BSidesNova 2020 March 6, 2020 to March 6, 2020, Arlington, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE | Laura Moy | N/A | |
Weaponizing the Deep Web | Matt Edmondson | There’s a lot of talk about data breaches but not much is discussed about where ... | |
Voight-Kampff for email addresses: Quantifying email address reputation to identify spear-phishing and fraud | Josh Kamdjou | "Is this email address real?" Internet history and age can’t be faked. Legitimate email addresses ... | |
Cybersecurity Merger and Acquisition Due Diligence | Jake Williams | During a merger or acquisition, you get all the assets of the acquired organization, but ... | |
Lies, Deception and Manipulation: Let's talk about Deepfakes | Erich Kron | Digital image and video manipulation has reached a new level of sophistication. From the simple ... | |
Vulnerability Management; Let's talk Vulnerability Chaining | Nikki Robinson | Vulnerability management and remediation is a constant issue for many federal and private sector organizations. ... | |
Democratized Intelligence: Promises and Pitfalls | Mark Shapiro | The advancement of technology and the information environment of the 21st century have lead to ... | |
Lessons from the war zone to the cyber trenches, what leaders need to know | Chris Kubecka | Are you prepared to respond to an epic clash between hackers that turns into a ... | |
Let's Bug Hunt in RouterOS | Jacob Baines | RouterOS is the operating system used by MikroTik routers. These routers run the gamut from ... | |
Turn Down for RaaS: Separating Hype from Reality in the Ransomware as a Service Market | Allan Liska | Starting in mid-2018 and continuing through 2019 there has been an explosion in ransomware attacks. ... | |
Bug Bounty Lifecycle - Extracting the Most From Your Bounties | Sean Poris | We can ingest bugs from our researchers, but how do we derive the most value ... | |
Whoops. I accidently helped start the offensive intel branch of a foreign intel service | David Evenden | When I left the service and the NSA I was offered a job that seemed ... | |
RFCs MUST (are REQUIRED to/SHALL) Want to Have Fun (at Least Once a Year) | Chris Culling | Request for Comments (RFCs) lay the foundation for the Internet and all of its interworking. ... | |
Think Like an Attacker | Matthew Batten | During my time working with SOCs at different organizations, there is one specific issue that ... | |
Cloud Security At Scale: Managing the Chaos | Michael Mccabe | As more businesses and enterprises move into the cloud, there is a lack of knowledge ... | |
Sometimes Vulnerabilities Come Easy: How Some of the Weaknesses In A System Are Just Laying Around Waiting to Be Found | Matt Kafami | Forget searching for security flaws, the organization just handed us a loaded gun…no, really! Come ... | |
Pentesting Methodolgy - Making bits less complicated | Octavio Paguaga | There is a difference between reading and doing. Consider this talk right in the middle, ... | |
What the shell?!?! | Marita Fowler | It’s exhilarating when you get shell, but where do you go from here? This talk ... | |
A Poor Man's Pentest - Automating the Manual | John Hammond | So you have popped a shell, and now you have to deal with the same ... | |
Introduction to Malware Analysis | Shawn Thomas | An introductory view of static and dynamic malware analysis methodologies for investigating suspicious PDFs, Documents, ... | |
How To Get Started as a Metasploit Contributor | Mike Cyr | A tales from the trenches talk which covers building a cheap lab to help make ... | |
Incident Handling & Threat Hunting w/ Security Onion | Tyrone Wilson | In this workshop we’ll discuss how we can use a free and open source tool ... | |
BreakingIntoCybersecurity | Christophe Foulon | With headlines of millions of open cybersecurity positions being unable to be filled in the ... | |
My Failures & Lessons Learned | John Stoner | At Bsides Vegas, I was inspired to give this talk because we need more career ... | |
Career Hacking: Tips and Tricks to Making the Most of your Career | Andy Piazza | At some point in your infosec career, you’ll hit a point of “now what?” You ... | |
Hacking the Technical Interview | Marcelle Lee | Marcelle will provide tips to the audience on how to survive a technical interview and ... | |
Job Hunting with Venn Diagram of Job Vacancy | Michael F. Thompson | Imagine this, you have been job hunting for 3 months, you did all the phone ... | |
Burning Your SOCs: How Burnout Impacts Defense | Emiliy Crose | In security, we try to account for every microscopic technical angle that could be abused ... | |
Solving the InfoSec JobSearch Puzzle | Kirsten Sireci Renner | If finding and landing the best possible job in our industry were easy, our community ... |