• A
  • Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths

    Nicolas Daubresse, Remi Escourrou
    Tue, 14:00 - 17:55
    Training Ground
  • Addressing non-linear InfoSec career paths

    Sarah Young
    Tue, 12:00 - 12:25
    HIre Ground
  • AIs Wide Open - Making Bots Safer Than Completely $#%cking Unsafe

    Davi Ottenheimer
    Tue, 14:30 - 14:55
    I Am The Cavalry
  • AIs Wide Open - Making Bots Safer Than Completely #$%cking Unsafe

    Davi Ottenheimer
    Tue, 16:00 - 17:55
    Public Ground
  • All that glitters isn't Chrome: Hunting for suspicious browser extensions

    Mike Sconzo
    Wed, 17:30 - 17:55
    Ground Truth
  • Analyzing user decision making on phishing sites - using mouse data and keyboard dynamics

    Sanne Maasakkers
    Tue, 14:30 - 14:55
    Proving Ground
  • An investigation of the security of passwords derived from African languages

    Sibusiso Sishi
    Wed, 11:00 - 11:55
    Ground1234!
  • Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach

    Pablo Breuer, Sara Jayne Terp
    Tue, 11:30 - 12:25
    Ground Truth
  • AppSec/SDLC/DevSecOps

     
    Tue, 14:30 - 15:25
    CISO Summit
  • Ask the EFF

    Eva Galperin, India McKinney, Kurt Opsahl, Nathan Sheard
    Tue, 18:00 - 18:55
    Underground
  • ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for better sleep and a safer tomorrow.

    Jamie Williams, Sarah Yoder
    Wed, 15:00 - 15:55
    Ground Floor
  • At Your Service - Abusing the Service Workers Web API

    Daniel Abeles, Shay Shavit
    Wed, 17:00 - 17:55
    Breaking Ground
  • Automatic Security Analysis of IoT Firmware

    Matt Brown
    Tue, 17:00 - 17:55
    I Am The Cavalry
  • B
  • Baited Canaries - Monitoring attackers with active beacons

    Gregory Caswell
    Wed, 17:30 - 17:55
    Proving Ground
  • BEEMKA / Electron Post-Exploitation When The Land Is Dry

    Pavel Tsakalidis
    Tue, 11:30 - 12:25
    Breaking Ground
  • Beginners Session: Lock Picking

     
    Tue, 11:30 - 11:45
    Events
  • Behind the Recruiting Curtain: What Do Recruiters Really Say and Do

    Richard Cho, Matt Duren, Kris Rides
    Tue, 17:30 - 17:55
    HIre Ground
  • Bestsellers in the Underground Economy - Measuring Malware Popularity by Forum

    Winnona DeSombre
    Tue, 11:30 - 11:55
    Proving Ground
  • Birthday Hunting

    Jack Burgess
    Wed, 17:00 - 17:25
    Ground Truth
  • Board Communications

     
    Tue, 09:30 - 10:25
    CISO Summit
  • Breaking Smart [Bank] Statement

    Manuel Nader
    Wed, 10:00 - 10:55
    Ground1234!
  • Breaking the Bodyguards

    Chrissy Morgan
    Wed, 14:30 - 14:55
    Proving Ground
  • Broken Arrow: applying InfoSec and Forensic practices to escape domestic abuse

    Will Baggett
    Tue, 15:00 - 15:25
    Proving Ground
  • BSidesLV Pool Party

     
    Wed, 22:00 - 23:59
    Events
  • Building an enterprise security knowledge graph to fuel better decisions, faster

    Jon Hawes
    Tue, 14:00 - 14:55
    Ground Truth
  • Building the badge- How you can make small, cheap and custom hardware for function or fashion

    James Dietle
    Tue, 18:30 - 18:55
    Proving Ground
  • Burpsuite Team Server - Collaborative Web Pwnage

    Tanner Barnes
    Tue, 17:00 - 17:25
    Proving Ground
  • C
  • Can the CAN bus fly ­Risks of CAN bus networks within avionics systems

    Patrick Kiley
    Tue, 12:00 - 12:25
    I Am The Cavalry
  • Certification and Labeling for IoT

    Richard Manning
    Wed, 14:00 - 15:55
    Public Ground
  • Certification and Labeling in IoT

    Richard Manning
    Wed, 12:00 - 12:25
    I Am The Cavalry
  • China as a New Russia? Analyzing Similarities and Differences of Chinese Threat Actors from their Russian Counterparts

    Anne An
    Tue, 17:00 - 17:55
    Underground
  • CISO Unconference

     
    Tue, 16:30 - 17:25
    CISO Summit
  • Closing Ceremonies

     
    Wed, 19:00 - 20:00
    Events
  • Closing Remarks

     
    Tue, 17:30 - 17:55
    CISO Summit
  • CloudSec Rules Everything Around Me (C.R.E.A.M.)

    Kyle Dickinson
    Wed, 17:00 - 17:55
    Common Ground
  • Coordinated Disclosure of ICS Products: Who's got time for that?

    Jay Angus
    Tue, 14:00 - 14:25
    I Am The Cavalry
  • Cover Your A**

    Suchi Pahi
    Wed, 15:00 - 15:25
    Proving Ground
  • Crisis Communication & Brand Monitoring

     
    Tue, 15:30 - 16:25
    CISO Summit
  • CTFs for Fun and Profit: Playing Games to Build your Skills

    David Tomaschik
    Wed, 10:00 - 10:55
    Ground Floor
  • Cyber Deception after Detection: Safe observation environment using Software Defined Networking

    TORU SHIMANAKA
    Wed, 15:30 - 15:55
    Proving Ground
  • Cyber Threat Intel & APTs 101

    Ronnie Obenhaus, John Stoner
    Wed, 17:00 - 17:55
    Ground Floor
  • D
  • Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes

    Anna Skelton
    Wed, 17:00 - 17:25
    Proving Ground
  • Discovering Your Passion in Cyber Security

    Cherie Burgett
    Tue, 14:00 - 14:25
    HIre Ground
  • DLP Sucks and Why You Should Use It

    John Orleans
    Tue, 11:30 - 12:25
    Common Ground
  • Duck and (Re)Cover - The missing link in the security evolution

    Peter Lidell
    Tue, 11:30 - 12:25
    Underground
  • E
  • Enterprise Overflow: How Breached Credentials Impact Us All

    Robert Paul
    Tue, 15:00 - 15:55
    Ground1234!
  • Escape the Questionnaire Quagmire: A thoughtful approach to addressing security inquiries from customers and prospects

    Katie Ledoux
    Wed, 14:00 - 14:25
    Common Ground
  • Evaluating Code Embeddings

    Rob Brandon
    Tue, 19:00 - 19:25
    Ground Truth
  • Examining DES-based Cipher Suite Support within the TLS Ecosystem

    Vanessa Frost
    Tue, 12:00 - 12:25
    Proving Ground
  • Excuse Me, Your Sword Is In My Eye: Responding to Red Teams and Intrusions in 2019 and Beyond

    Jeremy Galloway
    Wed, 12:00 - 12:25
    Common Ground
  • Exploiting Windows Group Policy for Reconnaissance and Attack

    Darren Mar-Elia
    Wed, 15:00 - 15:55
    Ground1234!
  • F
  • Finding Evil with Mitre ATT&CK and the Elastic Stack

    Kent Brake, Matteo Rebeschini
    Wed, 14:00 - 17:55
    Training Ground
  • Free and Fair Elections in an Internet Era

    Andre McGregor, Sheila Nix, Maurice Turner
    Wed, 09:00 - 09:55
    Public Ground
  • Friends of Bill W

     
    Tue, 20:00 - 21:30
    Events
  • Friends of Bill W (Sat.)

     
    Wed, 20:00 - 21:30
    Events
  • From EK to DEK: An Analysis of Modern Document Exploit Kits

    Joshua Reynolds
    Wed, 11:00 - 11:55
    Breaking Ground
  • From email address to phone number

    Martin Vigo
    Wed, 12:00 - 12:25
    Breaking Ground
  • G
  • Getting CVSS, NVD, and CVEs to Work for You: Standardizing and Scaling Your Vulnerability Risk Analysis

    Matthew Hahn, Luke Szczutowski
    Wed, 14:30 - 14:55
    Common Ground
  • Give the dog a bone - Exploring OSINT capabilities of pen-testing tools

    John Brunn
    Tue, 17:00 - 17:55
    Ground1234!
  • Giving Credit Where It's Not Due: Visualizing Joker's Stash

    Maxwell Aliapoulios, Ian Gray
    Tue, 15:00 - 15:55
    Underground
  • Grapl - A Graph Platform for Detection and Response

    Colin OBrien
    Tue, 15:00 - 15:55
    Ground Truth
  • H
  • Hack (Apart) Your Career - How to Fund Doing What You Love

    John Grigg
    Tue, 14:30 - 14:55
    HIre Ground
  • "
  • "Hackers of the world - unite?"

    Keren Elazari
    Wed, 18:30 - 18:55
    I Am The Cavalry
  • H
  • Hacking from Above: A Brief Guide for Transitioning to Leadership

    Joey Maresca
    Wed, 11:30 - 11:55
    HIre Ground
  • Hacking the Pentagon: How a Rebel Alliance Shifts Culture to Protect National Security

    Brett Goldstein, Harlan Lieberman-Berg
    Wed, 11:00 - 11:55
    I Am The Cavalry
  • Hacking the STORM

    Kevin King, Justin Whitehead
    Wed, 08:00 - 17:55
    Training Ground
  • HAM License Exams

     
    Wed, 18:00 - 18:55
    Events
  • Hands on Hacking The OWASP TOP 10 and beyond

    Christopher Simon Hanlon
    Wed, 14:00 - 17:55
    Training Ground
  • Hands-on: How to Use CALDERA's Chain Mode

    David Hunt, Alexander Manners
    Tue, 14:00 - 17:55
    Training Ground
  • Have You Distributed Randomness?

    Yolan Romailler
    Wed, 15:00 - 15:55
    Common Ground
  • Hidden Networks Pivoting: Redefining DNS Rebinding Attack

    Nimrod Levy, Nicholas Mosier
    Wed, 11:00 - 11:55
    Ground Floor
  • How to Fail Well (In Order to be Successful) - From IT to Infosec & More

    Roy Wattanasin
    Tue, 17:00 - 17:25
    HIre Ground
  • How to Treat Your Hacker (and Responsible Vulnerability Disclosure)

    Monta Elkins
    Wed, 10:00 - 10:55
    I Am The Cavalry
  • HSC^2 Hacker Summer Camp Hacker Standup Comedy

     
    Tue, 16:00 - 17:00
    Events
  • Human Honeypots or: How I Learned to Stop Worrying and Love the Implant

    Nick Koch
    Wed, 10:30 - 10:55
    Proving Ground
  • I
  • I Am The Cavalry Track Welcome and Overview

    Joshua Corman, Beau Woods
    Tue, 11:30 - 11:55
    I Am The Cavalry
  • I Just Want to Help Make Flying More Secure...not Work with the Government or How I Learned to Love a Govvie

    Steven Luczynski
    Tue, 18:00 - 18:55
    I Am The Cavalry
  • I’m a hunter! But what does that mean?

    Yasmine Johnston-Ison
    Wed, 14:00 - 14:25
    Proving Ground
  • (
  • (Im)proper Database Authentication

    Mitch Wasson
    Wed, 12:00 - 12:25
    Ground1234!
  • I
  • Introduction to Cryptographic Attacks

    Matt Cheung
    Wed, 08:00 - 11:55
    Training Ground
  • Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection

    Veronica Weiss
    Wed, 11:00 - 11:55
    Ground Truth
  • K
  • Keynote with Bob Lord

    Bob Lord
    Tue, 10:00 - 11:25
    Events
  • Knowing the Unknown: Using PCAP to Break Down Application-Layer Protocols

    David Pearson
    Tue, 08:00 - 11:55
    Training Ground
  • L
  • Let's hear from the Hackers: What should DOJ do next?

    Leonard Bailey
    Wed, 10:00 - 11:55
    Public Ground
  • Linux Hardening - The Easy Way

    Guy Barnhart-Magen
    Wed, 08:00 - 11:55
    Training Ground
  • Lock Picking Contest

     
    Tue, 16:00 - 16:30
    Events
  • Loki: Add a little chaos to your USB drive

    Michael Rich
    Wed, 10:00 - 10:55
    Breaking Ground
  • Low & Slow - Techniques for DNS Data Exfiltration

    Dimitri Fousekis
    Wed, 12:00 - 12:25
    Ground Floor
  • M
  • Making your website vulnerable for fun and security awareness

    Kenny Jansson
    Wed, 10:00 - 10:25
    Proving Ground
  • Malware Traffic Analysis Workshop

    Brad Duncan
    Tue, 08:00 - 17:55
    Training Ground
  • Meet the CISO

     
    Tue, 18:00 - 18:55
    Common Ground
  • Meet the Nation This Week on Sunday: A Special Vulnerability Edition

    Leonard Bailey, Tod Beardsley, Jen Ellis, Colin Morgan
    Wed, 18:00 - 18:55
    Common Ground
  • Meltdown's Aftermath: Leveraging KVA Shadow To Bypass Security Protections

    Omri Misgav, Udi Yavo
    Tue, 17:00 - 17:55
    Breaking Ground
  • Mind the Diversity Gap - A Panel Discussion

    Stephanie Ihezukwu, Chloe Messdaghi, Alyssa Miller
    Tue, 17:00 - 17:55
    Common Ground
  • Musings of an Accidental CISO

    Brian Markham
    Wed, 18:00 - 18:55
    Ground Floor
  • My quest for (privileged) identity to own your domain

    Nir Yosha
    Tue, 14:00 - 14:55
    Ground1234!
  • N
  • Neurosecurity: where Infosec meets Brain-machine Interface

    Matt Canham, Ben D Sawyer
    Tue, 18:00 - 18:55
    Breaking Ground
  • No IOUs with IOT

    Bryson Bort
    Wed, 18:00 - 18:25
    I Am The Cavalry
  • Noobs: Training the Next Generation of Security Engineers

    David Seidman
    Wed, 13:30 - 13:55
    HIre Ground
  • Now that you hacked the plane, what are you going to do about your career?

    Chris Roberts
    Tue, 11:30 - 11:55
    HIre Ground
  • O
  • Old things are new again: efficient automatic signature generation for malware classification

    Hyrum Anderson
    Wed, 12:00 - 12:25
    Ground Truth
  • Opening Remarks

     
    Tue, 09:30 - 09:55
    Events
  • P
  • Pentesting ICS 102

    Arnaud Soullie, Alexandrine Torrents
    Wed, 14:00 - 17:55
    Training Ground
  • Please inject me, a x64 code injection

    Alon Weinberg
    Wed, 18:30 - 18:55
    Proving Ground
  • Prisoner Number Six

    Lavi Lazarovitz, Nimrod Stoler
    Wed, 11:00 - 11:55
    Common Ground
  • Professionalization - Possibilities and Potholes

    Andrea Matwyshyn
    Tue, 09:00 - 09:55
    Public Ground
  • Profiling User Risk: Borrowing from Business Intelligence to Understand the Security of Your Userbase

    Emily Austin
    Tue, 17:00 - 17:55
    Ground Truth
  • Q
  • Queercon BSides Poolside Mixer

     
    Tue, 20:00 - 23:30
    Events
  • R
  • Real World Security in a Clinical Healthcare Environment: Hacking a Hospital

    Paul Dant
    Wed, 14:00 - 14:55
    I Am The Cavalry
  • Reduce, Reuse and Recycle ML models - and the security powers is yours

    Ram Shankar Siva Kumar
    Wed, 14:00 - 14:55
    Ground Truth
  • Reducing Inactionable Alerts via Policy Layer

    John Seymour
    Tue, 18:00 - 18:25
    Ground Truth
  • Reverse Engineering Android Apps

    Elizabeth Biddlecome, Sam Bowne
    Tue, 08:00 - 11:55
    Training Ground
  • Reverse Engineering Mobile Apps: Never Pay for Transit Again

    Priyank Nigam
    Tue, 14:00 - 14:55
    Underground
  • Reverse Engineering the Cyber Policy API

    Katherine Pratt, Maurice Turner
    Tue, 10:00 - 11:55
    Public Ground
  • ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator

    Nicholas Mosier
    Wed, 15:00 - 15:55
    Breaking Ground
  • S
  • Salesforce Data Governance What dark secrets lurk in your instance??

    Pete Thurston
    Tue, 19:00 - 19:25
    Proving Ground
  • Satellite Vulnerabilities 101

    Elizabeth Wilson
    Tue, 14:00 - 14:25
    Proving Ground
  • Scheming with Machines: Using ML to Support Offensive Teams

    Nick Landers, Will Pearce
    Wed, 15:00 - 15:55
    Ground Truth
  • Scratching the Surface of Risk

    Wade Baker, Benjamin Edwards
    Wed, 18:00 - 18:55
    Ground Truth
  • Securing Fast (and Furious) DevOps pipelines

    Abdessamad TEMMAR
    Wed, 18:00 - 18:25
    Proving Ground
  • Security BSides Organizers Meet-Up

     
    Tue, 19:00 - 21:00
    Events
  • Security data science -- Getting the fundamentals right

    Richard Harang
    Wed, 10:00 - 10:55
    Ground Truth
  • So you think you can CHMOD

    Jared Chandler
    Tue, 18:00 - 18:25
    Proving Ground
  • SSO Wars: The Token Menace

    Oleksandr Mirosh, Alvaro Munoz
    Tue, 11:30 - 12:25
    Ground1234!
  • Startup Security Leadership: Lessons to Level Up from Fortune 100 to Tech Startup

    Ty Sbano
    Wed, 14:00 - 14:25
    HIre Ground
  • State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin

    Gerald Doussot, Roger Meyer
    Wed, 18:00 - 18:55
    Breaking Ground
  • Supply Chain Security

     
    Tue, 13:00 - 13:55
    CISO Summit
  • T
  • The Case for Software Bill of Materials

    Allan Friedman
    Tue, 15:00 - 15:55
    I Am The Cavalry
  • The Contemplator Approach: Data Enrichment Through Elastic Stack

    Rodrigo Brenes, Pedro Rodriguez
    Tue, 15:00 - 15:55
    Common Ground
  • The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage

    Vanessa Redman
    Wed, 12:00 - 12:25
    Proving Ground
  • The Human API: Evolving End Users From Authorized Adversaries Into Our Best Defense.

    Ty Atkin
    Tue, 15:30 - 15:55
    Proving Ground
  • The Importance of Culture in Security

    Mike Murray
    Wed, 10:30 - 11:25
    HIre Ground
  • The New Hacker Pyramid

     
    Tue, 21:30 - 02:00
    Events
  • The Resilient Hacker: Growth Mindset, Health Hacks & Powerful Help to Navigate Personal Challenges

    Serenity Smile
    Tue, 17:30 - 17:55
    Proving Ground
  • The Road to Hell is Paved with Bad Passwords

    Chris Kubecka
    Wed, 10:00 - 10:55
    Common Ground
  • The SOC Counter ATT&CK

    Mathieu Saulnier
    Wed, 11:30 - 11:55
    Proving Ground
  • The struggles of teaching automation

    Joe O’Connell
    Wed, 11:00 - 11:25
    Proving Ground
  • Tournament: The Ultimate Secure Coding Throw Down

    Steve Allor, Jim Manico
    Wed, 08:00 - 11:55
    Training Ground
  • Trying (Unsuccessfully) to Make Meterpreter into an Adversarial Example

    Andy Applebaum
    Tue, 18:30 - 18:55
    Ground Truth
  • U
  • Unpacking pkgs: A look inside macOS Installer packages and common security flaws

    Andy Grant
    Tue, 14:00 - 14:55
    Breaking Ground
  • Using Machines to exploit Machines - harnessing AI to accelerate exploitation

    Guy Barnhart-Magen, Ezra Caltum
    Tue, 15:00 - 15:55
    Breaking Ground
  • Using Wireshark for Incident Response and Threat Hunting

    Michael Wylie
    Wed, 08:00 - 17:55
    Training Ground
  • V
  • Virtual Breakpoints for x86_64

    Gregory Price
    Wed, 14:00 - 14:55
    Breaking Ground
  • W
  • We the People: Providing for a 'common defence' with CVD

    Matthew Cornelius, Cameron Dixon
    Wed, 17:00 - 17:55
    I Am The Cavalry
  • What's Next in Coordinating Vulnerability Disclosures

    Katie Trimble
    Tue, 14:00 - 15:55
    Public Ground
  • Where in the world are Carmen's $adjective cyber attacks: The game show that wonders why things aren't worse

    Bryson Bort, Allan Friedman, Chris Kubecka
    Tue, 14:00 - 14:55
    Common Ground
  • Who dis? The Right Way To Authenticate

    Dhivya Chandramouleeswaran, Lakshmi Sudheer
    Wed, 14:00 - 14:55
    Ground1234!
  • Why can't we be friends? (Ask a Fed & the EFF.)

    Russell Handorf, Kurt Opsahl
    Wed, 17:00 - 17:55
    Ground1234!
  • Why FIDO Security Keys & WebAuthn are Awesome

    Jen Tong
    Tue, 18:00 - 18:55
    Ground1234!
  • Why journalists and hackers need each other (a panel discussion with infosec reporters)

    Joseph Cox, Sean Lyngaas, Lily Hay Newman, Kim Zetter
    Wed, 15:00 - 15:55
    I Am The Cavalry
  • Why we need a Cyber Peace Institute

    Eli Sugarman
    Wed, 16:00 - 17:55
    Public Ground
  • Windows 10 DFIR Challenges

    Andrew Case
    Wed, 14:00 - 14:55
    Ground Floor
  • Windows Breakout and Privilege Escalation

    Rohan Durve
    Tue, 08:00 - 17:55
    Training Ground
  • Z
  • Zero Trust

     
    Tue, 11:00 - 11:55
    CISO Summit