BSidesWashington 2019 Oct. 25, 2019 to Oct. 25, 2019, Washington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote N/a N/A
How PKI Can Fix the Robocall Problem Mark Cooper There is a new ecosystem underway that will impact everyone, especially the irritated people in ...
JARVIS for Code? Meaningful AI Research for Software Reverse Engineering Evm There have been many attempts to apply AI methods to software, but reverse engineering remains ...
Are you ready to leverage DevSecOps? Get ready and use it for good. Nicole Schwartz As a security practitioner, the trend of Agile and DevSecOps is coming. Whether developers or ...
Automating Analysis Without Automating the Analyst Mark Denker Despite applying more automation than ever before to detection and response operations, organizations continue to ...
The APT @home - when the attacker knows your mother's maiden name Chris Cox You have a strong password and a unique PIN. You're behind seven proxies and your ...
Cyber Threat Intelligence and APT 101 Ronnie Stoner This briefing quickly introduces the DoD Cyber Crime Center (DC3) and then gives into a ...
Bringing IACD (Integrated Adaptive Cyber Defence) to the Financial Sector Amar Paul Current security operations in certain companies involve consumption of a feed of cyber intelligence data ...
Malware Behavior Catalog Desiree Bui-nguyen The Malware Behavior Catalog (MBC) is a publicly available framework defining behaviors and code characteristics ...
Courage from a Zero Day Inside Mandy Logan Close calls. Emergency situations. Team failures. 0-day response. We encounter these regularly. We prepare. What ...
The journey begins: Preparing for Offensive Security Penetration Testing with Kali (PWK) course for the OSCP Tony Punturiero The Offensive Security Certified Professional (OSCP) is one of the most well-recognized and respected certifications ...
Social Media OSINT Without the Indigestion Mark Orlando By our count, there are 100,000+ security related Twitter accounts, 2000+ blogs, 1000+ conferences/events, 75+ ...
PErfidious: Make PE backdooring great again! Shreyans Devendra Doshi Until now, the techniques used for backdooring and code injection in PE files have been ...
Hands-on Writing Malware in Go Stuart Mcmurray Go has turned out to be an excellent language for all sorts of things, notably ...
Signing your code the easy way Oren Novotny Dive into code signing and learn why you want to be attaching signatures to your ...
Using JA3. Asking for a friend? Justin Warner The number one question every single network detection person gets asked: how do you deal ...
0-day Research Disassembled David Wells , Chris Lyne , Jimi Sebree 0-day vulnerability research is a hot topic these days. Adversaries, governments, and researchers all have ...
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK Jackie Yoder Organizations across the globe are looking for ways to use MITRE ATT&CK TM in their ...
Overcoming Workforce Retention and Recruitment Challenges in the Cybersecurity Community Kathleen Smith Talented professionals form a fundamental cornerstone of any successful business, but how do we ensure ...
Tales from the Firewall Joe Klein , Nathaniel Davis , Craig Bowser , Shawn Thomas This four person panel looks at the various aspects of blue team life and tells ...
No IOUs with IOT Bryson Bort Bryson has a particularly entertaining style that encourages audience participation, so be prepared to be ...
Mind the Gap - Managing Insecurity in Enterprise IoT Cheryl Biswas IoT is an ever-expanding attack surface about which we have many misconceptions and assumptions but ...
What did the SIEM See? Shawn Presmy The SIEM, everyone has one, but does anyone really know how to get to most ...
Insights for secure API usage in conjunction with security automation and orchestration Cody Bramlette Organizations are expanding the use of automation and orchestration in their security operations. An indication ...
IAM what IAM and dats what IAM: accounts for everyone! Robots too! Egdares Futch Identity and Access Management (IAM) can be used to design and implement defensive policies and ...
Looking to the Past to Better Understand Threat Intelligence John Laycock Genealogy is a search through your family history. As you progress through your research you ...
Offensive PCAP Stuart Mcmurray When writing malware, oftentimes we need a bit more flexibility (i.e. sneakiness) than the victim's ...
What We Do In The Shadows: "Going Dark" With Consumer Electronics Tim Kusajtys Every day we give more and more of ourselves to big companies like Google, Facebook, ...
Make Results, Not Models: Applying AI to Cybersecurity in an Intelligent Way John Dull The recent rapid growth of artificial intelligence (AI), and especially machine learning (ML), entices many ...
Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD Stephan Borosh N/A
Breaking Through the Boundaries of Cyber Security Job Search Challenges Kathleen Smith Take expert control of your cyber security career and embark on the road to success ...