BSideSLA 2013 Aug. 22, 2013 to Aug. 23, 2013, Los Angeles,California

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Leveraging Intel From Hackers To Mitigate Risks Matt Johansen What can the IT security community learn from a ‘blackhat,’ who says he’s decided to ...
Alice in Exploit-Redirection-Land: A Trip Down the Rabbit Hole Nathan Magniez Learn to understand the sweet complexity that is redirection. Keep yourself anonymous and out of ...
Accidental Abyss: Data Leakage on the Internet Kelly Fitzgerald PII is personally identifiable information. In the information age, seemingly useless bits of PII can ...
Security Management War Stories Wendy Nather Forget about "securing the human": it's hard enough just to manage security people. This talk ...
5,000 + 5,000 by 2020 – The National Cybersecurity Sports Federation Daniel Manson The National Science Foundation has funded a proposal to create The National Cybersecurity Sports Federation ...
Watching the Watchmen: (in)security of IP Cameras Exposed Sergey Shekyan Low cost commodity IP surveillance cameras are becoming increasingly popular among households and small businesses. ...
Mobile Malware Heuristics: The path from 'eh' to pretty good'. Jimmy Shah Malware on mobile phones is rapidly increasing. There are many reasons for this, but the ...
Passive Aggressive Bluetooth Scanning with Python Ryan Holeman Bluetooth devices can be scanned either though active or passive techniques. Active scanning is done ...
Good In A Room- What Hollywood Teaches us about Selling Your Information Security Program Sean Cordero Information Security programs continue to suffer from a lack of direction, management support, and funding– ...
We Are China, and We Are In You Antonio "Tony" Rucci As one who focuses on assisting companies by securing their environments, critical infrastructure consulting, and ...
Friendly Competition: Mentoring Youth in InfoSec Alex Levsinson InfoSec is a small, close-nit community. We face many ethical and moral pressures on a ...
Introduction to Dynamic Malware Analysis D. Shaw , M. Mcdevitt Detecting and understanding malicious software is quickly becoming an imperative for security professionals and system ...
Low Risk/ High Return: Hack a Mentor Carolyn Lear Finding a good mentor can be a daunting task for anyone. Even if you’re most ...
Malware Automation Christopher Elisan Automation is key when it comes to production. The same is true for malware. Malware ...
SWIFT: Students With an Interest in the Future of Technology Swift Students The subject matter of this talk will cover the activities and culture in a student ...
Cleaner or Janitor – Incident Response to an active attack John Stauffacher , Matthew Hoy Everyday corporations are faced with the increasing likelihood of attack. They spend millions, in security ...
Agility and Rapid Innovation through the Ten Dimensions of Cyber Security Performance Russell Cameron Thomas Are you interested in promoting agility and rapid innovation in enterprise-level information security, privacy, and ...
ANOTHER Log to Analyze - Utilizing DNS to Identify Malware Nathan Magniez DNS logs are an often overlooked asset in identifying malware in your network. The purpose ...