BSidesNYC 2016 Jan. 16, 2016 to Jan. 16, 2016, new york,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Chris Wysopal N/A
Visionary Keynote Dino Dai Zovi N/A
Entrepreneur Hour Ang Cui , Stephen A. Ridley , Elad Yoran , Vera Sell N/A
99 Problems but a Microkernel ain't one! Alex Plaskett Cars, Safety Critical Systems and consumer devices (phones) all run QNX, however, very little security ...
An Adversarial View of SaaS Malware Sandboxes Jason Trost , Aaron Shelmire Anyone attending this conference knows the usefulness of running malware in a sandbox to perform ...
Beyond IDS: Practical Network Hunting Josh Liburdi Aimed at incident response and threat detection attendees, this talk highlights practical hunting techniques for ...
Change is the only constant: A day in the life of DNS changes Ben April We took a one-day snapshot of Farsight's new DNS Changes channel and tore into it ...
Defense at Scale Jan Schaumann An old infosec truism notes that companies are divided into those who have been hacked ...
Docker Containers for Malware Analysis Lenny Zeltser There are wonderful malware analysis applications out there that run well on Linux; however, installing ...
How Hackers View Your Web Site Patrick Laverty We know about web vulnerabilities. We know web sites have them. In this talk, we ...
Making & Breaking Machine Learning Anomaly Detectors in Real Life Clarence Chio Machine learning (ML) techniques used in network intrusion detection are susceptible to adversarial 'model poisoning'. ...
Mobile implants in the age of cyber-espionage Dmitry Bestuzhev This research is about mobile implants used in APT attacks. I will go through implants ...
No Silver Bullet. Multi contextual threat detection via Machine Learning Rod Soto , Joseph Zadeh Current threat detection technologies lack the ability to present an accurate and complete picture of ...
The Insecurity Of Things Stephen A. Ridley There is a latent distrust of the growing "Internet Of Things" market. The data collected ...
The Pagentry of Lateral Movement Stuart Morgan In order to meaningfully compromise a client, you need to take advantage of every opportunity ...
The Ransomware Threat: Tracking the Digital Footprints Kevin Bottomley The continuing evolution of ransomware is a constant threat to businesses of all types. Taking ...