BSidesLV 2019 - Tuesday, August 6
08:00
Durve
Windows Breakout and Privilege Escalation
Pearson
Knowing the Unknown: Using PCAP to Break Down Application-Layer Protocols
Biddlecome, Bowne
Reverse Engineering Android Apps
Duncan
Malware Traffic Analysis Workshop
09:00
Matwyshyn
Professionalization - Possibilities and Potholes
09:30
Opening Remarks
Board Communications
10:00
Lord
Keynote with Bob Lord
Pratt, Turner
Reverse Engineering the Cyber Policy API
11:00
Zero Trust
11:30
Beginners Session: Lock Picking
Tsakalidis
BEEMKA / Electron Post-Exploitation When The Land Is Dry
Orleans
DLP Sucks and Why You Should Use It
Mirosh, Munoz
SSO Wars: The Token Menace
Breuer, Terp
Applying Information Security Paradigms to Misinformation Campaigns: A Multidisciplinary Approach
Roberts
Now that you hacked the plane, what are you going to do about your career?
Corman, Woods
I Am The Cavalry Track Welcome and Overview
DeSombre
Bestsellers in the Underground Economy - Measuring Malware Popularity by Forum
Lidell
Duck and (Re)Cover - The missing link in the security evolution
12:00
Young
Addressing non-linear InfoSec career paths
Kiley
Can the CAN bus fly ­Risks of CAN bus networks within avionics systems
Frost
Examining DES-based Cipher Suite Support within the TLS Ecosystem
13:00
Supply Chain Security
14:00
Grant
Unpacking pkgs: A look inside macOS Installer packages and common security flaws
Bort, Friedman, Kubecka
Where in the world are Carmen's $adjective cyber attacks: The game show that wonders why things aren't worse
Yosha
My quest for (privileged) identity to own your domain
Hawes
Building an enterprise security knowledge graph to fuel better decisions, faster
Burgett
Discovering Your Passion in Cyber Security
Angus
Coordinated Disclosure of ICS Products: Who's got time for that?
Wilson
Satellite Vulnerabilities 101
Trimble
What's Next in Coordinating Vulnerability Disclosures
Daubresse, Escourrou
Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths
Hunt, Manners
Hands-on: How to Use CALDERA's Chain Mode
Nigam
Reverse Engineering Mobile Apps: Never Pay for Transit Again
14:30
AppSec/SDLC/DevSecOps
Grigg
Hack (Apart) Your Career - How to Fund Doing What You Love
Ottenheimer
AIs Wide Open - Making Bots Safer Than Completely $#%cking Unsafe
Maasakkers
Analyzing user decision making on phishing sites - using mouse data and keyboard dynamics
15:00
Barnhart-Magen, Caltum
Using Machines to exploit Machines - harnessing AI to accelerate exploitation
Brenes, Rodriguez
The Contemplator Approach: Data Enrichment Through Elastic Stack
Paul
Enterprise Overflow: How Breached Credentials Impact Us All
OBrien
Grapl - A Graph Platform for Detection and Response
Friedman
The Case for Software Bill of Materials
Baggett
Broken Arrow: applying InfoSec and Forensic practices to escape domestic abuse
Aliapoulios, Gray
Giving Credit Where It's Not Due: Visualizing Joker's Stash
15:30
Crisis Communication & Brand Monitoring
Atkin
The Human API: Evolving End Users From Authorized Adversaries Into Our Best Defense.
16:00
HSC^2 Hacker Summer Camp Hacker Standup Comedy
Lock Picking Contest
Ottenheimer
AIs Wide Open - Making Bots Safer Than Completely #$%cking Unsafe
16:30
CISO Unconference
17:00
Misgav, Yavo
Meltdown's Aftermath: Leveraging KVA Shadow To Bypass Security Protections
Ihezukwu, Messdaghi, Miller
Mind the Diversity Gap - A Panel Discussion
Brunn
Give the dog a bone - Exploring OSINT capabilities of pen-testing tools
Austin
Profiling User Risk: Borrowing from Business Intelligence to Understand the Security of Your Userbase
Wattanasin
How to Fail Well (In Order to be Successful) - From IT to Infosec & More
Brown
Automatic Security Analysis of IoT Firmware
Barnes
Burpsuite Team Server - Collaborative Web Pwnage
An
China as a New Russia? Analyzing Similarities and Differences of Chinese Threat Actors from their Russian Counterparts
17:30
Closing Remarks
Cho, Duren, Rides
Behind the Recruiting Curtain: What Do Recruiters Really Say and Do
Smile
The Resilient Hacker: Growth Mindset, Health Hacks & Powerful Help to Navigate Personal Challenges
18:00
Canham, Sawyer
Neurosecurity: where Infosec meets Brain-machine Interface
Meet the CISO
Tong
Why FIDO Security Keys & WebAuthn are Awesome
Seymour
Reducing Inactionable Alerts via Policy Layer
Luczynski
I Just Want to Help Make Flying More Secure...not Work with the Government or How I Learned to Love a Govvie
Chandler
So you think you can CHMOD
Galperin, McKinney, Opsahl, Sheard
Ask the EFF
18:30
Applebaum
Trying (Unsuccessfully) to Make Meterpreter into an Adversarial Example
Dietle
Building the badge- How you can make small, cheap and custom hardware for function or fashion
19:00
Security BSides Organizers Meet-Up
Brandon
Evaluating Code Embeddings
Thurston
Salesforce Data Governance What dark secrets lurk in your instance??
20:00
Queercon BSides Poolside Mixer
Friends of Bill W
21:30
The New Hacker Pyramid
BSidesLV 2019 - Wednesday, August 7
08:00
King, Whitehead
Hacking the STORM
Wylie
Using Wireshark for Incident Response and Threat Hunting
Allor, Manico
Tournament: The Ultimate Secure Coding Throw Down
Barnhart-Magen
Linux Hardening - The Easy Way
Cheung
Introduction to Cryptographic Attacks
09:00
McGregor, Nix, Turner
Free and Fair Elections in an Internet Era
10:00
Rich
Loki: Add a little chaos to your USB drive
Kubecka
The Road to Hell is Paved with Bad Passwords
Nader
Breaking Smart [Bank] Statement
Harang
Security data science -- Getting the fundamentals right
Tomaschik
CTFs for Fun and Profit: Playing Games to Build your Skills
Elkins
How to Treat Your Hacker (and Responsible Vulnerability Disclosure)
Jansson
Making your website vulnerable for fun and security awareness
Bailey
Let's hear from the Hackers: What should DOJ do next?
10:30
Murray
The Importance of Culture in Security
Koch
Human Honeypots or: How I Learned to Stop Worrying and Love the Implant
11:00
Reynolds
From EK to DEK: An Analysis of Modern Document Exploit Kits
Lazarovitz, Stoler
Prisoner Number Six
Sishi
An investigation of the security of passwords derived from African languages
Weiss
Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection
Levy, Mosier
Hidden Networks Pivoting: Redefining DNS Rebinding Attack
Goldstein, Lieberman-Berg
Hacking the Pentagon: How a Rebel Alliance Shifts Culture to Protect National Security
O’Connell
The struggles of teaching automation
11:30
Maresca
Hacking from Above: A Brief Guide for Transitioning to Leadership
Saulnier
The SOC Counter ATT&CK
12:00
Vigo
From email address to phone number
Galloway
Excuse Me, Your Sword Is In My Eye: Responding to Red Teams and Intrusions in 2019 and Beyond
Wasson
(Im)proper Database Authentication
Anderson
Old things are new again: efficient automatic signature generation for malware classification
Fousekis
Low & Slow - Techniques for DNS Data Exfiltration
Manning
Certification and Labeling in IoT
Redman
The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage
13:30
Seidman
Noobs: Training the Next Generation of Security Engineers
14:00
Price
Virtual Breakpoints for x86_64
Ledoux
Escape the Questionnaire Quagmire: A thoughtful approach to addressing security inquiries from customers and prospects
Chandramouleeswaran, Sudheer
Who dis? The Right Way To Authenticate
Kumar
Reduce, Reuse and Recycle ML models - and the security powers is yours
Case
Windows 10 DFIR Challenges
Sbano
Startup Security Leadership: Lessons to Level Up from Fortune 100 to Tech Startup
Dant
Real World Security in a Clinical Healthcare Environment: Hacking a Hospital
Johnston-Ison
I’m a hunter! But what does that mean?
Manning
Certification and Labeling for IoT
Soullie, Torrents
Pentesting ICS 102
Brake, Rebeschini
Finding Evil with Mitre ATT&CK and the Elastic Stack
Hanlon
Hands on Hacking The OWASP TOP 10 and beyond
14:30
Hahn, Szczutowski
Getting CVSS, NVD, and CVEs to Work for You: Standardizing and Scaling Your Vulnerability Risk Analysis
Morgan
Breaking the Bodyguards
15:00
Mosier
ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator
Romailler
Have You Distributed Randomness?
Mar-Elia
Exploiting Windows Group Policy for Reconnaissance and Attack
Landers, Pearce
Scheming with Machines: Using ML to Support Offensive Teams
Williams, Yoder
ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for better sleep and a safer tomorrow.
Cox, Lyngaas, Newman, Zetter
Why journalists and hackers need each other (a panel discussion with infosec reporters)
Pahi
Cover Your A**
15:30
SHIMANAKA
Cyber Deception after Detection: Safe observation environment using Software Defined Networking
16:00
Sugarman
Why we need a Cyber Peace Institute
17:00
Abeles, Shavit
At Your Service - Abusing the Service Workers Web API
Dickinson
CloudSec Rules Everything Around Me (C.R.E.A.M.)
Handorf, Opsahl
Why can't we be friends? (Ask a Fed & the EFF.)
Burgess
Birthday Hunting
Obenhaus, Stoner
Cyber Threat Intel & APTs 101
Cornelius, Dixon
We the People: Providing for a 'common defence' with CVD
Skelton
Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes
17:30
Sconzo
All that glitters isn't Chrome: Hunting for suspicious browser extensions
Caswell
Baited Canaries - Monitoring attackers with active beacons
18:00
HAM License Exams
Doussot, Meyer
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin
Bailey, Beardsley, Ellis, Morgan
Meet the Nation This Week on Sunday: A Special Vulnerability Edition
Baker, Edwards
Scratching the Surface of Risk
Markham
Musings of an Accidental CISO
Bort
No IOUs with IOT
TEMMAR
Securing Fast (and Furious) DevOps pipelines
18:30
Elazari
"Hackers of the world - unite?"
Weinberg
Please inject me, a x64 code injection
19:00
Closing Ceremonies
20:00
Friends of Bill W (Sat.)
22:00
BSidesLV Pool Party


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.