bsidesboston 2016 May 20, 2016 to May 21, 2016, boston,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Advanced Web Hacking [Full day class] David Bressler , Casey Dunham GuidePoint Security’s Advanced Web Hacking class heavily emphasizes hands on learning through an instructor led, ...
Introduction to Hardware Hacking [Full day class] Brent Dukes This training will introduce the audience to the field of reverse engineering electronics. Attendees will ...
CTF: Learn to Hack for Fun and Profit! [Half day class] John-nicholas Furst Learn about Capture The Flag (CTF) competitions and how you can participate. This training will ...
Physical Security Testing [Half day class] Keith Pachulski This training presentation will be a complete walk through on how to perform physical security ...
Resume Review Ming Chow , Roy Wattanasin Bring multiple copies of your resume to have Ming, Roy and others (anyone who would ...
Pentesting for Fun and Profit William Reyor Should you become a pentester? How do you get there? What skills are required? What's ...
Bringing down the great Cryptowall Weston Hecker Ransom-ware has been running rampant the last 6 years and there has been very little ...
Information-Driven Product Design Nikon Rasumov Two of the currently most valued technology skills are that of data scientists and cyber ...
Up is Down, Black is White: Using SCCM for Wrong and Right Will Schroeder , Matt Nelson Offense and defense overlap more often than you may think. The same tools that allow ...
Practical OpSec for Paranoid Security Practitioners Mike Li How to catch someone using TOR? How can you maintain privacy in an age where ...
Building Advanced XSS Vectors Brute Logic In the modern web, with heavy use of client side processing and security guards like ...
Diversity, Don't Read the Comments Pedro Marcano We tend to know diversity is important. There’s evidence that diverse teams are smarter and ...
Breaking out of the silo: the need for broad security automation Julian Defronzo , Justin Pagano Information Security teams are trying to manage increasingly complex IT and cloud environments at their ...
Keynote Gabriella Coleman Anonymous--the masked activists who have contributed to hundreds of political operations around the world since ...
Identifying (and avoiding) perverse incentive structures in your security solutions Mudge Peiter Zatko, better known as Mudge, is a computer and network security expert, open source ...
Advanced XSS and Injection Attacks David Bressler , Casey Dunham Many developers are becoming increasingly familiar with the OWASP Top 10 Web Application Security Risks ...
Getting Past Blame: A Human Strategy for Hacking Security Michael Figueroa By regarding humans as the weakest link, contemporary information security perspectives disrespect users and business ...
Roads to a Career in CyberSecurity Sandy Carielli , Deidre Diamond , Sonia Arista , Lital Asher-dotan , Nazira Carlage There is no single path to a successful career in cyber security. The security industry ...
CryptoLocker Ransomware Variants Are Lurking “In the Shadows,” Learn How to Protect Against Them Recently , Attackers Systems , Disallowing Backups , He/she Mercy. In this technical session, we’ll discuss the ins and outs of shadow copies, reveal how ...
Facilitating Fluffy Forensics 2.0 Andrew Hay Cloud computing enables the rapid deployment of servers and applications, dynamic scalability of system resources, ...
We bought some tools - now what? Jim Bowker Everyone knows that information security isn’t something that can be ignored. Most people are doing ...
Advocating for yourself in an Apathetic world: How to be Sick with Success Emily Pience 117 million people in the United States have at least one chronic illness, and In ...
How To Discover 1352 Wordpress Plugin XSS 0days in One Hour Larry Cashdollar In a single night, I was able to find about 1400 vulnerabilities in wordpress plugins. ...
Simple Data Exfiltration in a Secure Industry Environment Phil Cronin Since Edward Snowden’s extensive data exfiltration from a high-security NSA environment, there has been heightened ...
Getting Started with Machine Learning for Incident Detection David J. Bianco , Chris Mccubbin Organizations today are collecting more information about what's going on in their environments than ever ...
Becoming a Multi-Headed Hydra Jen Andre It is a universal truth acknowledged that security teams have too much to do, and ...