BSidesAtlanta 2020 March 27, 2020 to March 28, 2020, Atlanta, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote address Yvette Johnson N/A
How to Use Code Signing to Protect your Critical Software Infrastructure Eddie Glenn Nearly every business today is a software business. Either software is delivered as a product ...
Exploiting OAuth 2.0 and OpenID Connect: Lessons Learned from Bug Bounty Programs Nawwar Kabbani Modern authorization and authentication designs commonly rely on OAuth 2.0 and OpenID Connect (OIDC), and ...
From 0 to red team — what does the red team do and when/why do I need one? Nikolas Behar This talk will discuss what the red team does and the maturity level that an ...
How to build your own SIEM with open source tools and methodologies Nir Yosha Ever asked a vendor for alert rules or techniques to catch the bad guys only ...
Flex Seal your CI/CD Pipeline Ochaun Marshall Continuous Delivery is the heart of DevOps. Web applications, APIs and Microservices are now designed ...
Software Supply Chain Threat Detection Diaspina Doyle Scenario: Recently XYZ Bank received complaints from customers who closed their online account and had ...
The Men Who Never Were: Assessing Ties Between the Samsam Ransomware Campaign and the IRGC Charlie Cullen On November 28th, 2018, the U.S. Justice Department indicted two Iranian nationals for their role ...
Realigning From Chaotic Evil Joe Schottman The talk uses AD&D (Advanced Dungeons and Dragons) as a metaphor for problems created by ...
Conquering the Cloud: Defense-in-Depth Strategies for Amazon Web Services Shane Peden Poor credential management, mis-configuration, and insider threat are the top causes of Cloud Infrastructure data ...
Connecting the Dots, Detecting Threats, and Protecting the Enterprise With Security Onion Wes Lambert Have you ever wanted to know how to use blinky light boxes to hacker-proof your ...
Crypto-Agility: Responding Quickly to Cybersecurity Events Bart Lenaerts Today, organizations rely heavily on TLS and other encryption protocols to protect data inside and ...
Compromising Containers and Clusters Rory Mccune Containers seem to be everywhere these days, from application development pipelines to deployed in massive ...
Manuals for Herding Clouds: Free tools for improved security Eldon Stegall Public cloud providers advertise many things. Increased business flexibility. Lower time to provision. Improved value ...
Automated Web Application and API Discovery and Other Things That Sound Simple but Are Actually Difficult Jeremy Lane Building an application inventory is a critical but often skipped step in many Application Security ...
Cybersecurity Merger and Acquisition Due Diligence Jake Williams During a merger or acquisition, you get all the assets of the acquired organization, but ...
What to expect when you are expecting a pen test Tony Drake Additional content for reviewers (omit from abstract online and in print) This talk has been ...
Diversity in STEM panel Sonia Toson , Kelly Dodson , Marquis Montgomery N/A
Look! There’s a Threat Model in My DevOps Alyssa Miller What if I told you that you can threat model in an Agile or even ...
Serverless Password Cracking or: How I Learned to Stop Worrying and Love AWS Stefan Basden Password cracking by the book is expensive, complicated and difficult to scale. Trying to crack ...
Expose Yourself Without Insecurity: Cloud Breach Patterns Brandon Salazar Cloud providers continue to increase in usage for the next generation of internet services. Dynamic ...
The Hacker Hippocampus: Meet your brain on games Chloé Messdaghi Always on the edge of your seat when it comes to new exploits and tricks. ...
Low Tech & Insecure: Building Healthy Boundaries & Defeating Imposter Syndrome Carlota Sage InfoSec/Cybersecurity is a demanding field, with burnout and imposter syndrome as hot topics right next ...