BSidesColumbus 2019 March 1, 2019 to March 1, 2019, Columbus, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Morning Keynote Runa a. Sandvik Runa Sandvik is the Senior Director of Information Security at The New York Times. In ...
HACKERS, HOOLIGANS, HEISTS, & HISTORY Brian Contos This presentation is based on 20+ years in cybersecurity working across 50+ countries. It will ...
Scrapping for Pennies: How to implement security without a budget Ryan Wisniewski This talk focuses on how to implement the CIS Top 20 controls using open source ...
Check Your Privilege (Escalation) Kate Broussard So you’ve managed to get a foothold into the web server — now what? Privilege ...
Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose ). Cody Smith It's been said that Domain Name System based Distributed Denial of Service attacks are still ...
Unix: The Other White Meat Adam Len Compton As the targets in many penetration tests and red team activities as well as being ...
Puppet Masters: How Social Engineers Continue to Pull Our Strings Erich Kron Social Engineering is a practice we use almost every day of our lives. It is ...
E-ZHack: An Update on SDR and Toll Booth Reverse Engineering Kyle Westhaus Upon release of the RTL-SDR in 2012, the entry barrier to the world of recording ...
Mobile App Vulnerabilities – The Bad, The Worse And The Ugly Ray Kelly One of today’s hottest targets for hackers is mobile applications. Whether its developer inexperience, rush ...
Mixing and Baking a New AppSec Person Bill Sempf Houston, we have a problem: we need more application security people. There is a real ...
How Online Dating Made Me Better at Threat Modeling Isaiah Sarju Isaiah Sarju has used online dating sites such as Tinder and OkCupid. At times this ...
What On Earth Is Quantum Computing?!? (And will it break all my encryption?) Craig Stuntz You might have heard that quantum computers can break public key encryption. You might also ...
Battling Magecart: The Risks of Third-Party Scripts Kevin Gennuso Magecart came to light in 2018, where various groups of attackers siphoned credit card data ...
Ship Hacking: Data on the Open Seas Brian Olson In 1995, when the fictitious Dade Murphy and his friends stopped oil tankers from being ...
Identify theft through OSINT Zee Abdelnabi By randomly selecting a target on Google, the speaker was able to use tools to ...
Common Developer Crypto Mistakes (with illustrations in Java) Kevin Wall During the past 8 years, Kevin has examined how cryptography has been used in 300+ ...
The Overlooked Cyber Security Risk: 3rd Party Risk Management Rose Songer An entire business can be put at risk with the simple click of a button. ...
The Path to IAM Maturity Jerod Brennan “Are we secure?” It’s the most dreaded question that information security and risk management professionals ...
Assumed Breach Testing Brendan Oconnor OPM, Marriot, Equifax - horrible breaches made that much worse due to dwell time. Bad ...
API Security: Tokens, Flows and the Big Bad Wolf Ingy Youssef OAuth Flows, OpenID Connect, tokens, nonces, gateways & all the fun API stuff. Well, there's ...
Demystifying DMARC: A guide to preventing email spoofing Sean Whalen Domain-based Message Authentication, Reporting, and Conformance (DMARC) has been steadily gaining adoption in the financial, ...
Afternoon Keynote Featuring Craig Hoffman Craig Hoffman is a leading member of Baker Hostetler's Chambers USA-ranked privacy and data protection ...