BSidesMinneapolis 2019 Sept. 26, 2019 to Sept. 26, 2019, Minneapolis, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Purple yourself Tim Medin Top red teamers are good at defense. The best blue teamers know offense. To up ...
Reflections on Subjective Reputation Ben April Subjective reputation is a staple of our industry. Lists of “good” or “bad” indicators are ...
Encrypted Things - Network Detection & Response in an Encrypted World Patrick Biehle There has been tremendous growth in the percentage of network traffic that is encrypted over ...
Physical Security, Try Not to Get Covered in Poo! Dan Mcinerney In this talk I will explain the 3 techniques that will apply to 90% of ...
Things I forgot to do before migrating to the cloud James Ringold Whether it’s productivity applications, infrastructure, or platform migrations, security teams are often caught catching up ...
Hack for Show, Report for Dough Bbking The fun part of pentesting is the hacking, clearly. But the part that makes it ...
Dear younger Self, Suck Less Kyle Hendrickson This is the presentation that I would have given myself 10 years ago.Every day we ...
Adversarial Machine Learning, A Concept in CAPTCHA Breaking Josh Fu Artificial Intelligence (AI) technology as we know it is neither good nor bad. But it ...
Assumed Breach: A Better Model for Penetration Testing Mike Saunders The current model for penetration testing is broken. The typical scan and exploit model don’t ...
Harvesting Botnets for Unusual Data Alex Holden After reviewing over 10 billion botnets records, a lot of unusual records come to mind.Unlike ...
Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys Joshua Streiff The Internet of Things (IoT) is a phenomenon which has penetrated the global market in ...
Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer Tigran Terpanddjian As a security analyst with an atypical entry into the information security world, one of ...
Rogue Device Mitigation Yossi Appleboum From the doctored motherboard chips on our servers that have been corrupted along the supply ...
Short links: Security blown to bits Matt Findlay We encounter short links daily.Many platforms allow us to shorten URLs—making them easier and cleaner.While ...
Powering Up Incident Response with Power-Response Drew Schmitt Power-Response is an open source incident response framework that I developed with a few pals.We ...
The Hacker Hippocampus: Meet your brain on games Chloe Messdagi Always on the edge of your seat when it comes to new exploits and tricks. ...
One Hundred Red Team Operations A Year Ryan O’horo Target’s internal Red Team executes operations with a very high frequency, and extracts enormous value ...
Can You Hear Me? Jessica Schalz As organizations adopt DevSecOps, security professionals interact more and more with pure development teams.If you’ve ...
How to Persuade Humans by the Ways Humans Like to be Persuaded Jason Blanchard In less than 30 minutes, you’ll smile, nod in agreement, be amazed, become incredibly self-aware ...
Scaling OpenVAS Beyond 10,000 Nodes Tinker Fairy Unfortunately, it’s got some performance challenges in large environments.I’ll show how I investigated OpenVAS performance ...
The Cloud Attack Surface - Laughing at the OSI Model Kat Traxler Security Professionals are comfortable reasoning about the security posture of systems within the framework of ...
Elevate your Tenable/Nessus Pro game to the next level Gabe Schwartz You can’t always choose the tools you work with. Not a vendor talk, just working ...
5G: Security Pitfalls and Considerations Swapnil Deshmukh 5G networks leverages modern technological paradigm such as software define networking (SDN) and network functions ...
Modern Password Cracking as a Methodology Joshua Platz Come and witness the world’s fastest password cracking solution. With new research performed, and a ...