BsidesSeattle 2016 Feb. 20, 2016 to Feb. 20, 2016, seattle,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Disable the Easy Button; Pen Test Preparation Steps Carrie Roberts Don't give an attacker or penetration tester an easy route to domain admin on your ...
Roll Your Own Command and Control Architecture Daniel Reilly Creating a Command and Control architecture for a Botnet can be a fun and informative ...
Attacking Windows Authentication and BitLocker Full Disk Encryption Ian Haken In November 2015, I presented the details of a vulnerability in Windows authentication allowed for ...
The Hacker will see you now: a skeptical look at connected medical devices Jay Radcliffe The intersection of medical technology and connectivity has opened up a whole new world of ...
Securing the Software Engineering Process Jeff Costlow This “lessons learned” talk is about building secure software. It covers the phases of the ...
Top Ten AWS Cloud Security Best Practices John Martinez Traditional security strategies and controls have long been struggling to keep up with the rapidly ...
LostPass Sean Cassidy LastPass holds all of your secrets. Its login prompts and alerts occur within the browser ...
Planning Effective Red Team Exercises Sean Malone An effective red team exercise is substantially different from a penetration test, and it should ...
Active Directory is your friend Sundarnut Active Directory is your friend. In this tech talk with a demo, I will walk ...
DevSecOps: The Marriage of SecOps and DevOps Tim Prendergast We’re now seeing a new “marriage” of SecOps and DevOps that is creating a whole ...