BSidesSATX 2020 July 11, 2020 to July 11, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cons and Careers Steven Bernstein “If you compete with others, you may not win. If you compete with yourself, you ...
I had no idea what I was doing, but now you do Aaron Rubesh My transition from just enjoying computers, hobby hacking, to formal education and to full time ...
The World’s Prettiest (fake) Cyber Warfare Ops Center - and How I Built It Nilo Mackey In collaboration with the San Antonio Museum of Science and Technology (SAMSAT) and the Institute ...
Breaking Down Walls with Windows Alexander Klepal Kali Linux, Black Arch, ParrotOS... Microsoft Windows? Taking penetration testing and red teaming to places ...
Deep dive into cloud DevOps through Infrastructure as Code Jay Chen While infrastructure as code (IaC) offers a systematic way to build datacenter and enforce standards ...
Threat Intelligence: How to Focus Fire on the Bad Guys Coming for Your Network Kyle Hubert Defense teams have an extremely difficult task: protect their organization from all malicious actors, 24/7. ...
Can we put an entire small business infrastructure in one physical box at home? Let's find out Bashar Shamma N/A
Mentoring 101 Ell Marquez Ever been a Daniel in need of a Mr. Myagi? Are you ready to achieve ...
Broken Arrow Will Baggett I discuss how the BSides community can apply InfoSec and forensic practices to assist domestic ...
Climbing App Sec Mountains (and how to summit) Adam Schaal AppSec teams are often told to "shift left", or to be involved earlier in the ...
Agile Compliance and Risk Ops Mark Peters Many companies adopt DevOps or Agile practices only to crash against compliance walls such as ...
Modern Symmetric Encryption Carl Mehner Encryption has significantly changed over the past 20 years but most examples in textbooks and ...
Fighting the Third Party Risk Monster Tonyh This talk will cover the main threats third parties such as vendors bring to your ...
Incident Response is HARRRRRD… but it doesn’t have to be Michael Gough So your EDR, AV, or other fancy shiny blinky lights security tools alerted you that ...
Tradecraft vs. Toolkit: Who’s Truly Important and What’s Actually to Blame? Logan "wall-e" Waldenville I've seen the impact of failing to make people skilled in the art of security, ...
Software Supply Chain Attacks and You Dan Lorenc Open source is under attack, and you are too. Software supply chain attacks are getting ...
Panel: What Does It Take to Find a Job These Days? Kirsten Renner , Rachel Bozeman , Lisa Gregg , Lones B. Seiber Job search is always a bewildering endeavor. According to the Department of Labor, most professionals ...
Where to go next in your cybersecurity career? Advice for Transition Military Community Members Bob Wheeler There’s no shortage of advice out there for transitioning veteran job seekers – unfortunately much ...
Changing Employers? - When, why and how Paul Guido Are you changing employers? Are you thinking about changing employers? Why would you make the ...
Putting Out the Fire: 4 Proven Strategies for Hiring and Retaining Security Talent Frank Mcclain As an industry, we have a Layer 8 problem, and it's our own fault! We ...
Infosec Jobsearch Best Practices Kirsten Renner From grossly impossible job posts to ghosting recruiters, our community full of smart people find ...
The Pentester Blueprint: A Guide to Becoming a Pentester Phillip Wylie Pentesting is a very popular area of cybersecurity. While there are lots of resources on ...
Leading, Managing and Succeeding Remotely Mike Murray Security has always been a discipline that is amenable to remote work. But even those ...
Automating disk and memory evidence collection in AWS Ryan Tick During an incident, answers are needed quickly. Often this starts with evidence collection and log ...
Automating Binary Deobfuscation Processes: Dynamic Taint Analysis and Symbolic Code Execution Usama Saqib Our talk consists of:- An implementation of a simple 32-bit stack machine which we use ...
Weaponized XSS - Moving Beyond Alert(1) Ray Doyle Alert(1): it's everyone's favorite cross-site scripting (XSS) payload, but that doesn't mean you have to ...
Securing AND Pentesting the Great Spaghetti Monster (k8s) Rnbwkat Oh sure, Kubernetes is the Bomb! But is it secure out-of-the-box? Oh hell no! Let's ...
Automating Attacks Against Google Home Device Provisioning Rodney D. Beede Google Home (and other similar home assistant) devices have an out-of-box provisioning process. The talk ...
Overt Operations | When the Red Team gets in your Face! Matthew Toussain We talk covert operations all the time, but there’s more. What does an advanced red ...
Not my server C2: Using trusted sources for C2 Brandon Gordon I am not saying security is perfect but it is getting better. This requires offensive ...