BSidesCDMX 2019 July 26, 2019 to July 28, 2019, Mexico City, Mexico

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A Study of Common Security Flaws Found in Mobile Banking Applications Parampreet Sekhon A study conducted by analyst firm Aite Group examined the protective capabilities of 30 different ...
Criminal Inteligence, TRAME Protocols attacks and shutdown. Michael Hudson Little is currently known about the TRAME protocols, their interaction in SCADA and their failures ...
Back to Basics Francisco Salcedo N/A
Atomic Threat Coverage: operationalized ATT&CK Daniil Yugoslavskiy There are plenty decent projects which provide analytics (or functionality) of specific focus (Sigma, Atomic ...
Threat Hunting, beyond just tools Ramiro Pulgar This presentation aims to explain that Threat Hunting is a Procedure that is necessary nowadays ...
Applied Cryptanalysis Fernando Castaneda Gonzalez Based on CTFs, code analysis assesments and penetration testing, I can tell that Cryptography has ...
The art of the hunt Iván González HSBC’s Global Cyber Intelligence and Threat Analysis team will present their unique methods for identifying ...
Threat Hunting on the Enterprise with Winlogbeat, Sysmon and ELK Rafael Bernal While threat prevention is an important step to reduce the security risk on the organizations, ...
Investigating BIOS/UEFI Malware Implants Roberto Martinez In this talk I’m going to present the different types of UEFI/BIOS attacks and how ...
Tezcatlipoca: Herramienta de simulación de adversarios Julio Lopez Hernandez Se trata de una herramienta de simulación de adversarios, basada en la automatización de la ...
Hey Generacion Z! Han escuchado de Salinas? La RAT mas grande que jamas haya existido... en un Automovil Daniel Ragalado Hoy en día, cualquier automóvil reciente de hasta 5 años de antigüedad viene con algo ...
Software exploting, desde lo ¿viejo? a lo ¿nuevo? Carlos Campos En este taller los asistentes aprenderán 2 técnicas de explotación de aplicaciones, SQLi lo viejo ...
Web Vulnerabilities and Secure Programming Ana Sada Many vulnerabilities exist in web services, mainly because unsafe coding. We’ll talk about the importance ...
Cloud machine learning for cybersecurity Hugo Gonzalez En este taller se ofrecera una MUY breve introduccion a machine learning y data science ...
Incident Response (region4) - Analizando campañas en México Ricardo Park During an incident investigation, our CIR team managed to detect TTP used by the clop ...
The IoT (R)evolution : from software to (firm)ware Martin Hron We’re living in an era of revolution when our homes and offices are being slowly ...
OSINT, Inteligencia y criminalística. Cazando al "Monstruo de Ecatepec". Hedeky ¿Y si pudiéramos utilizar la tecnología a nuestro favor para localizar a los delincuentes? Mi ...
Blue is the new sexy: Practical tips & tricks on how to create a blue team and threat hunting capability Victor Gomez , Log Attending! How to build a cybersecurity team? There is not a bulletproof recipe about it, however, ...
Mature, Secure and Vulnerable. Hackers still hold your privacy in their hands Sergey Puzankov Mobile operators understand the SS7 security problem and protect signaling networks. We have found out ...
Breaking Smart [Bank] Statements Manuel Nader Explanation of how I find and exploit a security flaw (bad implementation of cryptography) in ...