BSidesKansasCity 2018 April 20, 2018 to April 20, 2018, Kansas City, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Keynote Fred Wilmot , Craig Smith N/A
Dear Blue Team: Proactive Steps to Supercharge your IR Joe Gray In an age where data breaches and malware infections are quickly becoming the norm, we ...
Selling Security Britney Hommertzheim Why can't you get the 5 basic building blocks of security implemented? Knowing them is ...
Docker Cloudlove, or "How I learned to stop snarking and embrace the DevOps." Justin Ferguson As security practitioners, it's easy to become set in our ways, and decry loudly each ...
From Port Scanning to Password Cracking: If You're Not Using NMAP, You're Doing It Wrong Jered Bare This talk will discuss the Swiss army knife of all Security tools: NMAP. The major ...
5Ghz Electronic Warfare Gabriel Ryan In this presentation we will introduce a new feature to eaphammer: the ability to easily ...
Afternoon Keynote: Why We Should All Be STEMinists Ruby Rios From a young age, Ruby recognized that there was a lack of females in her ...
Operational Security in a Weaponized World Aaron Crawford We live our lives in a gadget-orientated age which provides convenience that borders on magical. ...
Data Hoarders: finding needles in stacks of needles James Pleger Over the last 10 years, security has gone from "We need more data!" to "Please ...
Finding the Seoul of Malware: An Analysis of Attacks in East Asia Justin Nitz Have you been intrigued by the latest malware attacks targeting e-commerce startups in foreign countries? ...
Alexa and Google are listening, how much are they transmitting? Aaron Blythe Over the past couple years, we have invited Alexa and Google into our homes to ...
So you wanna build a Security Lab Gared Seats Have you ever wanted a lab or development setup, so you can try things, test ...
DanderSpritz: A case study in Nation State Post-Exploitation Framework Capabilities & Defense Strategies Francisco Donoso This talk will cover the tools, methodologies, and capabilities built into DanderSpritz, the Equation Group's ...
ANTI-OSINT AF: How to become untouchable Ginsberg Lets talk a bit about privacy...In this talk, we look into the benefits of online ...
Getting the most out of your Pentest Ryan Preston Did you receive a good Pentest? Do you know the difference? Could you have gotten ...
Introduction to Federated Authentication Systems Matt Randall In the last decade, the software industry has seen the rise of software-as-a-service ("SaaS") as ...
Threat Hunting with RockNSM Bradford Dabbs RockNSM is a passive network collection platform built by the Missouri Cyber Team to facilitate ...
Injection Attacks: Defending an Application Takedown Andy Nelson With the release of the OWASP (Open Web Application Security Project) Top 10 for 2017, ...
Discovery - What You Look Like To An Attacker Daniel John Lawson This talk will cover various aspects of "Discovery" on an organization. This is the process ...
Intro to Lockpicking N/a N/A
“Spy tricks” Hiding data in plain site N/a N/A