BSidesAtlanta 2020 March 27, 2020 to March 28, 2020, Atlanta, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote address | Yvette Johnson | N/A | |
How to Use Code Signing to Protect your Critical Software Infrastructure | Eddie Glenn | Nearly every business today is a software business. Either software is delivered as a product ... | |
Exploiting OAuth 2.0 and OpenID Connect: Lessons Learned from Bug Bounty Programs | Nawwar Kabbani | Modern authorization and authentication designs commonly rely on OAuth 2.0 and OpenID Connect (OIDC), and ... | |
From 0 to red team — what does the red team do and when/why do I need one? | Nikolas Behar | This talk will discuss what the red team does and the maturity level that an ... | |
How to build your own SIEM with open source tools and methodologies | Nir Yosha | Ever asked a vendor for alert rules or techniques to catch the bad guys only ... | |
Flex Seal your CI/CD Pipeline | Ochaun Marshall | Continuous Delivery is the heart of DevOps. Web applications, APIs and Microservices are now designed ... | |
Software Supply Chain Threat Detection | Diaspina Doyle | Scenario: Recently XYZ Bank received complaints from customers who closed their online account and had ... | |
The Men Who Never Were: Assessing Ties Between the Samsam Ransomware Campaign and the IRGC | Charlie Cullen | On November 28th, 2018, the U.S. Justice Department indicted two Iranian nationals for their role ... | |
Realigning From Chaotic Evil | Joe Schottman | The talk uses AD&D (Advanced Dungeons and Dragons) as a metaphor for problems created by ... | |
Conquering the Cloud: Defense-in-Depth Strategies for Amazon Web Services | Shane Peden | Poor credential management, mis-configuration, and insider threat are the top causes of Cloud Infrastructure data ... | |
Connecting the Dots, Detecting Threats, and Protecting the Enterprise With Security Onion | Wes Lambert | Have you ever wanted to know how to use blinky light boxes to hacker-proof your ... | |
Crypto-Agility: Responding Quickly to Cybersecurity Events | Bart Lenaerts | Today, organizations rely heavily on TLS and other encryption protocols to protect data inside and ... | |
Compromising Containers and Clusters | Rory Mccune | Containers seem to be everywhere these days, from application development pipelines to deployed in massive ... | |
Manuals for Herding Clouds: Free tools for improved security | Eldon Stegall | Public cloud providers advertise many things. Increased business flexibility. Lower time to provision. Improved value ... | |
Automated Web Application and API Discovery and Other Things That Sound Simple but Are Actually Difficult | Jeremy Lane | Building an application inventory is a critical but often skipped step in many Application Security ... | |
Cybersecurity Merger and Acquisition Due Diligence | Jake Williams | During a merger or acquisition, you get all the assets of the acquired organization, but ... | |
What to expect when you are expecting a pen test | Tony Drake | Additional content for reviewers (omit from abstract online and in print) This talk has been ... | |
Diversity in STEM panel | Sonia Toson , Kelly Dodson , Marquis Montgomery | N/A | |
Look! There’s a Threat Model in My DevOps | Alyssa Miller | What if I told you that you can threat model in an Agile or even ... | |
Serverless Password Cracking or: How I Learned to Stop Worrying and Love AWS | Stefan Basden | Password cracking by the book is expensive, complicated and difficult to scale. Trying to crack ... | |
Expose Yourself Without Insecurity: Cloud Breach Patterns | Brandon Salazar | Cloud providers continue to increase in usage for the next generation of internet services. Dynamic ... | |
The Hacker Hippocampus: Meet your brain on games | Chloé Messdaghi | Always on the edge of your seat when it comes to new exploits and tricks. ... | |
Low Tech & Insecure: Building Healthy Boundaries & Defeating Imposter Syndrome | Carlota Sage | InfoSec/Cybersecurity is a demanding field, with burnout and imposter syndrome as hot topics right next ... |