BSidesDC 2014 Oct. 17, 2014 to Oct. 19, 2014, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Secure Coding Web Applications Jim Manico The major cause of Web insecurity is insecure software development practices. This highly intensive and ...
Palo Alto Networks Training (4h)2:00pm (4h) Palo Alto Test Drive Derek Rogillio Join us for The Ultimate Test Drive where you'll get hands-on experience with the Palo ...
IPv6 GURU Hands-On Certification Training and Lab Joe Klein With over 9% of Internet users now on IPv6, it’s time for you to learn ...
BroIDS Crash Course Liam Randall Bro is a stateful, protocol aware open source high speed network monitor with applications as ...
Welcome Mark Boltz , Alex Norman A brief welcome to our second Security B-Sides DC, with an overview of the event, ...
Keynote Lazlo Squirrel N/A
Training with Raspberry Pi Nathaniel Davis One of the biggest questions facing people trying to learn how to hack is “How ...
A Better Way to Get Intelligent About Threats Adam Vincent There is a lot of talk about sharing and the security of our data. A ...
Cyanomix Fireside Chat Demo Giacomo Bergamo The stream of malicious software artifacts (malware) discovered daily by computer security professionals is a ...
Releasing the Kracken: Build and Using A GPU Password Cracker Jonathan Fallone We’ve all seen the major security firms show off their password cracking setups on Twitter ...
SWF Seeking Lazy Admin for Cross-Domain Action Seth Art Security misconfiguration is currently #5 on the OWASP 2013 Top 10. This talk shows how ...
Network Attached Shell: N.A.S.ty systems that store network accessible shells. Jacob Holcomb Through extensive analysis, ISE has identified dozens of previously undisclosed, critical security vulnerabilities in numerous ...
Welcome Mark Boltz, Alex Norman A brief welcome to our second Security B-Sides DC, with an overview of the event, ...
Agile Defense Rob Johnston , Heather Ward , Nathan Mcbride The ability to successfully mold with the evolving adversary will be critical in successfully defending ...
i'm in ur scm, bein a ninja Hank Leininger In recent years secure development practices and supply chain integrity have gotten more attention. But ... IncludeThinkstScapes
MalwareViz: a free Malware Visualizer. Craig Field Hi, How are you? Malware Visualization shows the simple stuff of malicious software. The simple ...
Meatspace Indicators and Incident Response Nathaniel Richmond Do you ever get non-technical incident indicators? Are non-technical indicators important? Do incident responders sometimes ...
Bug Bounty Hunters: Lessons From Darth Vader Jake Kouns Darth Vader was a ruthless leader and considered by many to be one of the ... IncludeThinkstScapes
Software Defined Radio (8h)10:00am (8h) Software Defined Radio Tim Kuester This track is designed to give students a gentle (yet practical) introduction to SDR with ...
Wireless Capture the Flag (WCTF) Rick Mellendick The BSidesDC WCTF is constructed in two stages. You will be presented with situations where ...
Why I Sold Out, Why You Should Too... Karlo Arozqueta You love technology, security, and trying new things... You enter the workforce, work hard, rise ...
What Does It Actually Take to Start a Security Product Company? Bob Stratton , Rick Gordon Security people often talk about business in the same hushed tones that everyone else uses ...
Diamond Model for Intrusion Analysis: What You Need to Know Andy Pendergast Any good Threat Intelligence analyst’s overarching goal is to provide actionable intelligence to aid in ...
Hacking Rants (from an almost old guy) Joe Klein “Any sufficiently advanced technology is indistinguishable from magic.” - Arthur C. Clarke. Like many gray ...
Adventures in Asymmetric Warfare: Fighting the AV Vendors Will Schroeder As a co-founder and principal developer of the Veil-Framework, the speaker has spent a considerable ...
Opening Acts: How Attackers Get Their Big Breaks Chuck Willis , Evan Peña Every security incident has to start somewhere. Sometimes the attacker gets into an organization via ...
Fighting Back Against SSL Interception (or How SSL Should Work) Jacob Thompson Enterprises increasingly deploy network security devices to intercept and inspect SSL-protected employee web traffic, often ...
Doctor Docker: Building Your Infrastructure's Immune System Mike Mccabe , Patrick Cooley As hardware is being demoted, the ‘stack’ and PaaS are becoming software. It brings up ... IncludeThinkstScapes
How Headlines Make Heads Roll: The Media's Impact On Security Tim Wilson , Michelle Schafer The very public breach at Target cost the company millions and resulted in the resignations ...
BroIDS Crash Course (4h)10:00am (4h) BroIDS Crash Course Liam Randall Bro is a stateful, protocol aware open source high speed network monitor with applications as ...