR SET OF SKILLS Dorian Kelley Approaching technology skills as tradeskills, from the standpoint that approaching ourselves not as “smart people” ...
CLOSING REMARKS Wesley Alvarez EC Council Award - Wesley Alvarez BSI - Dan Doyle
CLOSING KEYNOTE – FRAUD; SHOULD YOU WORRY? Greg Hanis How I tracked down carders, and infiltrate criminal communities to discover the techniques used to ...
YOU CAN RUN..BUT YOU CAN’T HIDE! Bruce Anderson More than ever cyber criminals are utilizing the internet to hide their schemes of fraud, ...
RED TEAM APOCALYPSE Beau Bullock , Derek Banks TABLETOP SCENARIO: Your organization regularly patches, uses application whitelisting, has NextGen-NG™ firewalls/IDS’s, and has the ...
ADVANCED PERSISTENT SECURITY Ira Winkler Any attack against significant organizations is labeled "Sophisticated" by default. The reality is that most ...
ADDING SIMULATED USERS TO YOUR PENTESTING LAB WITH POWERSHELL Barrett Adams , Chris Myers Pentesting labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great ...
THE SHOULDERS OF INFOSEC Jack Daniels “If I have seen further it is by standing on the shoulders of giants” Most ...
BLOCKCHAIN: THE NEW DIGITAL SWISS ARMY KNIFE? G. Mark Hardy Blockchain as a technology has been proposed as a solution to everything from frictionless currency ...
MODERN DAY VANDALS AND THIEVES: WIRELESS EDITION Jonathan Echavarria , David Switzer There’s many reasons people may want to know about what’s in your home, be it ...
A SECURITY LOOK AT VOICE-BASED ASSISTANTS David Vargas Rapid developments in the field of artificial intelligence (AI) have resulted in a spate of ...
HACKERS INTERRUPTED Alex Holden Examining hacker’s motivations is not an easy task. We need to step away from a ...
INSANE IN THE MAINFRAME: TAKING CONTROL OF AZURE SECURITY Jeremy Rasmussen Everybody’s moving to the cloud these days. If you’re not already on Office365/Azure, odds are ...
MIFARE LADY: TEACHING AN OLD RFID NEW TRICKS Daniel Reilly My presentation analyzes the MiFare Classic and Plus EV1 specifications. I cover some history and ...
MEDICAL DEVICE SECURITY: STATE OF THE ART IN 2018 Shawn Merdinger Over the past several years, medical device security has emerged from a unrecognized shadowy security ...
WEAPONIZING IOT – NOT! Kat Fitzgerald This talk opens with brief introduction to IoT types of attacks and vulnerabilities, over the ...
BLUE TEAM’S TOOL DUMP Alex C. Kot I will be going over a list of definitions, tools that fit each category, and ...
EXPLOITING ZILLOW “ZESTIMATE” FOR RECKLESS PROFIT Rj Burney , Robert This talk looks at Zillow’s Zestimate, which provides homeowners, sellers, and realestate agents residential price ...
SELF HEALING CYBER WEAPONS Logan Hicks My topic will cover legeraging cloud technology to create self healing and self expanding cyber ...
RANSOMWARE: A DECLINING FORCE IN TODAY’S THREAT LANDSCAPE Brad Duncan In recent years, ransomware has been a notable theme in news reports of malicious Internet ...
MODERN WEB APPLICATION SECURITY Julien Vehent It is 2018 and your websites are still getting targeted on a daily basis. Your ...
CRITICAL INFRASTRUCTURE & SCADA SECURITY 101 FOR CYBERSECURITY PROFESSIONALS Juan Lopez Critical infrastructure is realizing tremendous growth and integration of technology-enabled solutions to improve system performance, ...
EXOTHERMIC DATA DESTRUCTION: DEFEATING DRIVE RECOVERY FORENSICS Nikita Mazurov , Kenneth Brown With rogue data harvesting from discarded devices an ever-present risk, the question of how to ...
BUILDING A PREDICTIVE PIPELINE TO RAPIDLY DETECT PHISHING DOMAINS Wesley Connell Registering a phishing domain, requesting an SSL certificate, and installing it on the server got ...
EATING THE ELEPHANT: LEVERAGING DATA ANALYTICS TO TACKLE EVERYDAY SECURITY TASKS AND PROVIDE ACTIONABLE INTELLIGENCE Ramece Cave During this talk, we will analyze real data, discuss and apply various methods, data frameworks ...
HEALTH IT – THE “NEW” INFORMATION SECURITY AREA Johan Lidros From mainly using IT in supporting processes, IT is now a primary tool in many ...
WHAT DO PIRATES KNOW ABOUT INNOVATING FOR CYBERWARFARE? MUCH MORE THAN YOU THINK—PROVIDING THE DEFENSE WITH A WAY TO GAIN A STEP AHEAD OF THE ATTACKER Ernest Wong Since the origins of the Republic, the American people have shown a strong speculative knack ...
PWNING EVOLUTION OR THE HITCHHIKER’S GUIDE TO HACKING MEATSPACE Jennifer Szkatulski During this talk, we will provide the traditional hacking community with information, details, plans, and ...
NETWORK TRAFFIC ANALYSIS VIA PACKET-TO-NOTE SOUND TRANSLATION. Killian Ditch TLDR: Nifty Python tool to play music corresponding to network traffic that contains the potential ...
CRASH COURSE TO BUILDING DECENTRALIZED BLOCKCHAIN APPLICATIONS Kevin Hodges ICOs and DApps are all the hype this year and they are about to have ...
THE LEXICON PROJECT, RISK MANAGEMENT, AND YOU John Mccumber This session will be conducted by (ISC)2’s very own Director for Cybersecurity Advocacy. It will ...
AN INTRODUCTION TO THE “SOC FOR CYBERSECURITY” REPORT Michael Brown Most may be familiar with SOC 2 reports, which is “System and Organization Controls” (was ...
GDPR: THE IMPACT OF EU PRIVACY LAW Teresa Schoch The GDPR will become effective on May 25, 2017. It specifies the security and information ...
GIT GUD Tyler Hoyt I will begin with the basics of how git stores commits and uses hash pointers ...
FOSTERING CORPORATE SECURITY CULTURE: MAKE YOUR EMPLOYEES HARD CYBER TARGETS Rosa Smothers Employees are the largest vulnerability to any cyber security program. Just as systems must be ...
HIGH PERFORMANCE LEADERSHIP……………….MAXIMIZING THE IT WORK FORCE Stephen P Corcoran To achieve maximum effectiveness and efficiency, IT organizations need to be agile. In a highly ...
USING DOMAIN FRONTING TO ABUSE CONTENT DELIVERY NETWORKS Andy Givens This presentation will show a new technique for domain fronting, which enables attackers to abuse ...