bsideswellington 2017 Nov. 23, 2017 to Nov. 24, 2017, wellington,new zealand
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Communication: An underrated tool in the infosec revolution | Katie Ledoux | Whether it’s closing the talent gap, improving security awareness, sharing threat intelligence, or getting the ... | |
Keeping on top of Ubuntu and Debian security advisories: host agents and wild goose chasing | Michael Fincham , Filip Vujičić | When ensuring a large number of heterogeneous Ubuntu and Debian machines are "up to date", ... | |
Confessions of a Red Teamer | Pipes | “Attackers have bosses and budgets too” — Phil Venables This is a talk for the ... | |
Beer, Bacon and Blue Teaming | Chris Campbell | A famous man once said that he didn’t need to attend intel briefings because “I’m, ... | |
Shining a light on the Internet of Terrible | Dan Wallis | In order to find out more about this wonderful world of the Internet of Things, ... | |
Pkit Finder | Qasim Khan | Phishing is the easiest and most successful attack vector to harvest credentials, deliver malicious file, ... | |
Layer 2 person spoofing and impostor syndrome | Ben Hughes | Now that infosec rock stars are appearing on TV shows, they're in headlines, and the ... | |
Realtime cyber alerting | Jeremy Stott | Getting tired of not looking at dashboards? Inbox full of alerts you send to trash? ... | |
Actually, it's about ethics in penetration testing | Josh Brodie | This talk will feature as a rough guide to not being a Nessus-rebranding, haphazard shell-popping, ... | |
IOP The Internet of Pancakes | Peter Jakowetz | 2015 was an important year. NASA confirmed the presence of water on Mars, 195 countries ... | |
Public WiFi isn't that bad, right? | Oliver Ewert | What I found while refreshing my knowledge on WiFi security, to protect myself while travelling ... | |
IoT - How to fight the tyre fire | Tom Isaacson | Everyone knows that IoT is a tyre fire but what can we do to start ... | |
Investigation of recent targeted attacks on APAC countries | Noushin Shabab | We have been tracking targeted attacks on countries and territories in APAC region for the ... | |
Journey to the top on BugCrowd: The untold tales of struggle and pain | Ahmad Ashraff | The bug bounty scene has evolved tremendously over the years. It is now very competitve ... | |
Gophers, whales and.. clouds? Oh my! | Glenn Grant | Go, Docker and Microservices; some great technologies and buzzwords that we hear so much about ... | |
Secrets of a High Performance Security Focused Agile Team | Kim Carter | Security does not have to be neglected when you’re planning, building & running a high ... | |
Operation Luigi: How I hacked my friend without her noticing | Alex | I’m at a ramen place with my friend Diana. Diana isn’t her real name, but ... | |
Avoiding armageddon: Defending your system like a CERT-er | Michael Shearer | SSH key? Yup. Strong encryption? Uh huh. Systems patched? You bet. So you think that ... | |
Let's think about drinking | Petra Smith | How often do you think about drinking? OK, but how often do you _really_ think ... | |
Mental Health in Infosec - Hackers, hugs, and drugs | Amanda Berlin | The infosec community is difficult to compare to any other. We are composed of intelligent, ... | |
Influencing Meat Puppets Through Memes | Simon Howard | The UK voted to leave the EU and The Donald is president, what a time ... | |
Rapid Reaction - Foundations of Incident Management | Ahmed Elashmawy | With the exception of a few organisations, it seems that the effort put into establishing ... | |
When do we Belong? | Aurynn Shaw | Impostor syndrome is rampant in the tech communities and it’s hard to understand why. Drawing ... | |
Reversing the Killchain - An Actionable Framework for Defending Against Common Threats | Amanda Berlin | The Intrusion Kill Chain, sometimes called the Cyber Kill Chain, is a model for actionable ... | |
Pandas and Rabbits: Xen Meets American Fuzzy Lop | Matthew Daley | Xen is an open-source hypervisor that powers some of the world’s biggest public and private ... | |
#cyberisnotanoun | Creeture | I'm going to put a strong case for why "cyber" and "cyberspace" are harmful not ... | |
Onionland Explorers! | Ss23 | An introduction to Tor, an introduction to Onionland! We'll discuss the basics of how Tor ... | |
Project Walrus, an RFID and Contactless Card App | Daniel Underhay | Project Walrus is an Android app we're developing to let pentesters make better use of ... | |
Crescent Wrenches and Debuggers: Building Your Own Toolkit For Rational Inquiry | Kerri Miller | Software exists in a constant state of failure, facing pressure on many fronts - malicious ... | |
Hacker: Crook or Crusader? | Lauren Flutey | I believe people hold particular ideas about hackers and hacking derived from media and pop ... | |
The CIO's new process | Andrew Hood | Have you ever wondered what would have happened if Hans Christian Anderson had lived 180 ... | |
Protect yourself against the bees | Katie Mclaughlin | In the meatsphere, you can utilise an apiarists cowl or smoke to protect yourself from ... | |
Reusing breach data for attack and defence | Edward Farrell | Data breaches and their disclosure have become commonplace and yet reusing contents from a breach ... | |
Mistakes were made | John Grant | #Mistakes were made "Mistakes were made" said by an engineer describing the issue of losing ... | |
Give your users better feedback about rubbish passwords with zxcvbn | Jen Zajac | An introduction to zxcvbn, an open source library that provides better password feedback, rating passwords ... | |
IT Risk and Security Management in Small and Medium Organizations - The Bare Minimum | Andreas Drechsler | This talk will show 1) a ‘bare minimum’ IT risk and security management (ITRSM) framework ... | |
Security for Small to Medium-sized Businesses | Sai Honig | You may think you are small business and not a target group for cybercriminals! MBIE ... | |
Design for Security | Serena Chen | This is BSides, so you already know how crucial security is. Yet it's a rare ... | |
Take a Lesson from Snowboarding and Recruit Kickass Women | Toni James | 15 years in the snowboard industry driving the initiative to raise the level of female ... | |
Let me secure that for you | Kirk Jackson | Writing secure applications is hard, and often vulnerabilities are found after your application has already ... | |
When Bugs Bite - why neglecting your edge cases can kill | Attacus | Two people died because of a Unicode support error. Another died because of a camera’s ... |