BSidesNashville 2018 April 14, 2018 to April 14, 2018, Nashville, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Know Your Why Oladipupo (ladi) Adefala The two most important days of your life are the day you were born and ...
An Oral History of Bug Bounty Programs Dustin Childs Bug bounty programs are nearly ubiquitous today, but that wasn’t always the case. From their ...
Blue Cloud of Death: Red Teaming Azure Bryce Kunz On-demand IT services are being publicized as the “new normal”, but often times these services ...
Deploying Microsoft Advanced Threat Analytics in the Real World Russell Butturini Introductions/Why give a talk on ATA? -An overview of Advanced Threat Analytics (What it is, ...
Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT Device Nancy Snoke In this talk, husband and wife team Phoenix and Nancy Snoke introduce the Damn Vulnerable ...
You have many security products, probably too many. But you are still not secure because it's nearly impossible to know if your security products are actually doing what you want. Through live network Brian Contos You will be able to identify your own assumption-based security risks.You will be able to ...
Changing Who Writes the Queries: High-Leverage IR with Visual Playbooks & Visual Graph Analysis Leo Meyerovich Incident response investigations are not living in the magical future Hollywood promised. Instead, when an ...
Community Based Career Activities or How Having Fun Can Help You with Your Career Kathleen Smith We will discuss how career development can be supported through community activities such as presenting ...
Hillbilly Storytime - Pentest Fails Adam Len Compton Hearing about awesome new discoveries and astounding exploits are always fun, but what of those ...
Hacking the Users: Developing the Human Sensor and Firewall Erich Kron CEO Fraud, W2 Fraud and ransomware all have one thing in common, they are commonly ...
See the ID Rules Before Us: FAL IAL AAL eh? Aaaagh!!! How, How, How, How? Bruce Wilson In July 2017, after many months of public comment and open discussion on github, the ...
SAEDY: Subversion and Espionage Directed Against You Judy Towers “Frequently, people who go along a treasonous path do not know they are on a ...
What Happens in Vegas: Near Real-Time Vulnerability Visibility Michael St. Vincent Real-time visibility to vulnerabilities can be extremely challenging, especially when you have a large network ...
Growing Up to be a Infosec Policy Driven Organization Frank Rietta Internet software as a service (SaaS) companies with the need to protect private consumer information ...
Hacking VDI 101 Patrick Coble Do you have a VDI Deployment or a client that does? VDI Deployments are in ...
Adding Simulated Users to Your Pentesting Lab with PowerShell Chris Myers Pentesting labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great ...
Evaluating Injection Attack Tools Through Quasi-Natural Experimentation John O'keefe-odom How can we know if our patching behavior is scientific and effective? When adjusting defenses ...
Social Engineering for the Blue Team Timothy De Block Social engineering is not just for red team. It’s a powerful tool that the blue ...