BSidesBoston 2015 May 9, 2015 to May 9, 2015, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
When penguins attack - Linux's role in the malware ecosystem Chester Wisniewski Linux servers are some of the most highly valued assets for opportunistic online criminals. Nearly ...
Infosec Rock Star: Geek will only get you so far Ted Demopoulos Why are some people so much more effective than others? Why do some super smart ...
Is Threat Modeling for Me? Robert Hurlbut Threat modeling is a way of thinking about what could go wrong and how to ...
Designing a Cybersecurity Program based on the NIST Framework Larry Wilson Larry is responsible for developing, implementing and managing the University of Massachusetts Information Security Policy ...
Hacker or criminal? Repairing the reputation of the infosec community Melanie Ensign Recent legislation and media stories reflect an inaccurate, often criminal, if not confused picture of ...
The Benefits in Externalizing DMZ-as-a-Service in the Cloud Israel Barak Organizations often place critical infrastructure in the DMZ which means that attackers able to enter ...
The Securitized State: Where it came from, where it's going, what can be done about it Molly Sauter This year, we will be featuring a special keynote address and book signing with Molly ...
Running Away from Security: Web App Vulnerabilities and OSINT Collide Micah Hoffman Lately it seems like more and more of our lives are being sucked into the ...
Common misconfigurations that lead to a breach Justin Tharpe I would like to do a talk about different misconfiguration I have seen over the ...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program Paul Asadoorian A robot, a ninja and a pirate get into a fight. The question is: who ...
Applying Big Data technology to security use case Max Pevzner The big data technology suite can only be effective when applied correctly. It solves certain ...
Career Panel Discussion Jack Daniel , Sandy Carielli , Larry Wilson Bring your questions and engage with our panelists about careers in infosec - whether you ...
Protect Your “Keys to the Kingdom” – Securing Against the Next Inevitable Cyberattack Paul Kozlov The first step in securing a business is admitting there’s a problem: “Hi, I’m a ...
Marketing: They’re not all Schmucks. Jen Ellis , Josh Feinblum During a security crisis, time is of the essence. Security professionals must act quickly to ...
In pursuit of a better crypto puzzle Samuel Erb Proof of work functions have recently become massively popular with the rise of cryptocurrency. There ...