BsidesCleveland 2019 June 21, 2019 to June 22, 2019, Cleveland, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote David Kennedy N/A
Eval Villain: Simplifying DOM XSS and JS Reversing Dennis Goodlett JavaScript cruft is growing faster than my ability to read. Since I can't read every ...
Operationalizing the MITRE ATT&CK Framework Robert Olson The MITRE ATT&CK framework is all the rage these days. Many are looking at this ...
The Politics of Cyber Ian Thornton-trump We live in a world of competing nation states, proxies of those states and non-nation ...
Securing the DOM from the Bottom Up Krzysztof Samuel 18 years have passed since Cross-Site Scripting (XSS) became the single most common security problem ...
Markets for Malware Adam Hogan While nation-state actors grab headlines for their sophistication, eCrime actors have been building a wildly ...
Unix: the Other White Meat David Compton As the targets in many penetration tests and red team activities as well as being ...
Data Access Rights Exploits under New Privacy Laws Adam Welch New privacy laws such as the GDPR and CCPA have been great advances for personal ...
Hack for Show, Report for Dough Brian King The fun part of pentesting is the hacking. But the part that makes it a ...
The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive Matthew Gracie There are many sources of threat intelligence out there - so many that it can ...
Automating Windows Kernel Analysis With Symbolic Execution Spencer Mcintyre Symbolic Execution is changing the art of vulnerability research. This talk willdiscuss using the popular ...
Calls to Arms: US Elections Hacking Damian Huising A local penetration tester describes the state of US elections security based upon hands-on experience. ...
Public Partnership Panel for Security Response Jeremy Mio Discussion on volunteer and partnership for civic security response and services.
Incident response on macOS Thomas Reed This talk will provide details about how to do incident response on macOS, which is ...
Early Detection through Deception Jason Nester A discussion on utilizing deceptive principals in enterprise environments with a goal towards tricking adversaries ...
The Overlooked Cyber-Security Risk: 3rd Party Risk Management Rose Songer An entire business can be put at risk with the simple click of a button. ...
Getting youth interested in infosec from a youth's perspective. Tristan Messner Getting the next generation interested in cyber security is very important. There are a lot ...
Closing Keynote Joshua Corman N/A