BSidesNashville 2019 April 13, 2019 to April 13, 2019, Nashville, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Marcus Carey N/A
Don’t Be THAT Geek – How to communicate with users and management Gigi Gridley Users don’t want to talk to “the IT department” unless they absolutely have to, because ...
Why your red team shouldn’t be snowflakes Isaiah Sarju Red teaming require the use of specialized tools. However, this should not exclude operators from ...
Tell me to push my appsec left one more time: OWASP Proactive Controls David Cybuck It may be true that pushing security left can stop us from developing breakable applications. ...
I Sold Out, You Should Too! Why I left Ops for Sales Engineering and Never Looked Back! Karlo Arozqueta You started in entry level positions, paid your dues, maybe you worked in a 24/7 ...
You Did What In My Bucket? Red Teaming GCP (Google Cloud Platform) Bryce Kunz Cloud services are frequently misconfigured due to their rapid adoption and engineers not fully understanding ...
DevOps Application Security Teams for the Rest of Us Mark Geeslin Is it possible to do AppSec really well in a distributed DevOps environment at scale? ...
Extracting the Attacker: Getting the Bad Guys Off Your SaaS David Branscome The Microsoft Office 365 suite contains many applications that can help organizations do some amazing ...
A Methodology for Testing Tokens John Askew Authentication and authorization are a key element of securing modern web/mobile applications, and most applications ...
What you know, what you have and what you are: MFA in the modern age Erich Kron A simple username and password are not enough to protect accounts and vital assets anymore. ...
Bare-Knuckle Doxxing Casey Bohn An adversarial approach to risk identification and mitigation of an organizations most valuable assets; people. ...
How Can I Become a Pentester Adam Len Compton Stop by and take a seat while I discuss a couple different paths to a ...
Anatomy of a Nation-State Attack Rene Kolga Among key advancements, this new OilRig attack campaign introduced a variety of new command and ...
Att&ck Path Effectiveness Rockie Yocum Mitre's ATT&CK framework has many valuable features and characteristics, including the documentation of known threat ...
Getting Started with Android Malware Analysis Keheira Henderson The Android operating system has been around since 2008 and has also been open source ...
White Collars & Black Hats: Bitcoin, Dark Nets and Insider Trading Ken Westin We know criminal hacking is big business, over the past decade, we have seen criminal ...
Intelligence-Driven Testing with Atomic Red Team Tony Lambert Time is short, resources are spread thin, and you have the responsibility to ensure your ...