BSidesDFW 2018 Nov. 3, 2018 to Nov. 3, 2018, Dallas, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Mitre ATT&CK Framework is for all of us, and it is time to pay attention to it Michael Gough Mitre has created the “Adversarial Tactics, Techniques & Common Knowledge” (ATT&CK) base to help security ...
The Pentester Blueprint: A Guide to Becoming a Pentester Phillip Wylie Pentesting or ethical hacking as it is more commonly known has become a much sought-after ...
Cybersecurity Compliance and Legal Implications for 2019 Jason Weaver Presenting legal and compliance topics relevant for today's cybersecurity professionals. This presentation will include discussions ...
Windows Internals and Threat Hunting with Volatility Deepak Mahbubani Introduction to Windows internals and memory analysis with Volatility memory forensics framework.
Developer Attack Surface Mark Morgan This is not about XSS or SQL injection. This is about processes that surround development. ...
Rapid Fire Live Demos! Andy Thompson Everyone knows you tempt the Gods when you attempt a live demonstration. With that said, ...
Ur Shellz Belong to AWS: Pentesting challenges against serverless environments Mark Clayton Finding a remote code execution vulnerability to get shell on a S3 bucket? How about ...
Gray(log) is the New Black Megan Roddie Graylog is a open-source log aggregation platform that is quickly gaining traction among the security ...
The Secret Weapon to Fight InfoSec FUD Olivia Stella FUD (Fear, Uncertainty & Doubt) runs rampant in information security on a daily basis. Sensationalized ...
Singing the Blues: When Blue Team Kicks the Red Team's Arse Tinker We often hear of the exploits of malicious actors and red team penetration testers. We ...
Radio hacking 101: a case study in how to DoS the global APRS network Michael West Many radio protocols have very little security, as they were designed when equipment to transmit ...
Pseudorandom Meta Threat Intelligence. TL;DR - Lessons Learned from the Verizon Data Breach Investigation Report Walter Abeson You've heard about it, you've seen it cited, you may have even printed it, but ...
Vigilante Forensics Litmoose Armed with the knowledge of law enforcement requirements, this talk will enable cybersecurity practitioners to ...
Herding Happy Sheep - Securing an Open Environment Chris Mercer It has been proven time and again that humans can't be trusted. So, we lock ...
Dora Explores the Fascinating World of Spreadsheets! Doratexplorer People love spreadsheets. Macros and formulas are an easy way for non-coders to construct simple ...
Dockerized Tooling for IH/IR Chris Rooney This will cover what Docker is, what containers are, and why they are extremely useful ...
Staying Offensive: The Changing Landscape of Offense Tim Medin Defense is changing and offense has to adapt accordingly. In this talk Tim will discuss ...
Reverse Engineering Ransomware - A Guided Tour Wesley Mcgrew This presentation ditches PowerPoint for a slide-less walk through the internals of malicious software. Using ...
Building an Empire With (Iron)Python Jim Shaver This talk discusses porting Python payloads to Windows using a little known, former Microsoft project. ...