BSidesPittsburgh 2018 June 22, 2018 to June 22, 2018, Pittsburgh, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Data Wrangling Lessons from the OWASP Top 10 Brian Glas The goal of the OWASP Top 10 project is to raise awareness and create a ...
REST is the sweet sauce of labor. Kevin Cody Contrary to Plutarch's famous quote regarding rest being the "sweet sauce" of labor, RESTful web ...
Sentry or: How I Learned to Stop Worrying and Delete My Accounts Michael West With social media, anyone can become "incidentally infamous" in minutes. Your tweet could go viral, ...
SOC them in the face: Building and Attacking SOCs Andrew Johnston , Eric Carroll The goal of any attacker or red teamer is generally to avoid the employees of ...
Wormholes: Fact, not (Science) Fiction Aaron Shelmire , Christian Roylo During 2017 news reports were dominated by three worm events, largely due to the worms’ ...
Java Serialization: The Serial Killer Robert C. Seacord This presentation provides developers with practical guidance for securely implementing Java Serialization. Java deserialization is ...
Heavy Machinery and Burly Lumberjacks and Logging! Oh My! Evan Perotti , Dan Astor Did we get the creds? Do we have a beacon? Are we burned? All questions ...
RMF in a DevOps World! aka "He’s dead Jim!” Scott Zimmerman , Frank Cameron , Lucas Truax The threats posed to software applications and information systems are constantly changing. In order to ...
No Disassembly Required Brian Satira , Nate Guagenti Does malware analysis seem like an arcane process involving hours of staring at assembly in ...
It’s Not You; Job Searching is Broken Deidre Diamond , Erik Ligda After spending 15 years in security at a mid-sized DoD contractor and starting a job ...
Tactical, Practical Digital Forensics John Grim The answer: 'Tactical, Practical Digital Forensics: The 12 Must-Have Tools'. Many open-source and free commercial ...
The Marriage of Threat Intelligence and Incident Response or... Threat Hunting for the Rest of Us Jamie Murdock Most organizations don't have a large security team, or the ability to conduct active threat ...
Red and Blue team Tips for Cryptocurrency Mining on Your Organization Infrastructure Joe Mast You’ve heard about malicious Cryptocurrency mining in the news but have you ever looked to ...
Fileless Malware Jim Vanderyt In 2017, over half of all malware was file-less malware. As cyber threat adversaries evolve, ...