BSidesColumbus 2020 Aug. 21, 2020 to Aug. 21, 2020, Virtual, virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote 1 Ben Johnson N/A
PowerShell pew pew pew: skilz 4 blue team Ashley Mcglone Tired of the red team taking your lunch money with commodity PowerShell-based attacks? Learn how ...
Hunt like You Mean It Brandon George Strengthening your security posture doesn't end at monitoring. Your SIEMs and EDR solutions are generally ...
Lend me your IR’s! Matt Scheurer Have you ever felt compelled to tip your cap to a malicious threat actor? Protecting ...
Using Threat Modeling to Harden Your Identity Infrastructure Jerod Brennen How many “compliant” organizations have suffered a publicly disclosed data breach? While compliance can be ...
There's No Place like (DUAL)Homed David Young In this talk we will venture down the yellow brick road of bypassing dual homed ...
What You're Doing Wrong With Your Defense and How to Fix Roger A. Grimes Imagine two armies, one good and one evil, fighting a long war. The bad army ...
Data Protection That Goes Where Your Data Goes Rick Troth Data protection and breach defense are essential for today's connected enterprise. But there are often ...
Top Identity & Access Management Standards & Protocols that You Should Absolutely Know for 2020 Ingy Youssef A new year, a new you, very true! but probably you're also bringing along last ...
Flex Seal your CI/CD Pipeline Ochaun Marshall Continuous Delivery is the heart of DevOps. Web applications, APIs and Microservices are now designed ...
Hack for Show, Report for Dough Brian (bb) King The fun part of pentesting is the hacking. But the part that makes it a ...
Designing the Path Forward: Security Awareness for the Indifferent Workforce Rose Songer An organization may have a robust Security Program, but all it takes is the click ...
Confessions of a Disaster Recovery Padawan Matt Fisher This is not your Grandpa's Disaster Recovery (DR) program. Describing the successful evolution of a ...
Patch Management...It Ain't Brain Surgery Joe Comyns A formalized Patch Management (PM) process makes Cybersecurity activities easier.In my 20 years of patching ...
What is the Ohio Cyber Reserve Bob Pardee On October 25, 2019, Ohio Governor Mike DeWine signed legislation which forms the Ohio Cyber ...
If I Were to Michael Bay The Plant, This Is How I Would Do It! Chris Raiter One of the challenges with industrial asset owners is getting them to think like an ...
Cyber Defense In The Modern Org: 6 Low-Cost Tips To Secure Your Organization Erich Kron Cybersecurity is often expensive, time-consuming and can have catastrophic consequences if done wrong. From scams ...
Panel: Columbus Startups - A security perspective Brendan O'Connor , Jesse Throwe , Shawn Sines This panel will be security decision makers at several Columbus area technology startups.