BSidesSATX 2019 June 8, 2019 to June 8, 2019, San Antonio, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Convergence: An Analytical Deep Dive into Foreign Intelligence Activity in US Based Critical Infrastructure David Evenden A technical overview of foreign intelligence activity in US Based Critical Infrastructure using DHS ECS/E3A ...
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention Jordan Wright As organizations shift to cloud-storage platforms such as Elasticsearch and MongoDB to store data, we've ...
When Refrigerators attack! Defending yourself against rogue appliances Kat Fitzgerald IoT is in the press almost daily. This talk presents 3 abstracts with live examples ...
The Hunter Games: How to find the adversary with EQL Ross Wolf How do you find malicious activity? We often resort to the cliche, “you know it ...
There's no place like 169.254.169.254 - Ab(using) cloud metadata URLs Brennon Thomas Most Information Technology professionals are familiar with the IP addresses 127.0.0.1, but what about 169.254.169.254? ...
GAN & Gone, manipulation of the masses for political and social gains Logan Hicks Usage of automations, big data, data analytics, social engineering, PsyOps, strife, and aggressive debate tactics ...
Breaking and Entering with SDR: Hacking Physical Access Control Systems and Garage Door Openers, or How I Beat Up Wiegand Over VHF/UHF Tim Shelton Opening building doors and garages, cloning key fobs and speaking the PPM/Wiegand language
Booting a PDP-11/70 from Virtual Papertape Paul Guido An investigation into the history of obsolete computer technology can educate everyone on how we ...
Creating an off the shelf implantable computer Doug "c00p3r" Copeland Fast prototyping an implantable computer from off the shelf parts, there are two phases to ...
How To Train Your Customers: Changing the Course of Support Brandon Marquez Every support team has their horror stories, but what if there was a way to ...
Audit Compliance != Secure Victoria St John Talking about breaches that have occurred for companies that passed compliance. Offering key points when ...
Intro to Reverse Engineering with Ghidra: Taming the Dragon Christopher Doege The advent of Ghidra has lowered the bar in terms of price and skill gap ...
Game Theory For Hackers Lindsay Von Tish In this presentation we will discuss game theory and its applications to cyber security. Game ...
#1LinuxThingADay: Everyday Linux Use Cases Roxy Dee Have you ever wondered what exactly you would do with Linux? After discovering that she ...
Real-world attacks against Rackspace Rodney D. Beede A review of real-world attacks we see every week at Rackspace against us or our ...
Confessions of a Recovering Linux Admin Ell Barnes Many of us in the technical community have heard the saying RTFM (Read The [Friendly] ...
Creating an Effective Security Posture Dominique Pizzie I want to focus on knowing what to focus on. Stepping back, getting a lay ...
A 'Radiography' of the [In]Security of PACS & DICOM Systems Carlos Avila At this point, no one is surprised when you visit a doctor and complete your ...
The Gogol Project; Lessons Learned Building My First CTF Robert Wilson I tend to learn best when I have a definite goal and an opportunity to ...
Virtualization Automation with Ansible Alexander Klepal Are you an ESXi pro? You’ll learn some new tricks! Never launched a VM before? ...
The 5 Laws of Librarianship in your Intel Operation Tim Gallo Building an intelligence repository often
5G: Security Pitfalls and Considerations Swapnil Deshmukh 5G networks leverages modern technological paradigm such as software define networking (SDN) and network functions ...
Challenged by Your Job Search? So Are We All! Learn Key Job Search Tips Kathleen Smith In a recent survey, more that 45% of the community said that they did not ...
Recruiter Panel: Everything You Wanted to Know About a Recruiter, But Were Afraid to Ask N/a It is a full-time job finding your next job, but we all don’t have that ...
Starting A Cybersecurity Career: Which role should you pursue? Roxy Dee Are you considering a career as a Cybersecurity professional? Let’s explore the different branches of ...
How Neurodiversity can be Leveraged for an Excellent ROI Megan Roddie While the cybersecurity industry talks about a skills shortage and the struggle to fill the ...
Get More Than a Tshirt from Your Community Volunteering Kathleen Smith Community volunteering provides career development opportunities, and offers substantial benefits spanning personal fulfillment and career ...
Hacker MBA: Soft Skills for Hackers Qasim Ijaz The Hacker MBA is drilled down version of the what I've learned through my MBA ...
Talking to lawyers (without catching a case), or, "Counsel advises..." Bill Weiss , Suchi Nichols Getting involved in a legal investigation can be an interesting experience or a nightmare mattering ...