BSidesChicago 2018 May 12, 2018 to May 12, 2018, Chicago, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Jack Daniel We cannot understand where we are going unless we know where we are and how ...
Wazuh, A comprehensive open source security monitoring platform Alberto González , José Luis Ruiz HIDS (Host-based Intrusion Detection Systems) have become increasingly important as the number and severity of ...
RASP - Next in evolution of application security Jerrin Jacob Evolution in the space of application security. How our runtime monitoring security technologies have evolved ...
Becoming a Security Hero: Killing Assumptions & Environmental Drift Christine Stevenson See firsthand, through use cases and demonstrations, how you can empirically determine what’s working and ...
2017 Industrial Control System (ICS) Cyber Security - A year in review Matt Cowell 2017 was another eventful year in the realm of industrial cyber activity punctuated by the ...
Family-Style Incident Response Domenic Rizzolo This talk is a survey-style introduction to incident response tactics and indicators of compromise. I ...
IAM: Managing the Keys to the Kingdom Dan Cline Identity and Access Management is critical to a comprehensive Security program. This presentation will cover ...
Lockpicking and the Law Jack Jack
Diversity Panel - Panel Discussion N/a Diversity in Infosec Open Panel Discussion...
Practical Threat Modeling Derek Milroy This talk is about a way to actually start doing threat modeling to assist in ...
Practical Social Engineering: Stories From The Field Elliott Brink This presentation will discuss: common tactics of social engineering and stories from the field. Attendees ...
Combatting DNS Exfiltration in AWS Steve Hoffman Combatting DNS Exfiltration in AWS
Objective Driven Penetration Testing and Value Driven Reporting Mike Cook N/A
Infosec Powered by Women Alex Holden , Pilar Speranza Women excel at information security and we have proof - a story of how to ...
HEAP Beth Lynn Eicher High Peformance Computing Evaluate And Plan, known as HEAP, is a holistic security overview for ...
Security needs better UX. Blame TV dinners Chad Calease The messages we've been sent about privacy + security over the previous century are in ...
Lightning Talks N/a N/A
How to build an IR program in 60 days Aj How to build an IR program in 60 days
Building a Predictive Phishing Pipeline Wes Connell Registering a new domain, obtaining a legitimate SSL certificate, and deploying it on a web ...
Influencing Outcomes: Active Social Engineering Rick Givens Overcoming Barriers in Human Communication – Using Body Language and Communication Techniques to Shape Opinions ...
Women in Tech - Panel Discussion N/a Open Panel Discussion - Women in Tech
An Overview of cloud-Native secret Management Yuechuan Chen Secret management is one of those things that everyone needs to do but is challenging ...
Hipster Ransomware: Beyond Mere Encryption Pranshu Bajpai Modern ransomware present multi-faceted threats that present challenges beyond data loss. These ransomware include routines ...
Red Team Automation: A new open source toolkit Devon Kerr Validating defensive coverage against the range of adversarial behavior – including malware and malware-less behavior ...
Forensics to Find and Respond to the Golden Ticket Max Thauer Credential dumping tools are widely available pieces of software leveraged by attackers in order to ...
Modern Authentication with FIDO - the Biggest Thing in Security since SSL! Adam Lewis Identity is the new perimeter - but the perimeter is most often a password - ...
Raising the Dead to Save the Living: Active Defense and Cyber Deception anyone can do Jared Peck It doesn't take a vendor to perform effective active defense. You can do it yourself ...