Star 0

Talks

Title Humans
Lyft Cartography: Automating Security Visibility and Democratization
High Performance VM Introspection Using Virtualization Exceptions
Fuzzing Malware for Fun & Profit: Applying Coverage-Guided Fuzzing to Find and Exploit Bugs in Modern Malware Maksim Shudrak
Capture The Flag Facebook
Contact Center Authenticaion
Spy Hunter: Reversing Your First Android Surveillanceware Lookout
Anti-Privacy Anti-Patterns
Building Secure APIs and Web Applications
A Deep Dive into Go Malware: Using Metadata to Empower the Analyst
Opening Remarks
Crypto & Privacy Village
BSides Career Chit-Chat
Self Care for Security Professionals
RFID Hacking NCC Group
Automating Web Application Bug Hunting Jerry Gamblin , Kenna Security
Profiling "VIP Accounts" Access Patterns in User-Centric Data Streams
Building Identity for an Open Perimeter Netflix, Inc.
Using Open Source Log Aggregation Tools to Improve Enterprise Security
How to Build an Application Security Program Jerry Gamblin , Kenna Security
Treat the Problems, Not the Symptoms: Baby Steps to a More Secure Active Directory Environment Igal Gofman , XM Cyber
HTTP Security Headers: A Technology History Through Scar Tissue
Closing Ceremony
Making Sense of Unstructured Threat Data
Sponsor Lounge
IoT Village Independent Security Evaluators
Back to the SOCless Future: Implementing Monitoring & Response Through Automation
Arcades and Audits: What Gaming Can Do for Your Security Posture
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations Bishop Fox
Collect All the Data; Protect All the Things
You Might Still Need Patches for Your Denim, but You No Longer Need Them for Prod Google Inc.
Goldilocks and the Three ATM Attacks
Don't Boil the Ocean: Using MITRE ATT&CK to Guide Hunting Activity Splunk
Deploying Two-Factor Authentication to Millions of Users
Two-Faces of WASM Security
Abusing WCF Endpoint for RCE and Privilege Escalation
Hacking with a Heads Up Display
How to Fix the Diversity Gap in Cybersecurity Bugcrowd
Coffee
Practical Threat Modeling
The Secure Metamorphosis: Streaming Logs with Kafka and TLS
Concrete Steps to Create a Security Culture
Living Security Escape Room
Operation PZCHAO
How to Orchestrate a Cyber Security Incident Tabletop Exercise
Ethical Hacking: DIY Mobile Security Workstation (For Cheap)
Offensive Javascript Techniques for Red Teamers (Or Anyone Really) Dylan Ayrey
Surfing the Motivation Wave to Create Security Behavior Change Elevate Security
BADPDF: Stealing Windows Credentials via PDF Files Check Point Software Technologies
Security Automation Simplified Box
Navigating Passwordless Authentication with FIDO2 & WebAuthn Jerrod Chong , Yubico
Vendor Security: Where Our Data Goes We Follow
Cats? In My Certificate Transparency Logs? It's More Likely Than You Think Scott Behrens , Netflix
Party
Do You Even Tech Anymore: Management & Leadership in Security?
The Path to Infosec Is Not Always Linear
Slack App Security: Securing Your Workspaces from a Bot Uprising Slack
Strangeways, Here We Come: A Journey from On-Prem to Cloud First with AWS
Attacking Deep Learning-Based NLP Systems with Malicious Word Embeddings
All Your Containers Are Belong to Us
Implementing a Kick-Butt Training Program: BLUE TEAM GO!
Securing Online Identities with Simple, Secure, Open Standards
Monitoring Minimum Viable Security via osquery on Mac, Windows, Linux, and Containers Guillaume Ross
WHOIS Calling the 80s to Get Their Finger Back: LOL with Old TCP Services
DevSecOps State of the Union Clint Gibler , NCC Group
Beyond AV: Detection-Oriented File Analysis Target
Reverse Engineering Mobile Apps
Spymaster Challenge
Owning the Smart Home with Logitech Harmony Hub
Guarding Against Protocol Subversion at Coinbase
Bye-Bye False Positives: Using AI to Improve Detection Ivan Novikov
Shall We Play a Game?
RadRAT: An all-in-one toolkit for complex espionage ops
Conquer the Enterprise from Inside with Penetration Testing Dropboxes Simon Roses Femerling , VULNEX
Containers: Your Ally in Improving Security
Friend or Replicant: How Attackers Automate and Disguise Themselves in a Shroud of Authenticity to Gain Followers, Control Influence, and Malign Credit
Using the Secrets of Behavioral Science to Influence Security
Journey to Command Injection: Hacking the Lenovo ix4-300d
How to Lose a Container in 10 Minutes Microsoft Corporation
Career Mutation: A Panel on the Evolution to Management in Security
Lockpick Village
Do Androids Dream of Electric Fences?: Defending Android in the Enterprise Google Inc.