BsidesNash 2017 April 22, 2017 to April 22, 2017, nashville,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Infosec Tools of the Trade: Getting Your Hands Dirty | Jason Smith | In this presentation we'll will be going over introductions to the various focuses in information ... | |
Security Guards -- LOL! | Brent White | During onsite “black box” penetration assessments, it is quite common that you will encounter a ... | |
Got Vendors? | Armin Smailhodzic | How many vendors does your company have? Do you have a list of all the ... | |
How to learn reverse engineering, kick ass at bug bounties, and being a bad ass SOC analyst | Ben Actis | How to learn reverse engineering, kick ass at bug bounties, and being a bad ass ... | |
Windows Operating System Archaeology | Casey Smith | The modern Windows Operating System carries with it an incredible amount of legacy code. The ... | |
Emerging Legal Trends in Cybersecurity | Rodney Hampton | How can you make a bad event like a major security breach even worse? By ... | |
A Pyrate looks at 40 | Adam John | At 40, everyone is obligated to take that mid-life look at one's self and take ... | |
Intro to drone tech | Ron Foster | For the noob, or the expert, this talk will cover types of drones, typical components, ... | |
Trust, But Verify, Your SAML Service Providers | Bruce Wilson | BLUF: This talk will provide an overview of how SAML Authentication works, the basics of ... | |
Springtime for code reviews | Ryan Goltry | You come upon a long running project that has never had a security centric code ... | |
Weaponizing Splunk: Using Blue Team Tools for Evil | Ryan Hays | Splunk is a log aggregation and correlation tool that is normally used for defensive analysis ... | |
Does DoD Level Security Work in the Real World? | Jeff Man | After spending nearly 13 years working for the Department of Defense, I ventured out into ... | |
Marrying Incident Response and Threat Intel Within Your Enterprise | Joe Gray | Having actionable Threat Intelligence is vital to preventing attacks. Having a strong Incident Response team ... | |
Chunky Cookies: Smashing Application Aware Defenses | Russell Butturini | In recent years, defensive technologies have moved past the traditional filtering and anomaly detection at ... |