BsidesSeattle 2016 Feb. 20, 2016 to Feb. 20, 2016, seattle,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Disable the Easy Button; Pen Test Preparation Steps | Carrie Roberts | Don't give an attacker or penetration tester an easy route to domain admin on your ... | |
Roll Your Own Command and Control Architecture | Daniel Reilly | Creating a Command and Control architecture for a Botnet can be a fun and informative ... | |
Attacking Windows Authentication and BitLocker Full Disk Encryption | Ian Haken | In November 2015, I presented the details of a vulnerability in Windows authentication allowed for ... | |
The Hacker will see you now: a skeptical look at connected medical devices | Jay Radcliffe | The intersection of medical technology and connectivity has opened up a whole new world of ... | |
Securing the Software Engineering Process | Jeff Costlow | This “lessons learned” talk is about building secure software. It covers the phases of the ... | |
Top Ten AWS Cloud Security Best Practices | John Martinez | Traditional security strategies and controls have long been struggling to keep up with the rapidly ... | |
LostPass | Sean Cassidy | LastPass holds all of your secrets. Its login prompts and alerts occur within the browser ... | |
Planning Effective Red Team Exercises | Sean Malone | An effective red team exercise is substantially different from a penetration test, and it should ... | |
Active Directory is your friend | Sundarnut | Active Directory is your friend. In this tech talk with a demo, I will walk ... | |
DevSecOps: The Marriage of SecOps and DevOps | Tim Prendergast | We’re now seeing a new “marriage” of SecOps and DevOps that is creating a whole ... |