BSidesAustin 2019 March 28, 2019 to March 29, 2019, Austin, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Hacking Your Career | Keith Turpin | Many people get so busy doing their jobs that they don't manage their careers. This ... | |
Hot to Fix the Diversity Gap in Cybersecurity | Chloé Messdaghi | Women make up just 11 percent and minorities are slightly less than 12 percent of ... | |
Make Your Organization 10% More Secure | Andrew Hay | What if I told you that approaching security with compassion and mindfulness could help you ... | |
Mentorship 101 | El Marquez | Ever been a Daniel in need of a Mr. Myagi? Are you ready to achieve ... | |
Security Automation Simplified | Moses Schwartz | Incident response is an intense, high stress, high skill job that relies heavily on human ... | |
Using the Chrome Dev Tools Protocol for Pentesting and Bug Hunting | Alex Useche | The Chrome Dev Tools protocol allows us to hook our code to the browser via ... | |
Securing the Technology Supply Chain | Keith Turpin | Supply chains can represent the biggest risk to many organizations. Current data shows that this ... | |
Vulnerability Management: You're doing it wrong | Mauvehed And Digitalgrease | Threat and vulnerability management (TVM) is a core aspect of every information security program. Many ... | |
Spotting Lateral Movement with Endpoint Data | Tony Lambert | Lateral movement is an integral part of adversary movement into and around networks. This functionality ... | |
The Art of Defeating Facial Recognition | Vic Harkness | Privacy is not just an issue of interest to techies. People within the art community ... | |
Taste the Rainbow: Windows 10 Challenges for Red, Blue, and Purple Teams | Andrew Case | Microsoft has added a significant number of features in Windows 10 that affect the types ... | |
Maximal Visibility, Minimal Effort: Getting more value out of your hacking data with MSF 5 | Pearce Barry | Metasploit recently released a major version of the open-source Framework—the first major release since 2011. ... | |
Pitfall : The Art of Productizing osquery | Alex Malone | Facebook's cross-platform osquery agent is increasingly being used by security professionals to monitor assets from ... | |
Unexpected Success: Tips for navigating through security career, certs, and work-life balance | Miriam Levenstein | We share an interest in making the most of our time in the workforce: contributing ... | |
Why your red team shouldn't be special | Isaiah Sarju | Red teaming require the use of specialized tools. However, this should not exclude operators from ... | |
Scantron - A distributed nmap / masscan scanning framework | Brennon Thomas | This talk is for all the nmap lovers out there! Anyone familiar with nmap knows ... | |
The Power of DCShadow | Don Steed | So, you swiped domain admin credentials and want to maintain persistence without getting caught like ... | |
Purple Packets: Effective Network Defense Against Real-World Attacks | Matt Soto | There are two sides to every story. Yin and yang. Day and night. Host and ... | |
And all I got was a T-shirt: How to Leverage Community Volunteering for Career Development | Kathleen Smith | Career progression is typically seen as education, certification, and job moves. However in order to ... | |
Introducing ArTHIR –ATT&CK Remote Threat Hunting Incident Response Windows tool | Michael Gough | ArTHIR is a modular framework that can be used remotely against one, or many target ... | |
Security, Shift Left | Dnyanada Annachhatre | “Shift Left” paradigm to integrate security in early stages of product development life cycle by ... | |
Fooling Machine Learning using Adversarial Examples | William Parks | Adversarial example images appear to be of one class (e.g. dog or car), but are ... | |
KEYNOTE: Hunting attackers inside and outside of your network | John Strand | N/A | |
What do you want to be when you grow up? | Damon "ch3f" Small | Many industries have well-defined points of entry and well-understood education and training requirements. Information Security ... | |
Identify theft through OSINT | Zee Abdelnabi | This talk will demonstrate how easy identity theft has become because of OSINT and the ... | |
Reversing Education | Phillip Wylie | Reversing Education is a method used to create educational content for self-study. In this talk ... | |
How DevOps Tools and Practices can Improve Your Security Operations | Eric Matlock | The term DevOps is a hot buzzword right now. Most of the time when you ... | |
Turning the Tide - Using Criminal’s Stolen Data against Them | Ted Ross | Cyber criminals are constantly upgrading their technology to perform more sophisticated, widespread attacks. Preventing breaches ... | |
Cons & Careers | Sciaticnerd/ Steven Bernstein | “If you compete with others, you may not win. If you compete with yourself, you ... | |
BountyCraft - The Panel | Chloé Messdaghi , Phillip Haddix | Every security tester has some sort of methodology and toolset they use. This "secret sauce" ... | |
Understanding XSS and CSRF | Christina Mitchell | Come learn in depth about two web vulnerabilities: XSS and CSRF. First we discuss how ... | |
My quest for (privileged) identity to own your domain | Nir Yosha | Many solutions offer a variety of features that help combat against credential stealing malware, but ... | |
Game Theory for Hackers - Lessons Learned Studying Economics out of Spite | Lindsay Von Tish | In this presentation we will discuss game theory and its applications to cyber security. Game ... | |
RATs Without Borders - Moving Your Cheese | Robert Neel | Antivirus solutions continue to fail us. This talk will highlight my research of the effectiveness ... | |
Working for a Living | Keli Hay | In this talk, Keli will share her journey to a healthier lifestyle which saw her ... | |
A Standards-Based Approach to Assessing Your Organization's Cybersecurity Maturity | Josh Polimeni | We were tasked with creating a roadmap for the National Instruments Information Security Program. While ... | |
Attacking API Microservices | Tony Lauro | When security teams think of securing API calls they commonly focus solely on the consumer ... | |
An epidemiological approach to creating an information security prevention framework | Chelsey Donohoe | Public health frameworks use a multi-level tiered approach to describe prevention interventions used with medical ... |