BSidesDC 2014 Oct. 17, 2014 to Oct. 19, 2014, washington,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Secure Coding Web Applications | Jim Manico | The major cause of Web insecurity is insecure software development practices. This highly intensive and ... | |
Palo Alto Networks Training (4h)2:00pm (4h) Palo Alto Test Drive | Derek Rogillio | Join us for The Ultimate Test Drive where you'll get hands-on experience with the Palo ... | |
IPv6 GURU Hands-On Certification Training and Lab | Joe Klein | With over 9% of Internet users now on IPv6, it’s time for you to learn ... | |
BroIDS Crash Course | Liam Randall | Bro is a stateful, protocol aware open source high speed network monitor with applications as ... | |
Welcome | Mark Boltz , Alex Norman | A brief welcome to our second Security B-Sides DC, with an overview of the event, ... | |
Keynote | Lazlo Squirrel | N/A | |
Training with Raspberry Pi | Nathaniel Davis | One of the biggest questions facing people trying to learn how to hack is “How ... | |
A Better Way to Get Intelligent About Threats | Adam Vincent | There is a lot of talk about sharing and the security of our data. A ... | |
Cyanomix Fireside Chat Demo | Giacomo Bergamo | The stream of malicious software artifacts (malware) discovered daily by computer security professionals is a ... | |
Releasing the Kracken: Build and Using A GPU Password Cracker | Jonathan Fallone | We’ve all seen the major security firms show off their password cracking setups on Twitter ... | |
SWF Seeking Lazy Admin for Cross-Domain Action | Seth Art | Security misconfiguration is currently #5 on the OWASP 2013 Top 10. This talk shows how ... | |
Network Attached Shell: N.A.S.ty systems that store network accessible shells. | Jacob Holcomb | Through extensive analysis, ISE has identified dozens of previously undisclosed, critical security vulnerabilities in numerous ... | |
Welcome Mark Boltz, | Alex Norman | A brief welcome to our second Security B-Sides DC, with an overview of the event, ... | |
Agile Defense | Rob Johnston , Heather Ward , Nathan Mcbride | The ability to successfully mold with the evolving adversary will be critical in successfully defending ... | |
i'm in ur scm, bein a ninja | Hank Leininger | In recent years secure development practices and supply chain integrity have gotten more attention. But ... | IncludeThinkstScapes |
MalwareViz: a free Malware Visualizer. | Craig Field | Hi, How are you? Malware Visualization shows the simple stuff of malicious software. The simple ... | |
Meatspace Indicators and Incident Response | Nathaniel Richmond | Do you ever get non-technical incident indicators? Are non-technical indicators important? Do incident responders sometimes ... | |
Bug Bounty Hunters: Lessons From Darth Vader | Jake Kouns | Darth Vader was a ruthless leader and considered by many to be one of the ... | IncludeThinkstScapes |
Software Defined Radio (8h)10:00am (8h) Software Defined Radio | Tim Kuester | This track is designed to give students a gentle (yet practical) introduction to SDR with ... | |
Wireless Capture the Flag (WCTF) | Rick Mellendick | The BSidesDC WCTF is constructed in two stages. You will be presented with situations where ... | |
Why I Sold Out, Why You Should Too... | Karlo Arozqueta | You love technology, security, and trying new things... You enter the workforce, work hard, rise ... | |
What Does It Actually Take to Start a Security Product Company? | Bob Stratton , Rick Gordon | Security people often talk about business in the same hushed tones that everyone else uses ... | |
Diamond Model for Intrusion Analysis: What You Need to Know | Andy Pendergast | Any good Threat Intelligence analyst’s overarching goal is to provide actionable intelligence to aid in ... | |
Hacking Rants (from an almost old guy) | Joe Klein | “Any sufficiently advanced technology is indistinguishable from magic.” - Arthur C. Clarke. Like many gray ... | |
Adventures in Asymmetric Warfare: Fighting the AV Vendors | Will Schroeder | As a co-founder and principal developer of the Veil-Framework, the speaker has spent a considerable ... | |
Opening Acts: How Attackers Get Their Big Breaks | Chuck Willis , Evan Peña | Every security incident has to start somewhere. Sometimes the attacker gets into an organization via ... | |
Fighting Back Against SSL Interception (or How SSL Should Work) | Jacob Thompson | Enterprises increasingly deploy network security devices to intercept and inspect SSL-protected employee web traffic, often ... | |
Doctor Docker: Building Your Infrastructure's Immune System | Mike Mccabe , Patrick Cooley | As hardware is being demoted, the ‘stack’ and PaaS are becoming software. It brings up ... | IncludeThinkstScapes |
How Headlines Make Heads Roll: The Media's Impact On Security | Tim Wilson , Michelle Schafer | The very public breach at Target cost the company millions and resulted in the resignations ... | |
BroIDS Crash Course (4h)10:00am (4h) BroIDS Crash Course | Liam Randall | Bro is a stateful, protocol aware open source high speed network monitor with applications as ... |