• A
  • An Introduction to Malware Classification

    John Seymour
    Sat, 11:30 - 11:50
    Track 1
  • Attacking Automation: Hacking For The next Fifty Years

    Mike Spaulding
    Sun, 11:10 - 12:00
    Track 2
  • Avoiding the Pitfalls of Hunting

    Tony Cook
    Sun, 14:00 - 14:50
    Track 1
  • B
  • Beyond Automated Testing

    Luke Hudson, Zack Meyers
    Sun, 15:00 - 15:50
    Track 2
  • Binary Reverse Engineering for Beginners

    Ben Demick
    Sat, 10:00 - 19:00
    Training 2
  • BSidesCharm Official Party

     
    Sat, 20:00 - 22:00
    Track 1
  • Building Blocks: An Introduction to Security Analysis

    Kerry Hazelton
    Sat, 10:00 - 19:00
    Training 1
  • C
  • Closing Ceremony

     
    Sun, 16:00 - 16:50
    Track 1
  • Cyber Vulnerabilities of America's Pipeline Systems

    Paul J. Vann
    Sat, 14:30 - 14:50
    Track 2
  • D
  • Deserialized to Life: The Story of My January CVEs

    Arshan Dabirsiaghi
    Sun, 12:00 - 12:50
    Track 2
  • Draining the AppSec Pond - A Developer's Perspective

    Jason White
    Sat, 16:00 - 16:50
    Track 2
  • F
  • Failure to Warn Might Get You Pwned: Vulnerability Disclosure and Products Liability in Software

    Wendy Knox Everette
    Sat, 14:00 - 14:20
    Track 1
  • Fun with Network Packet Analysis!

    Marcelle Lee
    Sun, 11:00 - 16:00
    Training 1
  • G
  • Getting to the Bottom of the Cloud -- File Syncing Forensics

    Matt Harvey
    Sun, 11:10 - 12:00
    Track 1
  • H
  • How Hackers Look at a Web Site

    Patrick Laverty
    Sat, 15:00 - 15:50
    Track 1
  • I
  • In Case of Emergency: Anonymity - A Technical Guide

    Douglas Goddard
    Sun, 14:00 - 14:50
    Track 2
  • IoT Village

     
    Sun, 10:00 - 17:00
    Training 2
  • M
  • Managing Audits: A Human Interaction Perspective

    AJ Stambaugh
    Sat, 12:00 - 12:50
    Track 2
  • N
  • Next Gen Social Engineering

    Jack Johnson
    Sun, 15:00 - 15:50
    Track 1
  • O
  • Opening Keynote

     
    Sat, 10:00 - 11:00
    Track 1
  • P
  • PowerShell Security: Defending the Enterprise from the Latest Attacks

    Sean Metcalf
    Sat, 16:00 - 16:50
    Track 1
  • Prizes and Giveaways

     
    Sat, 18:00 - 19:00
    Track 1
  • R
  • Ranger – It just takes one account to take down an enterprise!

    Christopher Duffy, Jonathan Fallone, Dev Patel
    Sat, 12:00 - 12:50
    Track 1
  • S
  • Saturday Afternoon Keynote

     
    Sat, 17:00 - 18:00
    Track 1
  • Sunday Keynote

     
    Sun, 10:00 - 11:00
    Track 1
  • T
  • The Open Source Malware Lab

    Robert Simmons
    Sun, 12:00 - 12:50
    Track 1
  • The Value of Deceiving Attackers

    Thomas Phillips
    Sat, 15:00 - 15:50
    Track 2
  • U
  • Using Bro IDS to Detect X509 Anomalies

    Will Glodek, Mark Parsons
    Sat, 14:30 - 14:50
    Track 1
  • Using open source SSL/TLS data to hunt threat actors and defend networks

    Mark Parsons
    Sat, 11:30 - 11:50
    Track 2
  • W
  • Who Watches the Smart Watches?

    Brian Moran
    Sat, 14:00 - 14:20
    Track 2