BSidesAugusta 2014 Sept. 13, 2014 to Sept. 13, 2014, augusta,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Defeating Cognitive Bias and Developing Analytic Technique Chris Sanders At the center of many defensive processes is human analysis. While we spend a lot ...
ICS/SCADA Defense - Protecting Your DNP3 Networks Chris Sistrunk Your SCADA system has a DNP3 vulnerability, now what? I shortly summarize the DNP3 vulnerabilities ...
Scaling NSM to the Enterprise Mike Reeves This is a presentation about how to scale NSM, specifically Security Onion to the Enterprise ...
PowerShell and You: Using Microsoft’s Incident Response Language Chris Campbell Anyone can write useful security tools in PowerShell. With just a little bit of knowledge ...
Techniques for Fast Windows Investigations Tim Crothers A typical organization sees anywhere from scores to thousands of alerts daily. Many of those ...
Pentester++ Chris Truncer This presentation outlines my journey from a systems admin turned novice hacker, to a professional ...
Stored Password Security: The Adobe Guide to Keyless Decryption Tim “lanmaster53″ Tomes It goes without saying that Adobe has made some mistakes as a software company. Quite ...
App Wrapping: What does that even mean David Dewey Many security companies today are claiming to "wrap apps" on mobile devices. In digging into ...
Is that hardware in your toolkit, or are you just glad you’re keeping up? Jeff Murri Friends… The landscape is a changin’, and if you are not integrating hardware devices into ...
Adventures in Asymmetric Warfare: Fighting the AV Vendors Will Schroeder As a co-founder and principal developer of the Veil-Framework, the speaker has spent a considerable ...
When Zombies take to the Airwaves Tim Fowler In a post-apocalyptic world, communication is going to be crucial for the survival and zombies ...
Spying on your employees using memory Jacob Williams Many companies can't afford costly employee endpoint monitoring software, yet still have the need to ...