BSidesCharm 2018 April 28, 2018 to April 28, 2018, Baltimore, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Jessica Payne N/a N/A
To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars Lieutenant Wong Can our military continue to think it can fight future wars without the help of ...
Preparing for Incident Handling / Response for Industrial Control Networks Mark Stacey Most Industrial Control System (ICS) networks require Incident Response (IR) procedures. Generally, these procedures fulfill ...
FailTime: Failing towards Success Sean Metcalf The vast majority of talks are about a person or a team's successes. What they ...
Getting Saucy with APFS! - The State of Apple’s New File System Sarah Edwards Do you know what happens when a new file system comes out? ABSOLUTE MAYHEM! All ...
Basic Offensive Application of MOF Files in WMI Scripting Devon Bordonaro , Connor Gephart , And Sam Ruthenberg A basic introduction on how to use MOF files and the Windows Management Instrumentation (WMI) ...
Counting Down to Skynet Nolan Hedglin The Threatcasting Lab at Arizona State University was formed to forecast the threat that emerging ...
An Open Source Malware Classifier and Dataset Phil Roth Research in machine learning for static malware detection has been stymied because of stale, biased, ...
How we reverse engineered OSX/Pirrit, got legal threats and survived Amit Serper What if I told you that you have a piece of software on your machine ...
Threat Activity Attribution: Differentiating the Who from the How Joe Slowik Typical attribution focuses on ‘whodunnit’ - with little clear benefit to network defenders. This talk ...
Quantify your hunt: not your parents’ red teaming Devon Rodriquez The security marketplace is saturated with product claims of detection coverage that have been almost ...
Breaking and Entering: Lessons Learned from a Federal Penetration Tester Joseph Misher From traditional crime to terrorist attacks, surveillance and preparation by the perpetrators often increases the ...
Internet Anarchy & The Global March toward Data Localization Andrea Little Limbago Lacking a global institution to harmonize internet governance, countries are formulating local data governance, privacy, ...
Powershell Deobfuscation: Putting the toothpaste back in the tube Daniel Grant In an effort to provide analysts with a clearer picture of what happened after exploitation ...
Effective Monitoring for Operational Security Russell Germain As Infosec practitioners, how well do you really know and monitor your IT and business ...
Plight at the End of the Tunnel Anjum Ahuja DNS is one of the most ubiquitous and yet least analyzed network protocols. DNS tunnels ...
Rise of the Miners Josh Grunzweig Over the past year, we've witnessed a shift in malware used by both the common ...
Malware Analysis and Automation using Binary Ninja Erika Noerenberg In recent years, the need for automating malware analysis and reverse engineering tasks has become ...
Using Atomic Red Team to Test Endpoint Solutions Adam Mathis As organizations deploy endpoint solutions, testing them becomes imperative. Often teams don’t know how to ...
Exercise Your SOC: How to run an effective SOC response simulation Brian Andrzejewski Security Operation Centers (SOCs) are the front line for incident detection, response, and escalation for ...
Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Adams Pentesting labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great ...
Building a Predictive Pipeline to Rapidly Detect Phishing Domains Wes Connell Registering a new domain, requesting an SSL certificate, and installing it on the server got ...