BSidesHarrisburg 2019 Oct. 2, 2019 to Oct. 2, 2019, Harrisburg, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
My Career’s a Circle: Old Threats Made New, 30 Years of Threat Hunting Revisited Kenneth Bechtel A recap of 30 years of hunting and fighting the malware threat. examining how many ...
Building Your First Malware Analysis Lab Joel Prentice This talk will cover the basics of setting up a malware analysis lab using physical ...
WANTED – People Committed to Solving our Information Security Language Problem Evan Francen Our industry has plenty of problems to solve. The language we use shouldn’t be one ...
How to Get Started as Metasploit Contributor Michael Cyr A tales from the trenches talk which covers building a cheap lab to help make ...
Tools of the Chain: Part 1 Charles Sgrillo Both theory and hands on demos will be used throughout the presentation to provide real ...
Building a Home-Hacking Lab for Testing and Fun James Lloyd I have built and rebuilt many hacking lab setups throughout my career. This talk will ...
Practical Defense in Depth Danny Mardis Join us while we take an in-depth look at several real life case studies of ...
Good Apps, Cheap Nathan Vargas There are many security tools and techniques that can be used to ensure a secure ...
Tools of the Chain: Part 2 Charles Sgrillo Both theory and hands on demos will be used throughout the presentation to provide real ...
The Effect and Future of Machine Learning Technologies on Cyber Security Tools Nathalie Baker In this presentation Nathalie will be deliberating the effect of machine learning technologies on cyber ...
Open Source Intelligence 101: Finding Information on Anyone Rae Baker Rae will introduce Open Source Intelligence (OSINT) and discuss who uses it and why. Then ...
Ransomware Response Justin Klein Keane Ransomware is a particularly pernicious form of attack that’s becoming increasingly common. Ransomware affects organizations ...
Beneath the Surface: Keeping up with Modern Application Security Rushabh Shah With constant technological innovation, it’s more difficult than ever to keep up with a rapidly ...
Hacking Yourself First, Penetration Testing for the Blue Teams: Part 1 Brandon Keath In this fast-paced interactive presentation/workshop Brandon will reveal everything a defender might want to know ...
Is Your Security Team Going Red? Stephen Schneiter Just because you secure your network, it does not mean the network is secure. It ...
Tune Up Your Security Operations Center (SOC) Stanley Hanke Organizations are investing a significant amount of financial resources to strengthen their security posture to ...
Undressing Ping Terrill Frantz In this session we uncover the workings of the ping utility. How exactly does it ...
Hacking Yourself First, Penetration Testing for the Blue Teams: Part 2 Brandon Keath In this fast-paced interactive presentation/workshop Brandon will reveal everything a defender might want to know ...
From the Outside In: What The Internet Knows About Your Digital Footprint Sean W. Smith For large organizations, it can be hard to understand, let alone minimize your digital footprint. ...
Remediate Your Company’s Greatest Vulnerability: Social Engineering Matt Mahoney Social Engineering is a weapon capable of delivering any number of payloads. We must learn ...