BSidesAustin 2019 March 28, 2019 to March 29, 2019, Austin, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hacking Your Career Keith Turpin Many people get so busy doing their jobs that they don't manage their careers. This ...
Hot to Fix the Diversity Gap in Cybersecurity Chloé Messdaghi Women make up just 11 percent and minorities are slightly less than 12 percent of ...
Make Your Organization 10% More Secure Andrew Hay What if I told you that approaching security with compassion and mindfulness could help you ...
Mentorship 101 El Marquez Ever been a Daniel in need of a Mr. Myagi? Are you ready to achieve ...
Security Automation Simplified Moses Schwartz Incident response is an intense, high stress, high skill job that relies heavily on human ...
Using the Chrome Dev Tools Protocol for Pentesting and Bug Hunting Alex Useche The Chrome Dev Tools protocol allows us to hook our code to the browser via ...
Securing the Technology Supply Chain Keith Turpin Supply chains can represent the biggest risk to many organizations. Current data shows that this ...
Vulnerability Management: You're doing it wrong Mauvehed And Digitalgrease Threat and vulnerability management (TVM) is a core aspect of every information security program. Many ...
Spotting Lateral Movement with Endpoint Data Tony Lambert Lateral movement is an integral part of adversary movement into and around networks. This functionality ...
The Art of Defeating Facial Recognition Vic Harkness Privacy is not just an issue of interest to techies. People within the art community ...
Taste the Rainbow: Windows 10 Challenges for Red, Blue, and Purple Teams Andrew Case Microsoft has added a significant number of features in Windows 10 that affect the types ...
Maximal Visibility, Minimal Effort: Getting more value out of your hacking data with MSF 5 Pearce Barry Metasploit recently released a major version of the open-source Framework—the first major release since 2011. ...
Pitfall : The Art of Productizing osquery Alex Malone Facebook's cross-platform osquery agent is increasingly being used by security professionals to monitor assets from ...
Unexpected Success: Tips for navigating through security career, certs, and work-life balance Miriam Levenstein We share an interest in making the most of our time in the workforce: contributing ...
Why your red team shouldn't be special Isaiah Sarju Red teaming require the use of specialized tools. However, this should not exclude operators from ...
Scantron - A distributed nmap / masscan scanning framework Brennon Thomas This talk is for all the nmap lovers out there! Anyone familiar with nmap knows ...
The Power of DCShadow Don Steed So, you swiped domain admin credentials and want to maintain persistence without getting caught like ...
Purple Packets: Effective Network Defense Against Real-World Attacks Matt Soto There are two sides to every story. Yin and yang. Day and night. Host and ...
And all I got was a T-shirt: How to Leverage Community Volunteering for Career Development Kathleen Smith Career progression is typically seen as education, certification, and job moves. However in order to ...
Introducing ArTHIR –ATT&CK Remote Threat Hunting Incident Response Windows tool Michael Gough ArTHIR is a modular framework that can be used remotely against one, or many target ...
Security, Shift Left Dnyanada Annachhatre “Shift Left” paradigm to integrate security in early stages of product development life cycle by ...
Fooling Machine Learning using Adversarial Examples William Parks Adversarial example images appear to be of one class (e.g. dog or car), but are ...
KEYNOTE: Hunting attackers inside and outside of your network John Strand N/A
What do you want to be when you grow up? Damon "ch3f" Small Many industries have well-defined points of entry and well-understood education and training requirements. Information Security ...
Identify theft through OSINT Zee Abdelnabi This talk will demonstrate how easy identity theft has become because of OSINT and the ...
Reversing Education Phillip Wylie Reversing Education is a method used to create educational content for self-study. In this talk ...
How DevOps Tools and Practices can Improve Your Security Operations Eric Matlock The term DevOps is a hot buzzword right now. Most of the time when you ...
Turning the Tide - Using Criminal’s Stolen Data against Them Ted Ross Cyber criminals are constantly upgrading their technology to perform more sophisticated, widespread attacks. Preventing breaches ...
Cons & Careers Sciaticnerd/ Steven Bernstein “If you compete with others, you may not win. If you compete with yourself, you ...
BountyCraft - The Panel Chloé Messdaghi , Phillip Haddix Every security tester has some sort of methodology and toolset they use. This "secret sauce" ...
Understanding XSS and CSRF Christina Mitchell Come learn in depth about two web vulnerabilities: XSS and CSRF. First we discuss how ...
My quest for (privileged) identity to own your domain Nir Yosha Many solutions offer a variety of features that help combat against credential stealing malware, but ...
Game Theory for Hackers - Lessons Learned Studying Economics out of Spite Lindsay Von Tish In this presentation we will discuss game theory and its applications to cyber security. Game ...
RATs Without Borders - Moving Your Cheese Robert Neel Antivirus solutions continue to fail us. This talk will highlight my research of the effectiveness ...
Working for a Living Keli Hay In this talk, Keli will share her journey to a healthier lifestyle which saw her ...
A Standards-Based Approach to Assessing Your Organization's Cybersecurity Maturity Josh Polimeni We were tasked with creating a roadmap for the National Instruments Information Security Program. While ...
Attacking API Microservices Tony Lauro When security teams think of securing API calls they commonly focus solely on the consumer ...
An epidemiological approach to creating an information security prevention framework Chelsey Donohoe Public health frameworks use a multi-level tiered approach to describe prevention interventions used with medical ...