BSidesColumbus 2020 Aug. 21, 2020 to Aug. 21, 2020, Virtual, virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote 1 | Ben Johnson | N/A | |
PowerShell pew pew pew: skilz 4 blue team | Ashley Mcglone | Tired of the red team taking your lunch money with commodity PowerShell-based attacks? Learn how ... | |
Hunt like You Mean It | Brandon George | Strengthening your security posture doesn't end at monitoring. Your SIEMs and EDR solutions are generally ... | |
Lend me your IR’s! | Matt Scheurer | Have you ever felt compelled to tip your cap to a malicious threat actor? Protecting ... | |
Using Threat Modeling to Harden Your Identity Infrastructure | Jerod Brennen | How many “compliant” organizations have suffered a publicly disclosed data breach? While compliance can be ... | |
There's No Place like (DUAL)Homed | David Young | In this talk we will venture down the yellow brick road of bypassing dual homed ... | |
What You're Doing Wrong With Your Defense and How to Fix | Roger A. Grimes | Imagine two armies, one good and one evil, fighting a long war. The bad army ... | |
Data Protection That Goes Where Your Data Goes | Rick Troth | Data protection and breach defense are essential for today's connected enterprise. But there are often ... | |
Top Identity & Access Management Standards & Protocols that You Should Absolutely Know for 2020 | Ingy Youssef | A new year, a new you, very true! but probably you're also bringing along last ... | |
Flex Seal your CI/CD Pipeline | Ochaun Marshall | Continuous Delivery is the heart of DevOps. Web applications, APIs and Microservices are now designed ... | |
Hack for Show, Report for Dough | Brian (bb) King | The fun part of pentesting is the hacking. But the part that makes it a ... | |
Designing the Path Forward: Security Awareness for the Indifferent Workforce | Rose Songer | An organization may have a robust Security Program, but all it takes is the click ... | |
Confessions of a Disaster Recovery Padawan | Matt Fisher | This is not your Grandpa's Disaster Recovery (DR) program. Describing the successful evolution of a ... | |
Patch Management...It Ain't Brain Surgery | Joe Comyns | A formalized Patch Management (PM) process makes Cybersecurity activities easier.In my 20 years of patching ... | |
What is the Ohio Cyber Reserve | Bob Pardee | On October 25, 2019, Ohio Governor Mike DeWine signed legislation which forms the Ohio Cyber ... | |
If I Were to Michael Bay The Plant, This Is How I Would Do It! | Chris Raiter | One of the challenges with industrial asset owners is getting them to think like an ... | |
Cyber Defense In The Modern Org: 6 Low-Cost Tips To Secure Your Organization | Erich Kron | Cybersecurity is often expensive, time-consuming and can have catastrophic consequences if done wrong. From scams ... | |
Panel: Columbus Startups - A security perspective | Brendan O'Connor , Jesse Throwe , Shawn Sines | This panel will be security decision makers at several Columbus area technology startups. |