BSidesTampa 2020 Feb. 29, 2020 to Feb. 29, 2020, Tampa, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: From the NSA to Wall Street: A Cyber-security career journey Rachel Wilson N/A
How does blockchain secure Alice and Bob Mila Paul We keep hearing about how secure Blockchain is but why is it? Why is Blockchain ...
Cyber security, compliance and changing the tone Mike Orenchuk Mike Orenchuk, former CIO of GuideWell Source, and executive at Blue Cross Blue Shield of ...
Technical debt and tears: Attacking and defending AI Nathan Hamiel You can't go anywhere these days without being bombarded with the initials A.I. The marketing ...
IoT vulnerabilities in Tampa Bay 2019 Filip Chytrý Possible live demonstration of device hacking using some of the latest vulnerabilities and devices. We ...
IoT Device Security (Honeypots) Kat Fitzgerald You've heard of IoT Security and probably even sat through a talk or two. This ...
Critical Infrastructure: The future impact of Industry 4.0 on the Security of Healthcare Ashley Enkhtaivan As technology advances and becomes more integrated into health care, more data is collected. How ...
Turn down for RaaS: Seperating hype from reality in the ransomware as a service market Allan Liska Starting in mid-2018 and continuing through 2019 there has been an explosion in ransomware attacks. ...
A DevSecOps approach to bringing security beyond the security team Julien Vehent What if operations teams defended their perimeters perfectly? What if developers always implemented the best ...
RF for Red Team Modern Day Vandals David Switzer This would be an overview of RF related detections / monitoring and attacks. This would ...
The Ethics of Data Collection Vanessa Ferguson The financial and reputational harms associated with data breaches or unauthorized disclosures of consumers information ...
Practical crypto review for developers David Dillard Cryptography is hard. It's hard because there are often a number of mistakes a developer ...
Cloud Security Alliance Shift Left Karen Gispanski Shift Left on Cloud Security Organizations have adopted cloud computing to benefit from the promise ...
Automating Security Compliance at Scale Ravi Devineni Information security and compliance are becoming critical to businesses, especially after the Equifax breach. Financial ...
GRC in the Cloud Michael Dereg Joint presentation on GRC in the cloud and how effective and secure solutions can be ...
Cloudy with a Chance of Adversaries: Common Mistakes in Cloud Security Michael Melone Migrating services to the cloud can provide a wealth of security benefits – if done ...
Security on Cloud 9 Justin M. Leapline Using cloud service providers has been a growing trend over the years, as most companies ...
Controlling the Rain in Cloud Robert Carvajal The cloud is our new reality and the traditional security perimeter is gone. Our job ...
Losing our reality: Understanding and combating the deep fake threat Alyssa Miller As a result of continuing advancements in AI, deep fake media has become increasingly convincing ...
Network gravity: Exploring a enterprise network Casey Martin Enterprise networks are often complex, hard to understand, and worst of all - undocumented. Few ...
Post Quantum Crypto Jeremy Rasmussen Quantum computing allows complex problems to be solved exponentially quicker than what is currently available ...
OWASP SAMM Hardik Parekh OWASP SAMM (https://owaspsamm.org) is the prime maturity model for software assurance that provides an effective ...
Stopping Cyberboom : Mitigating User error Ira Winkler The most devastating attacks predominantly begin with some form of user action. A user clicks ...
Broken Arrow Will Baggett Friends and family often look us as members of the InfoSec community for guidance. "Fix ...
Offensive Python for PenTester Joff Felch This talk will focus on the many different ways that a penetration tester, or Red ...
HTTP Covert channel using only HTML/CSS William E. Johnson A covert channel is a secretive communication channel that can bypass traditional security measures. They ...
Breaking NBAD and UEBA detection Charles Herring Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) are heralded as ...
How to ARM yourself Derek May Youre on your first physical pentest, you've gained access to the data center, now what ...
Is that a WiFi sniffer in your pocket? Jacob Baines Wardriving and warwalking have long been a favorite pastime of hackers. But the concerned stares ...
Extracting an ELF from an ESP32 Chris Miles The Espressif ESP32 is a system on a chip (SoC) engineered for mobile devices, wearable ...
IT 2020 Talent Trends - The Six Trends Sallie Wright The ware for talent is here, and organizations are losing the battle. With IT unemployment ...
21st Century CISO Larry Whiteside Debunking the fiction versus reality of the CISO role.
So you want to be a CISO!? Dave Summit A recent ISC2 survey stated that 65% of Cyber security professionals struggle to define their ...
Optimizing Security Operations John Burger Barely a few decades old, the information security profession is nascent when compared to many ...
CISO Panel Peter Jr. A panel discussion which invites you to learn how the role of Chief Information Security ...
Using Bro/Zeek Data for IR and Threat Hunting Alex Kirk The open source Zeek network security monitor provides valuable data for incident responders and threat ...
Cyber Defense In The Modern Org: 6 Low-Cost Tips To Secure Your Organization Erich Kron Cybersecurity is often expensive, time-consuming and can have catastrophic consequences if done wrong. From scams ...
Tracking the Online Harassment Chain Nikita Brown The concepts of the kill chain and the deception chain are well known in information ...
Designing a 3rd party Risk Management Program Gideon Rasmussen Provides practical advice to design a TPRM program. Details the end-to-end process: identify, risk rank, ...
Mobile Application Security - What you need to know? Anshu Gupta As users move to the world of Mobile Apps, it becomes important to understand the ...
Dude, Where's My Log? The Unknown Logging Gaps in Your Environment, Why You Didn't Detect that Pentest, and What to Do About It Kevin Kaminski Failure to log everything needed for maximum visibility in your environment can leave huge gaps ...
Closing Keynote: Attacking the data before the decision Rhett Greenhagen N/A