BSidesWashington 2019 Oct. 25, 2019 to Oct. 25, 2019, Washington, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | N/a | N/A | |
How PKI Can Fix the Robocall Problem | Mark Cooper | There is a new ecosystem underway that will impact everyone, especially the irritated people in ... | |
JARVIS for Code? Meaningful AI Research for Software Reverse Engineering | Evm | There have been many attempts to apply AI methods to software, but reverse engineering remains ... | |
Are you ready to leverage DevSecOps? Get ready and use it for good. | Nicole Schwartz | As a security practitioner, the trend of Agile and DevSecOps is coming. Whether developers or ... | |
Automating Analysis Without Automating the Analyst | Mark Denker | Despite applying more automation than ever before to detection and response operations, organizations continue to ... | |
The APT @home - when the attacker knows your mother's maiden name | Chris Cox | You have a strong password and a unique PIN. You're behind seven proxies and your ... | |
Cyber Threat Intelligence and APT 101 | Ronnie Stoner | This briefing quickly introduces the DoD Cyber Crime Center (DC3) and then gives into a ... | |
Bringing IACD (Integrated Adaptive Cyber Defence) to the Financial Sector | Amar Paul | Current security operations in certain companies involve consumption of a feed of cyber intelligence data ... | |
Malware Behavior Catalog | Desiree Bui-nguyen | The Malware Behavior Catalog (MBC) is a publicly available framework defining behaviors and code characteristics ... | |
Courage from a Zero Day Inside | Mandy Logan | Close calls. Emergency situations. Team failures. 0-day response. We encounter these regularly. We prepare. What ... | |
The journey begins: Preparing for Offensive Security Penetration Testing with Kali (PWK) course for the OSCP | Tony Punturiero | The Offensive Security Certified Professional (OSCP) is one of the most well-recognized and respected certifications ... | |
Social Media OSINT Without the Indigestion | Mark Orlando | By our count, there are 100,000+ security related Twitter accounts, 2000+ blogs, 1000+ conferences/events, 75+ ... | |
PErfidious: Make PE backdooring great again! | Shreyans Devendra Doshi | Until now, the techniques used for backdooring and code injection in PE files have been ... | |
Hands-on Writing Malware in Go | Stuart Mcmurray | Go has turned out to be an excellent language for all sorts of things, notably ... | |
Signing your code the easy way | Oren Novotny | Dive into code signing and learn why you want to be attaching signatures to your ... | |
Using JA3. Asking for a friend? | Justin Warner | The number one question every single network detection person gets asked: how do you deal ... | |
0-day Research Disassembled | David Wells , Chris Lyne , Jimi Sebree | 0-day vulnerability research is a hot topic these days. Adversaries, governments, and researchers all have ... | |
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK | Jackie Yoder | Organizations across the globe are looking for ways to use MITRE ATT&CK TM in their ... | |
Overcoming Workforce Retention and Recruitment Challenges in the Cybersecurity Community | Kathleen Smith | Talented professionals form a fundamental cornerstone of any successful business, but how do we ensure ... | |
Tales from the Firewall | Joe Klein , Nathaniel Davis , Craig Bowser , Shawn Thomas | This four person panel looks at the various aspects of blue team life and tells ... | |
No IOUs with IOT | Bryson Bort | Bryson has a particularly entertaining style that encourages audience participation, so be prepared to be ... | |
Mind the Gap - Managing Insecurity in Enterprise IoT | Cheryl Biswas | IoT is an ever-expanding attack surface about which we have many misconceptions and assumptions but ... | |
What did the SIEM See? | Shawn Presmy | The SIEM, everyone has one, but does anyone really know how to get to most ... | |
Insights for secure API usage in conjunction with security automation and orchestration | Cody Bramlette | Organizations are expanding the use of automation and orchestration in their security operations. An indication ... | |
IAM what IAM and dats what IAM: accounts for everyone! Robots too! | Egdares Futch | Identity and Access Management (IAM) can be used to design and implement defensive policies and ... | |
Looking to the Past to Better Understand Threat Intelligence | John Laycock | Genealogy is a search through your family history. As you progress through your research you ... | |
Offensive PCAP | Stuart Mcmurray | When writing malware, oftentimes we need a bit more flexibility (i.e. sneakiness) than the victim's ... | |
What We Do In The Shadows: "Going Dark" With Consumer Electronics | Tim Kusajtys | Every day we give more and more of ourselves to big companies like Google, Facebook, ... | |
Make Results, Not Models: Applying AI to Cybersecurity in an Intelligent Way | John Dull | The recent rapid growth of artificial intelligence (AI), and especially machine learning (ML), entices many ... | |
Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD | Stephan Borosh | N/A | |
Breaking Through the Boundaries of Cyber Security Job Search Challenges | Kathleen Smith | Take expert control of your cyber security career and embark on the road to success ... |