• 5
  • 501(c)(3) for (un)fun and (non)profit

    Jack Daniel
    Tue, 15:00 - 15:50
    Underground
  • A
  • A Better Way to Get Intelligent About Threats

    Adam Vincent
    Wed, 10:00 - 10:50
    Breaking Ground
  • Allow myself to encrypt...myself!

    Evan Davison
    Tue, 12:00 - 12:50
    Breaking Ground
  • Anatomy of memory scraping, credit card stealing POS malware

    Amol Sarwate
    Tue, 16:00 - 16:50
    Breaking Ground
  • A Place to Hang Our Hats: Security Community and Culture

    Domenic Rizzolo
    Wed, 15:30 - 15:50
    Common Ground
  • Ask the EFF

    Nate Cardozo, Kurt Opsahl
    Wed, 16:00 - 16:50
    Underground
  • Attacking Drupal

    Greg Foss
    Wed, 14:00 - 14:30
    Proving Ground
  • B
  • Back Dooring the Digital Home

    David Lister
    Tue, 17:30 - 18:00
    Proving Ground
  • Black Magic and Secrets: How Certificates Influence You!

    Robert Lucero
    Wed, 12:20 - 12:50
    Proving Ground
  • Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014

    Joshua Corman, David Kennedy, Zach Lanier, David Mortman, Jerome Radcliffe
    Wed, 16:00 - 16:50
    Common Ground
  • Brick in the Wall vs Hole in the Wall

    Caroline D Hardin
    Tue, 14:00 - 14:30
    Proving Ground
  • Bridging the Air Gap: Cross Domain Solutions

    Patrick Orzechowski
    Tue, 16:55 - 17:25
    Proving Ground
  • Bring your own Risky Apps

    Domingo Guerra, Michael Raggo
    Wed, 11:00 - 11:50
    Breaking Ground
  • Building Skills, Understanding and Influencing People

    I Am The Cavalry
    Wed, 12:00 - 17:30
    IATC
  • Business lessons that made me a better Security Professional

    Tony Vargas
    Wed, 10:00 - 10:50
    Underground
  • C
  • Can I Code Against an API to Learn a Product?

    Adrienne Merrick-Tagore
    Tue, 16:20 - 16:50
    Proving Ground
  • Closing Keynote

     
    Wed, 18:00 - 18:50
    Common Ground
  • Cluck Cluck: On Intel's Broken Promises

    Jacob Torrey
    Tue, 17:00 - 17:50
    Breaking Ground
  • ClusterF*ck - Actionable Intelligence from Machine Learning

    David Dorsey, Mike Sconzo
    Tue, 15:30 - 16:10
    Ground Truth
  • C.R.E.A.M. – The Art of Social Engineering Report Writing

    Aaron Crawford
    Tue, 14:00 - 18:00
    Training Ground
  • Custodiet watches your packets! The Open Source MSSP Framework

    Billy Boatright, Joshua Marpet
    Tue, 12:00 - 12:50
    Underground
  • Cut the sh**: How to reign in your IDS.

    Tony Robinson
    Tue, 14:35 - 15:05
    Proving Ground
  • D
  • Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY

    Sergey Bratus, Ira Ray Jenkins
    Wed, 14:00 - 14:50
    Common Ground
  • #
  • #edsec: Hacking for Education

    Jessy Irwin
    Tue, 11:00 - 11:30
    Proving Ground
  • E
  • Evading code emulation: Writing ridiculously obvious malware that bypasses AV

    Kyle Adams
    Tue, 11:45 - 13:00
    Common Ground
  • F
  • FAP Fully Automated Pwning Techniques for Automated Reversing

    Edmond Rogers
    Tue, 17:00 - 17:50
    Underground
  • Fuck These Guys: Practical Countersurveillance

    Lisa Lorenzin
    Wed, 15:00 - 15:50
    Underground
  • G
  • Geek Welfare -- Confessions of a Convention Swag Hoarder

    Rachel Keslensky
    Tue, 15:10 - 15:40
    Proving Ground
  • H
  • Hackers vs Auditors

    Dan Anderson
    Wed, 14:35 - 15:05
    Proving Ground
  • Hacking the Hustle Hands-On, Infosec Resume and Career Strategies

    Eve Adams
    Tue, 09:00 - 09:50
    Common Ground
  • I
  • Improving security by avoiding traffic and still get what you want in data transfers

    Art Conklin
    Tue, 17:10 - 17:50
    Ground Truth
  • Insider Threat Kill Chain: Human Indicators of Compromise

    Ken Westin
    Wed, 15:00 - 15:20
    Common Ground
  • Introduction and Overview: I Am The Cavalry and Empowering Researchers

    I Am The Cavalry
    Wed, 10:00 - 10:50
    IATC
  • Invasive Roots of Anti-Cheat Software

    Alissa Torres
    Wed, 12:00 - 12:50
    Breaking Ground
  • iOS URL Schemes: omg://

    Guillaume K. Ross
    Wed, 10:00 - 10:30
    Proving Ground
  • K
  • Know thy operator

    Misty Blowers
    Tue, 16:20 - 17:00
    Ground Truth
  • M
  • Malware Analysis 101 - N00b to Ninja in 60 Minutes

    grecs
    Tue, 16:00 - 16:50
    Common Ground
  • Master Serial Killer

    Chris Sistrunk
    Tue, 14:00 - 14:50
    Underground
  • Measuring the IQ of your Threat Intelligence feeds

    Kyle Maxwell, Alex Pinto
    Tue, 11:50 - 12:40
    Ground Truth
  • N
  • No InfoSec Staff? No Problem.

    Anthony Czarnik
    Tue, 15:45 - 16:15
    Proving Ground
  • O
  • Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter

    Carlos Munoz
    Wed, 10:35 - 11:05
    Proving Ground
  • Opening Keynote -- Beyond Good and Evil: Towards Effective Security

    Adam Shostack
    Tue, 10:00 - 10:50
    Common Ground
  • P
  • Problem Space Overview: I Am The Cavalry

    I Am The Cavalry
    Wed, 11:00 - 11:50
    IATC
  • Protecting Data – How Cultural-Political Heritage Shapes Security Approaches

    Malte Pollmann
    Tue, 16:00 - 16:50
    Underground
  • Pwning the hapless or How to Make Your Security Program Not Suck

    Casey Dunham, Emily Pience
    Wed, 15:45 - 16:15
    Proving Ground
  • Pwning the Pawns with WiHawk

    Santhosh Kumar, Anamika Singh
    Wed, 17:00 - 17:50
    Common Ground
  • R
  • Reverse Engineering Mac Malware

    Sarah Edwards
    Wed, 11:00 - 11:50
    Underground
  • RFID Hacking

    Josh Perrymon, Sean Satterlee
    Wed, 14:00 - 18:00
    Training Ground
  • Ripped from the Headlines What the news tells us about Information Security Incidents

    Kevin Thompson, Suzanne Widup
    Wed, 14:00 - 14:50
    Underground
  • S
  • Secret Pentesting Techniques Part Duex

    David Kennedy
    Wed, 12:00 - 12:50
    Underground
  • Securing Sensitive Data: A Strange Game

    Jeff Elliot
    Tue, 12:10 - 12:40
    Proving Ground
  • Security Management Without the Suck

    Tim Krabec, Tony Turner
    Tue, 14:00 - 14:50
    Common Ground
  • Security testing for Smart Metering Infrastructure

    Robert Hawk, Steve Vandenberg
    Wed, 15:00 - 15:50
    Breaking Ground
  • SHA-1 backdooring and exploitation

    Jean-Philippe Aumasson
    Tue, 11:00 - 11:35
    Common Ground
  • Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)

    Databeast, Space Rogue
    Tue, 11:00 - 11:50
    Underground
  • So, you want to be a pentester?

    Heather Pilkington
    Tue, 11:35 - 12:05
    Proving Ground
  • Strategies Without Frontiers

    Meredith L. Patterson
    Tue, 14:00 - 15:20
    Ground Truth
  • T
  • Teach a man to Phish...

    Vinny Lariza
    Wed, 16:20 - 16:50
    Proving Ground
  • The Lore shows the Way

    Systems Mangler, Brown Hat Security
    Wed, 16:55 - 17:25
    Proving Ground
  • The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State

    Richard Thieme
    Wed, 17:00 - 17:50
    Underground
  • The Power Law of Information

    Michael Roytman
    Tue, 11:00 - 11:40
    Ground Truth
  • The Savage Curtain

    Tushar Dalvi, Tony Trummer
    Wed, 16:00 - 16:50
    Breaking Ground
  • The Semantic Age - or - A Young Ontologist's Primer

     
    Tue, 18:00 - 18:50
    Ground Truth
  • The untold story about ATM Malware

    Daniel Regalado
    Wed, 10:00 - 10:50
    Common Ground
  • Third-Party Service Provider Diligence: Why are we doing it all wrong?

    Patrice Coles
    Wed, 15:10 - 15:40
    Proving Ground
  • Training with Raspberry Pi

    Nathaniel Davis
    Wed, 11:45 - 12:15
    Proving Ground
  • Travel Hacking With The Telecom Informer

    TProphet
    Tue, 17:00 - 17:50
    Common Ground
  • U
  • Untwisting the Mersenne Twister: How I killed the PRNG

    moloch, Dan Petro
    Tue, 15:00 - 15:50
    Breaking Ground
  • USB write blocking with USBProxy

    Dominic Spill
    Tue, 11:00 - 11:50
    Breaking Ground
  • Using Superpowers for Hardware Reverse Engineering

    Joe Grand
    Wed, 11:00 - 11:50
    Common Ground
  • V
  • Vaccinating Android

    Milan Gabor, Danijel Grah
    Wed, 14:00 - 14:50
    Breaking Ground
  • Vulnerability Assessments on SCADA: How i 'owned' the Power Grid.

    Fadli B. Sidek
    Tue, 15:00 - 15:50
    Common Ground
  • W
  • We Hacked the Gibson! Now what?

    Philip Young
    Wed, 17:00 - 17:50
    Breaking Ground
  • What I've Learned As A Con-Man

    MasterChen
    Wed, 11:10 - 11:40
    Proving Ground
  • What reaction to packet loss reveals about a VPN

    Sergey Bratus, Anna Shubina
    Tue, 14:00 - 14:50
    Breaking Ground
  • Why am I surrounded by friggin' idiots?!? (Because you hired them!)

    Stephen Heath
    Wed, 12:00 - 12:50
    Common Ground
  • Wireless Essentials (Tue)

     
    Tue, 09:00 - 18:00
    Training Ground
  • Wireless Essentials (Wed)

    DaKahuna, Dragorn, Russell Handorf, Rick Mellendick, Zero Chaos
    Wed, 09:00 - 18:00
    Training Ground
  • Y
  • You Hack, We Capture: Attack Analysis with Honeypots

    Ioannis Koniaris
    Wed, 09:00 - 09:50
    Common Ground