BSidesChicago 2019 Nov. 9, 2019 to Nov. 9, 2019, Chicago, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer Tigran Terpandjian I will provide a framework to allow for individuals on social engineering engagements to understand, ...
Dark Web Review - a Deep Dive into a Dark World Alex Holden In this uncensored view of the Dark Web and Hackers we will see how their ...
Socially Engineering Your Pathway to a Better Team Olivia Liddell In this session, you will learn how to take a social engineering approach towards improving ...
KingMiner - The New and Improved CryptoJacker Adi Ikan KingMiner is an example of evolving Crypto-Mining malware that can bypass common detection and emulation ...
Threat Emulation - Making your red team operations adversary focused Matt Kelly Red Teams are frequently tasked with emulating threat actors, but rarely does this go beyond ...
Demystifying the Threat Model, Making It Real Alyssa Miller Threat modeling, for many, remains an ethereal concept they only loosely understand. Despite attempts to ...
Airplane Mode: Cybersecurity @ 30,000+ Feet Olivia Stella Imagine being in charge of a system where you own the product. You do not ...
Are Defenders Focused On The Wrong Thing? Rene Kolga Today there is no organization out there that doesn’t have firewalls and antivirus deployed throughout ...
The Power of sIDHistory and DCShadow! Adam Perez So, you swiped domain admin credentials and want to maintain persistence without getting caught like ...
How to Fix the Diversity Gap in Cybersecurity Chloé Messdaghi Women make up just 11 percent and minorities are slightly less than 12 percent of ...
Game Theory For Hackers - Analyzing Strategy and Choices Lindsay Von Tish Game Theory is the study of choices and strategy made in competition. It has been ...
What you know, what you have and what you are: MFA in the modern age Erich Kron A simple username and password are not enough to protect accounts and vital assets anymore. ...
Data Access Rights Exploits Under New Privacy Laws Amber Welch New privacy laws have advanced individual data rights, although the ability to request access to ...
Threat Intel For The Win! Xena Olsen Winning everyday at threat intel is not an easy thing to do! There are many ...
FOMO…ROAD TO BURNOUT Suzanne Pereira FOMO is the Fear of Missing Out. This fear is leading many of us to ...
Build a Cyber Secure Culture (or, how to hack your company culture) Pam Petzold Traditional methods of once-a-year training don’t go far enough to get employees thinking about security ...
Introduction to Security and Machine Learning Wendy Edwards We present a general introduction to machine learning concepts and discuss security-specific applications. One of ...
The Ghost and the Darkness: Big Game Hunting With EDR Dan Banker How do you find an attacker that has gained access to your system and is ...
The Hacker Hippocampus: Meet your brain on games Chloé Messdaghi Always on the edge of your seat when it comes to new exploits and tricks. ...
PEPA - A Provisioning Tool for Cheaper, Faster Engagements Trevor Cohen When doing white box pen testing gathering credentials for applications wastes time , resources, and ...
The Bottom of the Barrel - Scraping Pastebin for Obfuscated Malware Patrick Colford Started in 2002, pastebin.com has become the largest service of its kind in the world, ...
Core and Advanced SOC services Rodd Durrer What are the necessary and advanced security operations services and how to make them successful.
Honeypots and Real Threat Intel Kat Fitzgerald Some call them Honeypots, these days the new buzzword is Deception Tech. Whatever you want ...
You Can't Tell Me How to Do my Job You're Not My Boss Matt Security in the enterprise is a nebulous concept. Don’t click on suspicious emails, we say. ...