BSidesPhiladephia 2019 Feb. 1, 2019 to Feb. 1, 2019, Philadelphia, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Unlocking Potential - Maturing the SIEM from Basic to Advanced Capabilities John Ehring Security Information and Event Monitoring (SIEM) is an expensive, complex undertaking without transparent business value. ...
Streamlining SOC Workflows with Homegrown Tools Chris Dascani At Susquehanna International Group, home-grown platforms provide the Security Monitoring and Incident Response team with ...
Keeping up with the Joneses: SIEM Rules Edition Kevin Ascoli Keeping up with the evolving landscape of threats and attacker techniques can feel like an ...
The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive Matthew Gracie TheHive is an excellent open source web application for tracking the handling of incidents. This ...
Evasion Tactics in Malware from the Inside Out Lenny Zeltser The session explains how malware evades detection and why specific tactics are effective in the ...
Introduction to BTLE: Assessing with Ubertooth One and Exploiting IoT Charles Sgrillo BTLE is one of the most common wireless protocols used in IoT devices today. This ...
From The Outside In: What the Internet Knows about your Digital Footprint Sean W. Smith For large organizations, it can be hard to minimize your digital footprint. Whether it be ...
Next Generation Blue Team Justin Klein Keane Building a successful blue team starts with thinking differently about the problem set and the ...
A Desktop Security Journey that Ends (for now) with Qubes OS Aelon Porat Porat It started with the humble intention of making my company issued Windows laptop just a ...
Starting and Progressing your Cybersecurity Career :How to Get Your First Job and Your Next One Ty Muentz Cybersecurity is a booming job market right now. What makes someone good for this career? ...
Journey to Command Injection: Hacking the Lenovo ix4-300d Ian Sinderman Fully comprising an embedded device isn’t always as easy as sending a GET request with ...
Extracting the Attacker: Getting the Bad Guys off Your SaaS David Branscome The Microsoft Office 365 suite contains many applications that can help organizations do some amazing ...
O365 - Navigate the Rabbit Hole Jim Menkevich Microsoft has successfully transformed their perpetual license panacea into a service revenue juggernaut. Microsoft Office365 ...
Controlling the View Controllers in iOS Applications – Automatically Tomer Hadad When life gives you doors, search for windows. As time goes by, performing security assessments ...
Ready Player 0x01: How Gamified Ecosystems Will Save Us All Evan Dornbush Gamified ecosystems pose many benefits to professional organizations, specifically in the areas of recruiting, retention, ...
Don’t Get Jacked: 4 Steps To Protecting Your XaaS in the Cloud Justin Klein Keane The good news is that AWS, GCP, and Azure provide better core security than your ...