BSidesChicago 2019 Nov. 9, 2019 to Nov. 9, 2019, Chicago, United States
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer | Tigran Terpandjian | I will provide a framework to allow for individuals on social engineering engagements to understand, ... | |
Dark Web Review - a Deep Dive into a Dark World | Alex Holden | In this uncensored view of the Dark Web and Hackers we will see how their ... | |
Socially Engineering Your Pathway to a Better Team | Olivia Liddell | In this session, you will learn how to take a social engineering approach towards improving ... | |
KingMiner - The New and Improved CryptoJacker | Adi Ikan | KingMiner is an example of evolving Crypto-Mining malware that can bypass common detection and emulation ... | |
Threat Emulation - Making your red team operations adversary focused | Matt Kelly | Red Teams are frequently tasked with emulating threat actors, but rarely does this go beyond ... | |
Demystifying the Threat Model, Making It Real | Alyssa Miller | Threat modeling, for many, remains an ethereal concept they only loosely understand. Despite attempts to ... | |
Airplane Mode: Cybersecurity @ 30,000+ Feet | Olivia Stella | Imagine being in charge of a system where you own the product. You do not ... | |
Are Defenders Focused On The Wrong Thing? | Rene Kolga | Today there is no organization out there that doesn’t have firewalls and antivirus deployed throughout ... | |
The Power of sIDHistory and DCShadow! | Adam Perez | So, you swiped domain admin credentials and want to maintain persistence without getting caught like ... | |
How to Fix the Diversity Gap in Cybersecurity | Chloé Messdaghi | Women make up just 11 percent and minorities are slightly less than 12 percent of ... | |
Game Theory For Hackers - Analyzing Strategy and Choices | Lindsay Von Tish | Game Theory is the study of choices and strategy made in competition. It has been ... | |
What you know, what you have and what you are: MFA in the modern age | Erich Kron | A simple username and password are not enough to protect accounts and vital assets anymore. ... | |
Data Access Rights Exploits Under New Privacy Laws | Amber Welch | New privacy laws have advanced individual data rights, although the ability to request access to ... | |
Threat Intel For The Win! | Xena Olsen | Winning everyday at threat intel is not an easy thing to do! There are many ... | |
FOMO…ROAD TO BURNOUT | Suzanne Pereira | FOMO is the Fear of Missing Out. This fear is leading many of us to ... | |
Build a Cyber Secure Culture (or, how to hack your company culture) | Pam Petzold | Traditional methods of once-a-year training don’t go far enough to get employees thinking about security ... | |
Introduction to Security and Machine Learning | Wendy Edwards | We present a general introduction to machine learning concepts and discuss security-specific applications. One of ... | |
The Ghost and the Darkness: Big Game Hunting With EDR | Dan Banker | How do you find an attacker that has gained access to your system and is ... | |
The Hacker Hippocampus: Meet your brain on games | Chloé Messdaghi | Always on the edge of your seat when it comes to new exploits and tricks. ... | |
PEPA - A Provisioning Tool for Cheaper, Faster Engagements | Trevor Cohen | When doing white box pen testing gathering credentials for applications wastes time , resources, and ... | |
The Bottom of the Barrel - Scraping Pastebin for Obfuscated Malware | Patrick Colford | Started in 2002, pastebin.com has become the largest service of its kind in the world, ... | |
Core and Advanced SOC services | Rodd Durrer | What are the necessary and advanced security operations services and how to make them successful. | |
Honeypots and Real Threat Intel | Kat Fitzgerald | Some call them Honeypots, these days the new buzzword is Deception Tech. Whatever you want ... | |
You Can't Tell Me How to Do my Job You're Not My Boss | Matt | Security in the enterprise is a nebulous concept. Don’t click on suspicious emails, we say. ... |