BSidesAugusta 2018 Oct. 20, 2018 to Oct. 20, 2018, Augusta, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Dave Kennedy N/A
Two Notify All David Adamitis Inside of the Cisco Talos Threat Intelligence group is a team of dedicated research engineers ...
Hack the Planet Bryson Bort Howdy Neighbor, a model smart house will be used to visually demonstrate to the audience ...
An Anatomy Of A Cloud Hack: Detecting And Responding To Adversaries In The Cloud Martin Holste In most ways, the public cloud is more secure than a traditional data center. Asset ...
Armadillo: A layered approach to portable security Josh Eyre Traveling is an inherently stressful endeavor and trying to maintain a secure computing environment while ...
Choice Architecture for Security Practitioners Chris Sanders The security of a device or network often hinges on a single choice made by ...
Creating a Volunteer Cyber Department: Dispatches from the Back Office Ray Davidson In 2013, the State of Michigan created a public-private partnership to leverage information security resources ...
Breaking into Banks Like a Boss Brice Self Is your money safe? Are the movies real? Can you dodge lasers, sneak through vents, ...
Credentials so good you’d use them again.... Cred stuffing for fun and profit... Mike Opacity After a web breach, billions of credentials are discovered in the wild. What happens to ...
Isolated to Constrained Language Mode: Living within the Confines Chris Truncer WMI has recently been publicized for its offensive use cases. Attackers, and now red teams, ...
Skill Sharpening @ the CyberRange: Developing the next generation Blue Team Don Murdoch How do you gain defender skills? Do you know exactly how the offense should inform ...
Hunting APTs and Script Kiddies with Beer Money Paul Melson The assumption that threat hunting is an expensive, time-consuming activity reserved for enterprise organizations and ...
Panel: Georgia Senate Bill 315 and the Future Jake Williams , Jack Daniels , Jodi Lott , Liz Elisabeth Wharton This year Georgia’s proposed cyber law SB-315 passed the state legislature with wide support before ...
Live Interrogation With Osquery Josh Brower Osquery is an open source endpoint visibility tool that allows you to query your system ...
The sound of evil Wes Widner Our ears are the original nexus of information security. The environments we’re in are constantly ...
OpenWRT + cheap routers = Cheap, customized security sensors & training devices Ryan Wilson OpenWRT is a popular embedded Linux distribution designed for use on those wireless routers typically ...
ABRACADABRA – make your breach reporting woes disappear! Jake Williams In today’s environment where there’s a new breach announced in the media on a daily ...
Leveraging Deception Techniques for Strong Detection Tim Crothers Breaches are occurring at an ever increasing rate which seems to amply demonstrate that many ...
Movement After Initial Compromise Matthew Hartley Once a system is compromised there are many avenues to consider. It brings up a ...
Purple Reign: Elevate Your Analysts, Build Your Playbook Joseph Pilkington Purple teaming is all the rage right now and has proven to be a very ...
Comparing apples to Apple Adam Mathis Many defenders have hard fought experience finding evil on Windows systems, but stare blankly when ...
The Costly Mistakes of Being Unprepared Michael Wylie Atlanta spent millions to clean up the Ransomware attack earlier this year. Could the city ...
Windows Event Forwarding and OSSEC - You can do this! Robert Wilson Most organizations in the United States are small, and many can’t afford MSSP’s or SIEM ...
Pentesting Modern Web Apps: A Primer Brian Hysell Most learning materials for web app pentesting focus on “old school” apps. Maybe they have ...
Objectively Measuring Hunt Value Justin Perry Working with many customers and lots of data on a network security monitoring platform inevitably ...
A Legend Has Arisen: How to use XXE to your Advantage in any Environment Leo Miller In 2017, XML External Entities (XXE) saw its first appearance on the OWASP top 10 ...
Reverse Hardware Engineering Nick Gordon , Michael Nowatkowski , Eric Kilgore Hardware hacking, or hardware reverse engineering, is the process of extracting information from hardware, such ...
Ghost Busters: A Tale of Spectre, ELF ABI, and Computational Privilege Prashant Shapiro In this talk, we describe ELF-based access control (ELFbac) and how it can naturally mitigate ...