BSidesKnoxville 2019 May 3, 2019 to May 3, 2019, Knoxville, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Dear Blue Team: Forensics Advice to Supercharge your DFIR capabilities and timing Joe Gray In an age where data breaches and malware infections are quickly becoming the norm, we ...
Extracting the Attacker: Getting the Bad Guys Off Your SaaS David Branscome The Microsoft Office 365 suite contains many applications that can help organizations do some amazing ...
Investigating IPv6 via UPnP Aleks Nicolic Projects like ZMap and Masscan have made scans of the entire IPv4 Internet very practical ...
The Many Faces of Emotet: Annoyance or Threat? John Helt Emotet has been around for several years. For some it is considered "commodity" malware, while ...
Starting from Scratch: Building a security program from the ground up in 365 days Hudson Bush Scenario: You’ve been put in charge of InfoSec for a business with no existing security ...
The sound of evil Wes Widner Our ears are the original nexus of information security. The environments we're in are constantly ...
UNIX: the Other White Meat David Compton As the targets in many penetration tests and red team activities as well as being ...
Talking Cars: from Can't to CAN Samuel Hollifield Modern vehicles can be incredibly vulnerable to cyber exploitation. Researchers across the world have demonstrated ...
Regions are types, types are policy, and other ramblings Rebecca Semantically related objects often get grouped together in memory, and it is about time we ...
Keynote Simulcast N/a N/A
What Can League of Legends Teach Us About Cybersecurity? Fareedah Shaheed In this talk, I put together two things we don’t often associate with cybersecurity: The ...
Building a Bridge to a Legacy Application - How Hard Can that Be? M. Scott Ford My team loves working on legacy code projects. It's all that we do. That's why ...
Reverse Engineering Small Radios for Compatibility Travis Goodspeed Suppose that you have a small radio, such as a wireless sensor or a digital ...
Beyond the Buzzwords: How Security Can Use Marketing Concepts to Prosper Katherine Teitler Beyond the Buzzwords: How Security Can Use Marketing Concepts to ProsperGiven today’s cybersecurity shortage and ...
The Race to Secure Texas Instruments Graphing Calculators Brandon Wilson Over the years, Texas Instruments graphing calculators have evolved from simple programmable devices with fixed ...
Exploit development for penetration testers Adam Reiser Where is the line between misconfiguration and vulnerability? Red team attacks generally succeed by exploiting ...
Find out what happens when 70 universities and 1000 volunteers participate in a cyber security competition Raymond Borges , Chris Craig , Jeff Nichols This talk will describe the full competition environment and structure, the various ways that this ...