• 2
  • 2nd Annual - CryptKids Con at BSidesDC

     
    Sat, 10:00 - 18:00
    Congressional Hall C - CryptKids
  • A
  • Abusing Windows with PowerShell and Microsoft debuggers in user-land and kernel-land

    Pierre-Alexandre Braeken
    Sat, 16:30 - 17:20
    Grand Central - Track 2
  • Act and Think like an Epidemiologist to Combat Digital Diseases

    Efrain Ortiz
    Sat, 16:30 - 17:20
    Grand South - Track 1
  • Adversarial Post-Exploitation: Lessons From The Pros

    Chris Ross, Justin Warner
    Sat, 15:30 - 16:20
    Grand South - Track 1
  • A Hacker's Guide to Usability Testing

    Greg Norcie
    Sun, 10:30 - 11:20
    Grand South - Track 1
  • A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise

    Joe Klein
    Sun, 14:30 - 15:20
    Grand South - Track 1
  • Applying data science to identify malicious actors in enterprise logs

    Balaji Balakrishnan
    Sat, 13:30 - 14:20
    Grand South - Track 1
  • Attacking Patient Health: The Anatomy of Hospital Exploitation

    Jacob Holcomb
    Sat, 14:30 - 15:20
    Grand South - Track 1
  • B
  • Beyond Automated Testing

    Andrew McNicol, Zack Meyers
    Sat, 14:30 - 15:20
    Grand Central - Track 2
  • Binary Reverse Engineering for Beginners

    Ben Demick, Allen Hazelton, Malachi Jones, Michael Schroeder
    Fri, 08:00 - 17:00
    Meeting Room 16 - Training 3
  • Bro Crash Course

    Liam Randall
    Fri, 08:00 - 14:00
    Mount Vernon A - Training 1
  • BSidesDC After Party sponsored by Altus Consulting Corporation

     
    Sat, 19:30 - 23:59
      - General
  • Building Blocks: The Security Analyst's Toolbox

    Kerry Hazelton
    Sat, 09:00 - 18:00
    Meeting Room 15 - Training 3
  • C
  • Closing Remarks

     
    Sun, 16:30 - 17:00
    Grand South - Track 1
  • CryptKids Keynote

    Liam Randall
    Sat, 10:30 - 11:20
    Grand Central - CryptKids
  • Cyber Threats and Russian Information and Electronic Warfare

    paul joyal
    Sun, 10:30 - 11:20
    Grand Central - Track 2
  • D
  • Detecting Malicious websites using Machine Learning

    Andrew Beard, Ajit Thyagarajan
    Sat, 11:30 - 12:20
    Grand Central - Track 2
  • H
  • How to Join the Infosec Community

    Micah Hoffman
    Sat, 15:30 - 16:20
    Grand Central - Track 2
  • I
  • I got a shell... now where's the Power

    Raymond gabler, Octavio Paguaga
    Sat, 09:00 - 17:00
    Mount Vernon A - Training 1
  • K
  • Keynote

    Marcia Hofmann
    Sat, 09:15 - 10:00
    Grand South - Track 1
  • "
  • "Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program

    Jack Johnson
    Sun, 13:30 - 14:20
    Grand South - Track 1
  • L
  • Lockpick Village / IoT Village - Saturday

     
    Sat, 09:00 - 17:00
    Congressional Hall A
  • Lockpick Village / IoT Village - Sunday

     
    Sun, 09:00 - 16:00
    Congressional Hall A
  • P
  • Palo Alto Networks -- Advanced Endpoint Protection Ultimate Test Drive

     
    Sun, 09:00 - 16:00
    Meeting Room 16 - Training 4
  • PowerShell Security: Defending the Enterprise from the Latest Attack Platform

    Sean Metcalf
    Sat, 13:30 - 14:20
    Grand Central - Track 2
  • Practical Cyborgism: Getting Start with Machine Learning for Incident Detection

    David J. Bianco, Chris McCubbin
    Sun, 13:30 - 14:20
    Grand Central - Track 2
  • R
  • Registration - Friday

     
    Fri, 07:00 - 16:00
      - General
  • S
  • SANS NetWars Tournament

     
    Fri, 15:00 - 21:00
    Mount Vernon A - Training 1
  • T
  • Tales from the Crypt...(analyst)

    Jeff Man
    Sun, 12:30 - 13:20
    Grand South - Track 1
  • Tales of Fails and Tools for Message Integrity

    Jacob Thompson
    Sun, 15:30 - 16:20
    Grand Central - Track 2
  • Tipping the Scales Back In Our Favor

    Rene Aguero
    Sun, 12:30 - 13:20
    Grand Central - Track 2
  • U
  • Users and Cloud Collide: Understanding Threat Vectors in the Enterprise Cloud Environment

    Ron Zalkind
    Sun, 14:30 - 15:20
    Grand Central - Track 2
  • V
  • Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk

    Gordon MacKay
    Sat, 11:30 - 12:20
    Grand South - Track 1
  • W
  • WCTF Magic as told by a clumsy Magician

    Timothy Allmon
    Sat, 10:30 - 11:20
    Grand South - Track 1
  • Welcome

    Alex Norman, Robert Weiss
    Sat, 09:00 - 09:15
    Grand South - Track 1
  • We Should Talk About This: Data Security as an Issue for Communication Research

    Claire Tills
    Sun, 09:00 - 09:50
    Grand South - Track 1
  • What's the Big Deal with Assessing ICS/SCADA?

    Jim Gilsinn
    Sun, 15:30 - 16:20
    Grand South - Track 1
  • Wireless Capture the Flag (WCTF) - Saturday

     
    Sat, 09:00 - 17:00
    Congressional Hall B
  • Wireless Capture the Flag (WCTF) - Sunday

     
    Sun, 09:00 - 16:00
    Congressional Hall B
  • Y
  • YAYA (Yet Another YARA Allocution)

    Monty St John, John Laycock
    Sun, 09:00 - 09:50
    Grand Central - Track 2