bsidesaugusta 2017 Sept. 16, 2017 to Sept. 16, 2017, georgia,usa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Black Mirror of Execution: How new artifacts have changed the 'O' and the 'D | Alissa Torres | Windows tracks system/user activity with growing sophistication and granularity. Let's walk through some of this ... | |
Hacking Food | Chris Sanders , Jason Smith | Being a hacker isn’t just about breaking into computers, it’s about looking for creative ways ... | |
Machine Learning Fueled Cyber Threat Hunting | Tim Crothers | Cyber Threat Hunting can be difficult to do well but most organizations have come to ... | |
Bet You Won't Block Google: Evil APIs on the Rise | Michael Banks | API’s are a significant utility in today’s information age. Some will argue it’s almost a ... | |
Unmasking Cybercriminals on the Open Internet | Paul Melson | Cybercriminals operate under the presumption of anonymity during their intrusions and thefts. Using easy-to-apply analysis ... | |
Lessons Learned ISAC – How to Get Wisdom as Cheaply as You Can | Russell Eubanks | Our failure to learn from others misfortune leads us down the same path that fellow ... | |
Burping for Joy and Financial Gain | Tim “lanmaster53″ Tomes | If you do application security and don't use Burp Suite, then you're likely doing it ... | |
Inception Presentation | Jason Blanchard | In less than 30 minutes, you'll smile, nod in agreement, be amazed, become incredibly self-aware ... | |
Don't Google 'PowerShell Hunting | Josh Rykowski , Sean Eyre | The pervasiveness of PowerShell in today's networks speaks to its usefulness to admins and users ... | |
Hunting Adversaries with Investigation Playbooks & OpenCNA | Ismael Valenzuela | As SOCs mature and start to formalize their operations, they typically focus on preparedness, escalation ... | |
Security Automation in the cloud | Toni Fuente | What it was hardware, now is software, it is just an API call. We deploy ... | |
Localization of Wireless Threat Actors and Evasion Tactics | Tommy Chin | Widely used throughout public space, mobile computing devices such as smartphones and Internet of Things ... | |
Necurs Botnet: Mass Distribution for all the Bad Things | Paul Burbage | This presentation will include the latest research on the Necurs botnet which has historically spammed ... | |
Building a Secure Environment for Operations using Docker | Brian Stucker | Running an environment with containerized applications can help drastically reduce security issues and mitigate risk ... | |
Managing Your Cyber Career & Job Hunt | Bob Wheeler | Despite the fact that Cyber Security / Info Sec professionals possess skills that are in ... | |
Simplified Home VPN Solution: A How To Guide | David Peeler , Keaton Sadoski | Overall, this will cover why the general public should be educated about privacy and VPN's ... | |
Zero Days and Zero Trust Part 2: Microsegmentation, Critical Infrastructure Protection, and a World of Many | Jack Koons | The role of microsegmentation, particularly when combined with advanced encryption and software defined networking, represents ... | |
Probing Toms: Creepy hackers on your house doorstep | Brice Self | It's something simple and small that everyone has done or does every day. We leave ... | |
Say hello to my little friend - An introduction to iOS security and forensics | Wes Widner | iPhone security is still a relatively obscure field. I'll walk you through a brief history ... | |
Be a Human nMAP! – Cultivating a ‘Renaissance & Reconnaissance Approach’ for the Social Engineer | Tigran Terpandjian | As a security analyst with an atypical entry into the information security world, one of ... | |
The Homeland of Things (HoT) Framework | Daniel West | During 2016, we witnessed the resiliency of our adversaries as they transitioned from zombifying personal ... | |
Automating Event Log Production and Testing for SIEM Detection | Alek Rollyson | When handling a large amount of detection input with limited resources, automation and proper reproducible ... | |
The Next Big Idea for Cyber Innovations--A Framework to Drastically Improve Cyber Defense (and Offense) Capabilities | Ernest Wong | Innovation is critical to improvements within our society and is a key component in the ... |