bsidesljubljana 2016 March 9, 2016 to March 9, 2016, ljubljana,slovenia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attacking Big Data Environments Birk Kauer In this talk we will show how to attack enterprise-grade “big data” environments, based on ...
Open Source Malware Lab Robert Simmons The landscape of open source malware analysis tools improves every day. A malware analysis lab ...
Digital Supply Chain: The Exposed Flank Dave Lewis This talk will speak to the issues pertaining to supply chain security as is relates ...
Beef-up your mobile app security Denis Justinek We will cover our take on mobile app security from basic methods to advanced. While ...
Steel sharpens steel: Using Red Teams to Make Blue Teams Better Christopher Payne Understanding, anticipating, and identifying the wide array of evolving threats facing organizations today requires well-developed ...
Blackholing the Internet: A Live Demo Adam Rapley BGP is pretty old. It’s also very (very) trusting! This talk examines the current state ...
State-Surveillance: Treason, Heresy and the Boy That Drives The Plow. Finux Societies may change, but the staus-quo remains the same. What happens when a super-power has ...
PKI should go: A note on TLSA and DANE Damjan Sirnik With number of emerging new Trusted Certificate Authorities (CAs), a few not so recent CA ...
All faces of on-line extortion Gorazd Bozic 2015 was the culmination of a simple and efficient criminal business model: extortion. Either via ...
Introducing DET [Data Exfiltration Toolkit] Paul Amar The Data Exfiltration Toolkit (DET) makes the process of exfiltrating data from networks simpler. It ...
ISIS Online Michael Bowes Our talk will cover several aspects of how terrorist groups, particularly ISIS, have integrated social ...