BSidesNewOrleans 2018 May 26, 2018 to May 26, 2018, New Orleans, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Doing the Best With What We Have Chris Sistrunk N/A
DFIR from a LEO Stephen A. Villere Hear from a local law enforcement digital forensics lab supervisor how they handle digital forensics ...
Cryptology: It’s a Scalpel, not a Hammer Mikhail Sudakov In this not-too-technical presentation (not much math!), attendees will get a bird’s eye view of ...
XFS Bit-By-Bit Hal Pomeranz XFS stands a good chance of becoming the default Linux file system. Unfortunately, current forensic ...
Getting Saucy with APFS! Sarah Edwards Do you know what happens when a new file system comes out? ABSOLUTE MAYHEM! All ...
Legal Updates: From the Cloud Act to the GDPR Brian Roux 2018 is an important year for privacy law and legislation. The much anticipated decision in ...
Seive of Stackstrings Willi Ballenthin Like packing, the presence of obfuscated data in executable files often indicates a malicious disposition. ...
Incident Response Stories from the Front Lines Thomas Pace Crypto miners, business email compromises, fraudulent ACH transactions. These are but a few of the ...
I" Before "R" Except After "IOC Andrew Hay How many IOCs are needed before you can confidently declare an incident? Using actual investigations ...
HTTP/2: A Pentesters Perspective Joshua Barone HTTP/2. What is it? How is it different? What does this mean for security? Modern ...
Memory Forensics: The Future and a Call to Arms Golden Iii Memory forensics has reached a point where we are capable of awesome feats, yet much ...
Ransomware: Robbed with a Wooden Gun Brian Baskin While companies are panicking over Ransomware attacks, some fears are unfounded. For every major attack ...
Smashing the Blockchain: Mostly just for profit Cris Ose The widespread hype and adoption of blockchain technologies in 2017 has spurred the rapid development ...
Join the Club Elizabeth Schweinsberg Defensive Security like Threat Detection and Incident Response is asymmetric warfare. We have to learn ...
Grandmothers, Gangsters, Guerrillas and Governments Adam Koblentz This presentation will explore threat actors including insiders, cybercriminals, hacktivists and nation-states. We will dissect ...
UAV (drone) forensics for fun and profit David Kovar UAV forensics used to be an interesting research hobby. Now we're building a business around ...