BsidesAugusta 2015 Sept. 12, 2015 to Sept. 12, 2015, Augusta,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Stephen G. Fogarty N/A
Keynote Ed Skoudis N/A
Fundamental Understanding of Baseline Analysis and Remediation for ICS Juli Joyner , Jeffrey Medsger This talk is about developing and implementing a successful continuous monitoring program for the Industrial ...
Taking a distributed computing approach to network detection with Bro and “The Cloud” Mike Reeves This talk focusses on a new way to do network detection by leveraging Bro to ... IncludeThinkstScapes
A Scout's Perspective on Network Defense Justin Edgar This talk will discus the Military Decision Making Process and apply it to network defensive ...
Doomsday Preppers: APT Edition Tanner Payne Too many organizations take an "it'll never happen to me" approach when it comes to ...
Building a Better Security Analyst Using Cognitive Psychology Chris Sanders The information security industry and the vendors that support it have placed emphasis on the ...
Viper Framework for Malware Analysis Paul Melson Viper is a Python-based binary analysis framework. It offers a great deal of flexibility, functionality, ...
Infiltrating C2 Infrastructure Tim Crothers Take a walk on the wild side as we explore how to go about monitoring ...
Building "muscle memory" with Rekall Memory Forensic Framework Alissa Torres Are you the Incident Response "Super Hero" in your organization? Add another IR superpowers star ...
Blue Team Starter Kit Timothy De Block This talk is about low cost tools an information security professional on the defensive side ...
Using a HackRF One to Infiltrate the Digital Thetford Wall Patrick Perry While this sounds like an offensive talk it is actually defensive in nature. What would ...
Malvertizing Like a Pro Alex Rymdeko-harvey This presentation is the culmination of research and execution into the emerging attack path of ...
Weaponizing our youth: The case for integrated cyber ethics. Josh Rykowski As we continue to move cyber learning further and further to the left on the ...
PowerShell: Making everything old new again Andrew Cole , Rich Moulton In post-exploitation operations, using native OS capabilities is always preferred over custom tools to minimize ...
DIY vulnerability discovery with DLL Side Loading Jake Williams In this talk, Jake will teach you how to discover vulnerabilities like a rock star ...
Recon-ng and Beyond Tim “lanmaster53″ Tomes It's not hard to see the value of OSINT in Red Teaming or Network Penetration ...
Attacking OWASP - Exploiting the Top 10 David Coursey The OWASP Top 10 never changes for a reason; these attacks can be used against ...
Go Hack Yourself Jason Frank Penetration testing is an art and a science. It takes the knowledge of networks/applications/all things ...
2015 - It's Not over yet... Joel Esler 2015 has been quite an active year in threats, a clear leader in exploit kits ...
How to get into ICS security Chris Sistrunk This talk is about how to get into ICS security because we don’t have enough ...
Destruction as a Service: Security through reanimation Jon Medina The continuously changing security landscape poses new challenges almost daily. Some of these threats must ... IncludeThinkstScapes
Going from Information Security to Business Operation Protection Roland Cloutier Threats shift, technology shifts, and our businesses shift. How about our approach to the operational ...