BSidesNova 2019 March 2, 2019 to March 2, 2019, Alexandria, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE Ian Coldwater N/A
Hunting: More Than a Buzzword. Applying Scientific Research Method to Hunting Alan Stacilauskas The word hunting has become a buzzword within the IT security community used by vendors, ...
Spies, Ciphers, Symbols, & Secret Writings Jeff Man The venue for BSides NOVA 2019 (The George Washington Masonic National Memorial) inspired this ex-NSA ...
The fresh smell of ransomed coffee - altering not so smart devices Martin Hron Let's have a look at how breaking best security practices in smart devices can potentially ...
CTF4NOOBS Marcelle Lee Interested in cyber competitions but don’t know where to start? Or have you tried one ...
Cyvant's Cyber Career Corner Bob Weiss , Mike Thompson , Steve Helfen , James Dieteman , Matthew Maley , Brandon Walker Have you found it hard to break into the cybersecurity industry? Well, CYVANT's Cyber Career ...
Cyber Dream Resume Makeover Renee Small Have you wondered how hiring authorities view your resume? Are you applying to dozens (or ...
Commas Kill: Writing Better for Analysts Megan Ferguson This talk is designed to provide analysts with a few key ways to improve their ...
ATT&CK By Numbers Andy Applebaum Ever wonder which technique is used by the most threat actors? Or how many techniques ...
Multitasking Host Forensics Beth Lancaster Knowing how a host was compromised will help determine if other hosts on your network ...
Communicating just like Captain Picard Jeffrey Blevins Join us on this voyage as we discuss practical tips for coordinating cyber incidents at ...
Understanding Cyber Resilience: People, Process, Technology and Facilities Christophe Foulon Many cybersecurity professionals tend to focus solely on the IT / cybersecurity aspect of securing ...
I got a Raspberry Pi, now what? Jai V This is a beginner’s guide to setting up a raspberry pi 3 as a functioning ...
Social Forensication: A Multidisciplinary Approach to Successful Social Engineering Joe Gray This presentation outlines a new twist on an existing social engineering attack. In the past, ...
10 Steps to Build & Lead a Competitive Cybersecurity/CTF Team John Hammond Companies, schools and communities desperately want to get into the cybersecurity scene and improve their ...
No IOUs with IOT Bryson Bort Mass Attack Campaign with Hands-on Webcam Exercise will teach participants about the IOT threat landscape ...
TIP of the Spear: A Threat Intelligence Platform Acquisition Jason Wonn Military organizations have long known of the value of intelligence, but many commercial entities only ...
Domain Fronting FTW! Matthew George The advent of cloud technologies has provided significant advantages for malicious attackers and penetration testers. ...
Cloud Intrusion Detection and Threat Hunting With Open Source Tools Craig Chamberlain By popular request, this is a sequel to a 2017 talk entitled “Engineering Challenges Doing ...
Containing security vulnerabilities with containers Brandon Mitchell Containers are often seen as an easy target for attackers. Commonly referred to as a ...
What you know, what you have and what you are: MFA in the modern age Erich Kron A simple username and password are not enough to protect accounts and vital assets anymore. ...
Hanlon's Razor & BGP Hijacking: You can't really be that incompetent, can you? Allan Liska Hanlon's razor states, "Never attribute to malice that which is adequately explained by stupidity" which ...
Torn flags: Reconsidering models of adversary denial and deception tradecraft in current and future offensive cyber operations Jd Work Analytic conception of "false flag" tactics, techniques and procedures (TTP) employed as part of sustained ...
How Film Impacts Hackers: War Games and the CFAA Beau Woods President Reagan was distracted in a 1983 nuclear ballistic missile meeting with members of Congress. ...
Hacker Heroes and Villains: Evolving Role in Media Beau Woods Hackers may fascinate and terrify the public, yet media portrayals of hackers tend to lack ...