BSidesNova 2020 March 6, 2020 to March 6, 2020, Arlington, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE Laura Moy N/A
Weaponizing the Deep Web Matt Edmondson There’s a lot of talk about data breaches but not much is discussed about where ...
Voight-Kampff for email addresses: Quantifying email address reputation to identify spear-phishing and fraud Josh Kamdjou "Is this email address real?" Internet history and age can’t be faked. Legitimate email addresses ...
Cybersecurity Merger and Acquisition Due Diligence Jake Williams During a merger or acquisition, you get all the assets of the acquired organization, but ...
Lies, Deception and Manipulation: Let's talk about Deepfakes Erich Kron Digital image and video manipulation has reached a new level of sophistication. From the simple ...
Vulnerability Management; Let's talk Vulnerability Chaining Nikki Robinson Vulnerability management and remediation is a constant issue for many federal and private sector organizations. ...
Democratized Intelligence: Promises and Pitfalls Mark Shapiro The advancement of technology and the information environment of the 21st century have lead to ...
Lessons from the war zone to the cyber trenches, what leaders need to know Chris Kubecka Are you prepared to respond to an epic clash between hackers that turns into a ...
Let's Bug Hunt in RouterOS Jacob Baines RouterOS is the operating system used by MikroTik routers. These routers run the gamut from ...
Turn Down for RaaS: Separating Hype from Reality in the Ransomware as a Service Market Allan Liska Starting in mid-2018 and continuing through 2019 there has been an explosion in ransomware attacks. ...
Bug Bounty Lifecycle - Extracting the Most From Your Bounties Sean Poris We can ingest bugs from our researchers, but how do we derive the most value ...
Whoops. I accidently helped start the offensive intel branch of a foreign intel service David Evenden When I left the service and the NSA I was offered a job that seemed ...
RFCs MUST (are REQUIRED to/SHALL) Want to Have Fun (at Least Once a Year) Chris Culling Request for Comments (RFCs) lay the foundation for the Internet and all of its interworking. ...
Think Like an Attacker Matthew Batten During my time working with SOCs at different organizations, there is one specific issue that ...
Cloud Security At Scale: Managing the Chaos Michael Mccabe As more businesses and enterprises move into the cloud, there is a lack of knowledge ...
Sometimes Vulnerabilities Come Easy: How Some of the Weaknesses In A System Are Just Laying Around Waiting to Be Found Matt Kafami Forget searching for security flaws, the organization just handed us a loaded gun…no, really! Come ...
Pentesting Methodolgy - Making bits less complicated Octavio Paguaga There is a difference between reading and doing. Consider this talk right in the middle, ...
What the shell?!?! Marita Fowler It’s exhilarating when you get shell, but where do you go from here? This talk ...
A Poor Man's Pentest - Automating the Manual John Hammond So you have popped a shell, and now you have to deal with the same ...
Introduction to Malware Analysis Shawn Thomas An introductory view of static and dynamic malware analysis methodologies for investigating suspicious PDFs, Documents, ...
How To Get Started as a Metasploit Contributor Mike Cyr A tales from the trenches talk which covers building a cheap lab to help make ...
Incident Handling & Threat Hunting w/ Security Onion Tyrone Wilson In this workshop we’ll discuss how we can use a free and open source tool ...
BreakingIntoCybersecurity Christophe Foulon With headlines of millions of open cybersecurity positions being unable to be filled in the ...
My Failures & Lessons Learned John Stoner At Bsides Vegas, I was inspired to give this talk because we need more career ...
Career Hacking: Tips and Tricks to Making the Most of your Career Andy Piazza At some point in your infosec career, you’ll hit a point of “now what?” You ...
Hacking the Technical Interview Marcelle Lee Marcelle will provide tips to the audience on how to survive a technical interview and ...
Job Hunting with Venn Diagram of Job Vacancy Michael F. Thompson Imagine this, you have been job hunting for 3 months, you did all the phone ...
Burning Your SOCs: How Burnout Impacts Defense Emiliy Crose In security, we try to account for every microscopic technical angle that could be abused ...
Solving the InfoSec JobSearch Puzzle Kirsten Sireci Renner If finding and landing the best possible job in our industry were easy, our community ...