• Saturday, April 23
  • Cluster Pi

    Gary Dewey
    Sat, 10:00 - 10:25
    Track 3
  • Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling

    Christopher Wood
    Sat, 10:30 - 10:55
    Track 3
  • How to Hug a Hacker

    Holly Turner
    Sat, 11:00 - 11:25
    Track 3
  • Bringing a project back from hibernation – Reviving Kismet

    Mike Kershaw
    Sat, 11:30 - 11:55
    Track 3
  • BSidesROC CTF: QA Session

    Jon Szymaniak
    Sat, 14:00 - 14:25
    Track 3
  • The Life and Times of Hans Ostmaster

    Chaim Sanders
    Sat, 14:30 - 14:55
    Track 3
  • Real security incidents, unusual situations

    Adam Dean
    Sat, 15:00 - 15:25
    Track 3
  • Letting the Crap Out of the Bag: Adventures Disclosing IoT Bugs

    Max Sobell
    Sat, 15:30 - 15:55
    Track 3
  • CSRF Attack & Defense

    John N. King
    Sat, 16:00 - 16:25
    Track 3
  • I Know Where You Live: Privacy Issues in Location-Based Apps

    Gabe Kirkpatrick
    Sat, 16:30 - 16:55
    Track 3
  • Counter UAS (C-UAS)

    Jeff Foley
    Sat, 17:00 - 17:25
    Track 3
  • eSDP – Rings Around Things in the Cloud

    Duncan Sparrell
    Sat, 17:30 - 17:55
    Track 3