BSidesSatX 2018 June 16, 2018 to June 16, 2018, San Antonio, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attacking Authentication in Web Applications Jake Miller Broken authentication is an ongoing issue, identified in the OWASP Top 10 2013 and 2017 ...
Another name for Intel: Honeypots Kat Fitzgerald Gathering Threat Intelligence is an art. Using it to your advantage is magic. Do you ...
GSuite Digital Forensics and Incident Response Megan Roddie With the current standard of companies transitioning to the cloud, digital forensic investigators and incident ...
Achieving Advanced Security User Cases by Integrating Key Security Solutions with a Vulnerability Management System Gunner Clary , Danny Santander In order to solve many advanced information security use cases, one must correlate historical vulnerability ...
Cryptojacking Servers: The Intersection of poor patch management and ICO's Chuck Mcauley In this talk we'll take you through some exploits that have been used to drop ...
Securing the Future of TLS: What's new in TLS 1.3 Carl Mehner TLS has had many changes and updates throughout the years, TLS 1.3 is a major ...
PowerShell Exploitation, PowerSploit, Bloodhound, PowerShellMafia, Obfuscation, PowerShell Empire, the Empire has fallen, you CAN detect PowerShell exploitation Michael Gough PowerShell is all the rage for the Red Team and the criminals. There are many ...
RoCET: The Remote Code Execution Tool for the Web Andr01d During a VulnHub challenge, I developed a tool to give a simple shell if you ...
Dropbots: Command & Control using Cloud Storage Mitchell Moser Command & Control infrastructure is commonly thought of as spun-up servers using known 'bad' or ...
Internet 101: How Alice Talks to Bob Milkman This is a broad reaching presentation on how computers communicate with each other via IPv4. ...
IDS Configuration for Beginners Nick Leghorn Whether you're securing your home network or a corporate campus an Intrusion Detection Sensor (IDS) ...
Fiddling with Flash Drive Forensics Alexander Klepal "It always makes me nervous when you ask questions in class, Alex... Your brain is ...
Containers: No, Not Your Mama's Tupperware Ell Marquez The technical community is all a buzz about containers but does anyone really know what ...
Everything Old is New Again Cindy Jones Discussions and demonstrations surrounding how the same issues we saw as an industry 5, and ...
Adventures in Open Source Security Software ​jordan Wright These past few years have seen a significant increase in the number of available open ...
10 Steps to a Sound Cyber Security Program Heath C Renfrow There is a proliferation of cyberattacks that has caused and continues to cause increasing damage ...
Does Patch Tuesday Really Matter Anymore? AKA: "Screw Patch Tuesday!" Duncan Mcalynn In this session, 6x Microsoft MVP, Duncan McAlynn, completely destroys the "Patch Tuesday" concept! With ...
Exposed: Getting Control of Your Vendors Before They Expose You Dan Browder With cloud services now a normal part of business how does your organization handle being ...
Tactics, Techniques, and Procedures: Building and Running a Blue Team from Scratch Abhishek Tripathi It has always been a challenge to detect threat actors, and this presentation will reveal ...
Credential Stealing Emails - What you need to know Michael Gough The latest vector in email attacks is credential stealing. This is nothing new, but there ...
The SIEMpsons James "iv0ryw0lf" Boyd SIEMs are instrumental in most large organizations. Most cyber defenders are at the mercy of ...
Zero to Hero: A Red Team's Journey Robert Neel , David Thompson This talk will be about our multi-year journey to full Red Team Operations. We will ...
10 Things Every Job Seeker Should Know Kathleen Smith Career search is not taught in school. So how do you learn the tips and ...
Community Based Career Development Cindy Jones , Kathleen Smith Career development is typically seen as a progression of education, certification and job moves. However, ...
Are you pwning or being pwned? Irma Symonds , Bill Branstetter , Kj Howell It is a full-time job finding your next job, but we all don’t have that ...
Strengthen Your SecOps Team by Leveraging Neurodiversity Megan Roddie High productivity, extreme attention to detail, logical/calculated, passionate, and hyper-focused. These are all characteristics considered ...
Get An Internship! Michael L. Davis , Benjamin Richard , Paul Guido , Sonny Montiel , Adrian Clayton , Emily Ehling Come and find out what businesses are looking at when they fill an intern position. ...