BSidesDC 2015 Oct. 17, 2015 to Oct. 18, 2015, washington,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Bob Weiss , Alex Norman N/A
The New Face of Card Fraud G. Mark Hardy Did you notice your new credit card looks different? Starting October 1, most large merchants ...
Crypt Kids keynote Alicia Kozakiewicz "Alicia Kozakiewicz is an international advocate for preventative safety education and effective legislation. As a ...
Bridging the Gap: Lessons in Adversarial Tradecraft Will Schroeder , Matt Nelson As companies scramble for a way to keep from being the next Sony, they’ve started ...
The Law of Drones Michael "theprez98" Schearer A decade ago, drones were mostly associated with terrorist strikes in the Middle East. Since ...
Point-of-Sale to Point-of-Fail Ken Westin The recent rash of retail breaches reveals a number of weaknesses in point-of-sale systems and ...
Running Away from Security: How Your Online Information Can Hurt You Micah Hoffman How would you feel if a stranger in a foreign country could peer into your ...
Deductive Reasoning: File Analysis Techniques John Laycock , Chris Rogers Are you a new incident responder or do you want to break into the field? ...
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball Ian Amit When adding a new threat intelligence feed into your threat model and security practice, one ...
**** It, Do it Live (PowerShell Digital Forensics) Jared Atkinson Recent intrusion into the networks of organizations like Office of Personnel Management, Sony, JPMorgan Chase, ...
An Adversarial View of SaaS Malware Sandboxes Jason Trost , Aaron Shelmire Anyone attending this conference knows the usefulness of running malware in a sandbox to perform ...
Log All The Things! Proactive Forensics using Log Analysis Aaron Beuhring , Kyle Salous Implementing a SIEM can be a complex and costly process. Many organizations fail to realize ...
This log class is SEXY and it is a Blue Team defense class too. Michael Gough Logging is what allowed us to catch and understand an advanced Chinese attack. Learn what ...
Bro Crash Course Liam Randall In the last three years the Bro Platform has taken the network monitoring scene by ...
You can't make web app security easy, but you can make it simple Joseph Mccray This presentation will cover both manual and automated testing methods for web application security vulnerabilities. ...
Building the Poison Apple Pi Andrew Shumate Everyone loves the Raspberry Pi, it's cheap, relatively powerful for its size, portable, and versatile. ...
Anatomy of Black Markets in 2015 – Strategies and Mitigation Alex Holden As times change and security awareness and defenses become more sophisticated, the hacker community evolves ...
Cyber Intent: Cybersecurity Joe Klein , Gs Mcnamara The current status of cyber security lacks any judge of visitor intent. We are throwing ...
Defending Election Campaigns from Cyberspace Joshua Franklin , Kevin Franklin Electoral candidates from both sides of the aisle increasingly rely on the internet to promote ...
Content Security Policy - Lessons learned at Yahoo Vibha Sethi , Binu Ramakrishnan Yahoo serves daily essentials such as mail, search, finance, sports, news and magazines to a ...
A deep look into a Chinese advanced attack. Understand it, learn from it and how to detect and defend against attacks like this. Michael Gough Many say the Chinese are behind many attacks on US companies. In this case, it ...
Network Reliability Monitoring for ICS – Going beyond NSM and SIEM Jim Gilsinn Determining the overall health and security of an industrial control system (ICS) network is currently ...
Stop Treating Data as Instructions! Jothy Rosenberg Standard processors are highly susceptible to attack. We've lived with that fact for decades, stuck ...