BSidesAtlanta 2019 May 4, 2019 to May 4, 2019, Atlanta, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - Software-Defined Everything, and What That Means to Security Dave Shackleford What do security teams need to know about software-defined infrastructure, and new capabilities we may ...
Incident Response for the Overwhelmed, Understaffed and Unprepared Tony Drake The IR consultants always say the same thing about incident response "Have a Plan, Follow ...
The Sound of Evil - An exploration of the audio security landscape Wes Widner Voice assistants are popping up everywhere. Many wonder and worry whether we are voluntarily wire ...
Hackers, Hooligans, Heists, & History Brian Contos This presentation is based on 20+ years in cybersecurity working across 50+ countries. It will ...
Hudson Bush: Too Small to Fail: Securing Small and Medium Businesses Hudson Bush Small businesses are often overlooked when it comes to mature Security Operations. In fact, some ...
How to create a Compliance baseline and simplify compliance forever Jason Hill It seems there is a never-ending stream of acronyms that businesses now must learn and ...
Continuous Monitoring on a Budget: OpenWRT, Python, Documented Analytic Tradecraft, and the Cloud Ryan Wilson Continuous monitoring sounds intimidating, needing fancy and expensive sensors and software (hardware network taps? SIEM? ...
Social Forensication: A Multidisciplinary Approach to Successful Social Engineering Joe Gray This presentation outlines a new twist on an existing social engineering attack. In the past, ...
Under the skin: Privacy engineering of medical devices Vishruta Rudresh "Connected Medical Devices (CMDs) help sustain lives, monitor vital signs, improve medical adherence, and offer ...
Blocks and Chains - Realities of Blockchain in the Enterprise Michael Anton This presentation will discuss the impact of Blockchain, or digital ledgers, on the enterprise. Blockchain ...
Agile Security for Modern Threats Nathan Hamiel "Agility isn’t a concept reserved for development teams pushing code into production every couple of ...
Mobile App Vulnerabilities – The Bad, The Worse And The Ugly Ray Kelly One of today’s hottest targets for hackers is mobile applications. Whether its developer inexperience, rush ...
Preparing for your Cybersecurity Career Ben Knowles Every organisation has security problems -- whether they know it or not. Talented and committed ...
IOC's: Indicators of Crap Xavier Ashe You should be looking at Indicators of Compromise!” exclaims your CISO, regulator, vendor and mom. ...
Data Access Rights Exploits under New Privacy Laws Amber Welch New privacy laws have advanced individual data rights, although the ability to request access to ...
Cyberstalking - A Privacy Issue Ismaelle Vixsama Social media platforms have become an integral part of our normal interactions and in some ...
Alexa Knows My Kids Better Than I Do Wes Lambert "Hey, Alexa! What should I get Billy for his birthday?". It seems absurd, but it's ...