BSidesvienna 2016 Nov. 12, 2016 to Nov. 12, 2016, vienna,austria
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Visualize your threats | Philipp Krenn | Knowing what is going on in your environment is an important part of staying on ... | |
The modern SOC: Adapting the Security Operations model to how we work | Josh Pyorre | Security Operations Centers are a central place where security incidents flow through in an organization, ... | |
When your firewall turns against you | René Freingruber , Raschin Tavakoli | This talk will demonstrate how attackers can compromise a company’s network via their firewall system. ... | |
Exploiting First Hop Protocols to Own the Network | Paul Coggin | This talk will focus on how to exploit a network by targeting the various first ... | |
0xff and how it evolved | Aaron Kaplan | No abstract yet | |
The law of TLS breakage | Hanno Böck | Every imaginable TLS implementation fault can be found in the wild. The TLS ecosystem suffers ... | |
The details of the investigation that resulted in the Mamba Ransomware discovery | Renato Marinho | In this talk I will present the details and challenges of handling an incident suffered ... | |
Advanced SSH | Maclemon , Leyrer | Productivity and Security Tipps for SSH. Tips and tricks for a more efficient and more ... | |
Running a bug bounty - What you need to know | Shpend Kurtishaj | Having a bug bounty program is one of the most cost-effective and productive methods of ... | |
NoSQL means no security? | Philipp Krenn | New systems are always interesting targets since their security model couldn’t mature yet. NoSQL databases ... | |
Transport Layer Security beyond crypto – notary services and certificate pinning to the rescue? | Artemios Voyiatzis | The TLS protocol, X.509 digital certificate, and Certificate Authority (CA) are crucial components for realizing ... |