BSidesSATX 2020 July 11, 2020 to July 11, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cons and Careers | Steven Bernstein | “If you compete with others, you may not win. If you compete with yourself, you ... | |
I had no idea what I was doing, but now you do | Aaron Rubesh | My transition from just enjoying computers, hobby hacking, to formal education and to full time ... | |
The World’s Prettiest (fake) Cyber Warfare Ops Center - and How I Built It | Nilo Mackey | In collaboration with the San Antonio Museum of Science and Technology (SAMSAT) and the Institute ... | |
Breaking Down Walls with Windows | Alexander Klepal | Kali Linux, Black Arch, ParrotOS... Microsoft Windows? Taking penetration testing and red teaming to places ... | |
Deep dive into cloud DevOps through Infrastructure as Code | Jay Chen | While infrastructure as code (IaC) offers a systematic way to build datacenter and enforce standards ... | |
Threat Intelligence: How to Focus Fire on the Bad Guys Coming for Your Network | Kyle Hubert | Defense teams have an extremely difficult task: protect their organization from all malicious actors, 24/7. ... | |
Can we put an entire small business infrastructure in one physical box at home? Let's find out | Bashar Shamma | N/A | |
Mentoring 101 | Ell Marquez | Ever been a Daniel in need of a Mr. Myagi? Are you ready to achieve ... | |
Broken Arrow | Will Baggett | I discuss how the BSides community can apply InfoSec and forensic practices to assist domestic ... | |
Climbing App Sec Mountains (and how to summit) | Adam Schaal | AppSec teams are often told to "shift left", or to be involved earlier in the ... | |
Agile Compliance and Risk Ops | Mark Peters | Many companies adopt DevOps or Agile practices only to crash against compliance walls such as ... | |
Modern Symmetric Encryption | Carl Mehner | Encryption has significantly changed over the past 20 years but most examples in textbooks and ... | |
Fighting the Third Party Risk Monster | Tonyh | This talk will cover the main threats third parties such as vendors bring to your ... | |
Incident Response is HARRRRRD… but it doesn’t have to be | Michael Gough | So your EDR, AV, or other fancy shiny blinky lights security tools alerted you that ... | |
Tradecraft vs. Toolkit: Who’s Truly Important and What’s Actually to Blame? | Logan "wall-e" Waldenville | I've seen the impact of failing to make people skilled in the art of security, ... | |
Software Supply Chain Attacks and You | Dan Lorenc | Open source is under attack, and you are too. Software supply chain attacks are getting ... | |
Panel: What Does It Take to Find a Job These Days? | Kirsten Renner , Rachel Bozeman , Lisa Gregg , Lones B. Seiber | Job search is always a bewildering endeavor. According to the Department of Labor, most professionals ... | |
Where to go next in your cybersecurity career? Advice for Transition Military Community Members | Bob Wheeler | There’s no shortage of advice out there for transitioning veteran job seekers – unfortunately much ... | |
Changing Employers? - When, why and how | Paul Guido | Are you changing employers? Are you thinking about changing employers? Why would you make the ... | |
Putting Out the Fire: 4 Proven Strategies for Hiring and Retaining Security Talent | Frank Mcclain | As an industry, we have a Layer 8 problem, and it's our own fault! We ... | |
Infosec Jobsearch Best Practices | Kirsten Renner | From grossly impossible job posts to ghosting recruiters, our community full of smart people find ... | |
The Pentester Blueprint: A Guide to Becoming a Pentester | Phillip Wylie | Pentesting is a very popular area of cybersecurity. While there are lots of resources on ... | |
Leading, Managing and Succeeding Remotely | Mike Murray | Security has always been a discipline that is amenable to remote work. But even those ... | |
Automating disk and memory evidence collection in AWS | Ryan Tick | During an incident, answers are needed quickly. Often this starts with evidence collection and log ... | |
Automating Binary Deobfuscation Processes: Dynamic Taint Analysis and Symbolic Code Execution | Usama Saqib | Our talk consists of:- An implementation of a simple 32-bit stack machine which we use ... | |
Weaponized XSS - Moving Beyond Alert(1) | Ray Doyle | Alert(1): it's everyone's favorite cross-site scripting (XSS) payload, but that doesn't mean you have to ... | |
Securing AND Pentesting the Great Spaghetti Monster (k8s) | Rnbwkat | Oh sure, Kubernetes is the Bomb! But is it secure out-of-the-box? Oh hell no! Let's ... | |
Automating Attacks Against Google Home Device Provisioning | Rodney D. Beede | Google Home (and other similar home assistant) devices have an out-of-box provisioning process. The talk ... | |
Overt Operations | When the Red Team gets in your Face! | Matthew Toussain | We talk covert operations all the time, but there’s more. What does an advanced red ... | |
Not my server C2: Using trusted sources for C2 | Brandon Gordon | I am not saying security is perfect but it is getting better. This requires offensive ... |