BSidesTampa 2019 Feb. 2, 2019 to Feb. 2, 2019, Tampa, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - How to use 400+M endpoints to build strong AI detection systems Filip Chytrý What are the IoT problems in the USA and how is one of the largest ...
Futurecast Flambé: What CISOs Are Saying About The 2 Year Threatscape Greg Barnes N/A
Addressing Privacy: GDPR, Cloud and You Chris Esquire Address how GDPR affects businesses that operate globally and utilize cloud technology from a privacy ...
Doesn't It make You WannaCry: Mitigating Ransomware on a Windows Network David Branscome The Petya and WannaCry ransomware attacks were some of the most destructive cyberattacks we've seen ...
20/20 Enterprise Security Monitoring: Seeing clearly with Security Onion Wes Lambert In this day and age, network breaches and security incidents are all but uncommon. As ...
Securing Shadow IT Gene Cronk I inherited a "mission critical" PHP4 application in 2014, that was loaded on a desktop ...
Operating Offensively Against Sysmon (Sponsored by TrustedSec) Carlos Perez N/A
10 Steps to Build & Lead a Competitive Cybersecurity/CTF Team John Hammond Abstract: Companies, schools and communities desperately want to get into the cybersecurity scene and improve ...
Cybercrime, cyberterrorism, and hacker culture Miloslava Plachkinova Cybercrime is a problem of growing significance in society. This is partially due to the ...
RegEx for Incident Response Daniel Turner In any cyber security investigation, a bulk of the work involves wading through volumes of ...
Redefining the Cyber Operations Team Dave Summit Have you ever uttered “I don’t have enough resources or funding” or heard it from ...
Intro to k8s Security - or Taming the Great Spaghetti Monster! Kat Fitzgerald We've all heard of it - Kubernetes or k8s - but do you really know ...
Day When Quantum Computers Breaks Crypto Roger A. Grimes Quantum computing is getting ready to break all traditional public key crypto, like RSA and ...
True Multilayered Cybersecurity: Bitdefender GravityZone (Sponsored by Bitdefender) Yasser Fuentes Yasser Fuentes, CISSP, CISM Senior System Engineer will discuss the top information security challenges companies ...
Top 10 things Job Seekers Should Know Rob Riggins Job search isn’t typically a class you can take. So how do you learn the ...
Health IT & The New Information Security Area Johan Lidros From mainly using IT in supporting processes, IT is now a primary tool in many ...
Intermediate Physical Security Justin Wynn We’re skipping lock picking and discussing the other elements of physical security. Come and learn ...
The 21st Century CISO…glitz, glammer, and all the other things its not! Larry Whiteside The role of a CISO publicly has far more glitz and glammer than the real ...
Social Forensication: A Multidisciplinary Approach to Successful Social Engineering Joe Gray This presentation outlines a new twist on an existing social engineering attack. In the past, ...
An Inside Look At Stopping Unauthorized Sellers & Counterfeiters On Amazon Bruce Anderson With the influence of Amazon, both small and global corporations are being impacted by discounted ...
Advanced Python Topics: Create Confuse Frustrate Daniel Reilly My presentation will cover topics to bring a Python-based security tools up from the tutorial ...
I Sold Out, You Should Too! How I left Operations for Sales Engineering and Never Looked Back! Karlo Arozqueta You started in entry level positions, paid your dues, maybe you worked in a 24/7 ...
An Investigation on the FCC Net Neutrality Repeal and its Effects on Security and Privacy Van Nguyen The repeal of net neutrality has caused a great public outcry from academic, law makers, ...
Security Analytics in the Cloud Marc Baker This presentation will walk attendees through cloud based technologies that can be used to secure ...
The S in IOT Stands for Security Craig Schiller In the 1960 Twilight Zone episode “A Thing About Machines” the machines in Bartlett Finchley’s ...
Phishing U2F-Protected Accounts Kenny Mazurov We present a novel approach for compromising U2F-protected accounts via targeted spearphishing attacks. Neither existing ...
The Sound of Evil Wes Widner Our ears are the original nexus of information security. The environments we're in are constantly ...
Industrial IoT - Be Afraid - Be VERY AFRAID (Sponsored by TrendMicro) Christian Fontaine This session will discuss IT and OT threats to autonomous cars, intelligent transportation systems, smart ...
Tech Recruiter Panel - Are You Pwning or Being Pwned Kirsten Woods Did you know the Department of Labor says that most professionals will have at least ...
InfoSec/Privacy Regulatory Update 2019 Michael Brown Several new and updated frameworks, standards, and regulations came out over the last year. Many ...
Election Hacking: Getting Ready for the Russian Onslaught in 2020 Jeremy Rasmussen Efforts to protect the integrity of the US voting system have become a national priority ...
Serverless Security Top 10 Tal Melamed When adopting serverless technology, we eliminate the need to develop a server to manage our ...
Introduction to Machine Learning (Sponsored by Qualys) Laura Seletos An introduction to Machine Learning with a focus on its effects within the cybersecurity field. ...
I Graduated From Info-Sec... Now What? Noel Pamias This talk is geared for recent grads, grads-to-be or anyone interested in starting a career ...
CISO Panel Kathleen Mullin , Larry Whiteside , Dave Summit , Manny Engel , Peter Rucys , Craig Burger N/A
Extraterritorial Application of Data Privacy Law Andrew Bayudan The presentation will briefly outline the Stored Communications Act (SCA) and the practical effects it ...
Tales from the CSOC – APT Attack Survival Eric Speulstra Cyber security in many ways can be readily characterized as cyber warfare. Taking this perspective, ...
Logging Pitfalls and How to Abuse Them Michael Kaminski You cannot defend from what you cannot see. A lack of proper logging from endpoints, ...
Identifying the Vulnerabilities in Vehicle Infotainment Systems Bryanne Edmonds Vehicle cyber security is increasingly on the rise, yet still is a widely unknown field ...
Hacking IoT devices by chaining application security vulnerabilties Rick Ramgattie Fully comprising an embedded device isn’t always as easy as sending a GET request with ...
Teach Them To Hack Dan Purves This talk will include the rise of the NeverLAN CTF. We will explain how we ...
Case Study - Multi-factor authentication bypass by state actors Craig Zeigler I will present a case study of a recent incident involving an international client that ...
vCISO - is that the right answer? Mike Brooks Will examine the role of a vCISO and look at what the vCISO is, business ...
Travelocalypse: It’s Dangerous Business, Hacker, Going Out Your Front Door Beau Banks How do you survive the treacherous landscapes of security conferences, work trips, and other types ...
Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer Tigran Terpandjian As a security analyst with an atypical entry into the information security world, one of ...
Mini Budget Microcontrollers: Cheap Microcontrollers for IoT and Fun Erich Kron Microprocessors and microcontrollers continue to get more powerful and inexpensive. For about $3.00, you can ...