BSidesDenver 2018 May 11, 2018 to May 11, 2018, Denver, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Putting the Love into your DLP David Phillips Over the last 12 years of being involved with Data Loss Prevention I have seen ...
In The Trenches: Dealing With Ransomware and the Attackers Behind It Elizabeth Cookson Ransomware has locked your files and deleted your backups - you decide to pay up. ...
Hacker Carpet Bomb Andy "rainmaker" Thompson This talk is series of live demonstrations of real-world attacks that organizations see on a ...
Building a Cyber Incident Response Program that fits your budget Cuong Dinh A strong incident response (IR) program is a key component in any organization's cybersecurity defense. ...
Converge: A Cross Discipline Approach to IR and Breach Investigations (and Lessons Learned) Douglas Brush How non-traditional litigation tools can assist cyber investigators with Incident Response and data breaches.With the ...
Blue Cloud of Death: Red Teaming Azure Bryce Kunz On-demand IT services are being publicized as the "new normal", but often times these services ...
GDPR: Finding the Magic Bullet Ken Morehouse GDPR enforcement is quickly approaching. Companies outside the EU have been either ignoring the regulations, ...
Seive of Stackstrings: Hunting, Triaging, and Deobfuscating Stackstrings in Malware William Ballenthin Like packing, the presence of obfuscated data in executable files often indicates a malicious disposition. ...
Ducky-in-the-middle: Injecting keystokes into plaintext protocols Esteban Rodriguez This presentation will cover the research I preformed analyzing the protocols used for HippoRemote, and ...
Why are you still focused on guarding the empty castle? David Phillips Data is the gold of our age and it is everywhere not just behind the ...
So it begins: a neophyte's journey into the arcane magic of cyber security Gabriel Walker Looking at the first steps of learning about info sec from the view point of ...
GreatSCT: Gotta Catch 'Em AWL Chris "lopi" Spehn Great Scott Marty, we went all the way back to 1995! The project is called ...
DanderSpritz: A case study in Nation State Post-Exploitation Framework Capabilities & Defense Strategies Fancisco Donoso A lot of organizations and independent researchers have dug into The ShadowBroker's leaks and the ...
Innovation in Cyber GRC: Rise of the CRO and CSO Elvis Moreland With the dynamic climate of corporate cyber-risk, cyber-security, corporate GRC, Enterprise Risk Management, Compliance and ...
Adversary Simulation Using Metasploit and ATT&CK Hristo Asenov With an ever-increasing landscape of vulnerabilities and threats, it becomes imperative that Blue Teams are ...
Thinking outside the security box: Assembling non-traditional security teams Jay Paz In an environment where traditional security professionals are scarce, I have taken a different approach ...
Home' DDOS defense Kevin 'pmscientist' Brady How to prepare yourself [and your provider] for effective DDOS response
Pwning in the Sandbox OSX Macro Exploitation & Beyond Adam Chrastil While performing red team engagements against a hybrid OSX/Windows environment we were challenged with creating ...
Shoulder for ARM: Generating Software from the ARM Architecture Reference Manual Jared Wright Reference manuals for the ARM architecture are complex and exceedingly long (over 6000 pages for ...
Collect and SOAR all the things Colin Blumer Visibility and Analytics are key, but how can you act on all of that data ...
Finding the Rouge Node - Digital Forensics and IR Donovan Farrow Have you ever wanted to find out how that one 0-day took down the business? ...
Sentry or: How I Learned to Stop Worrying and Delete My Accounts Michael West With social media, anyone can become "incidentally infamous" in minutes. Your tweet could go viral, ...
WiFiPi: Rasperries and Radios and Antennas, oh my! Ray Doyle Tired of carrying heavy backpacks? Wondering why wireless assessments can be such a drag? Script ...
Operation Segmentation? Kevin 'pmscientist' Brady Layered network defense is good, but can we have too many layers and are there ...
Why Hackers Still Get In Trevor O'donnal In my talk, i give examples of methods hackers (and penetration testers) use to penetrate ...