Sched.com Conference Mobile Apps
BSidesLV 2016
has ended
Create Your Own Event
BSidesLV 2016
-
Saved To
My Schedule
Welcome to BSidesLV 2016, our 8th annual BSides in beautiful Las Vegas, Nevada!
Schedule
Simple
Expanded
Grid
By Where
Speakers
Artists
Sponsors
Senior Staff
Participants
#BSidesBus and Venue Map
Search
or browse by date + venue
Breaking Ground
Common Ground
Event
Ground Truth
Hire Ground
I Am The Cavalry
Keynote
Passwords
Proving Ground
Training Ground
Underground
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Artists
Sponsors
Senior Staff
Participants
#BSidesBus and Venue Map
Search
tune
Filter sessions
Simple
Expanded
Grid
By Where
Tuesday
, August 2
Breaking Ground
11:00 •
Managing Security with the OWASP Assimilation Project.
11:45 •
Are You A PenTexter? Open-Sourcing Pentest Reporting and Automation.
14:00 •
Breaking the Payment Points of Interaction (POI)
15:00 •
Beyond the Tip of the IceBerg -- Fuzzing Binary Protocol for Deeper Code Coverage.
17:00 •
Operation Escalation: How Commodity Programs Are Evolving Into Advanced Threats
18:00 •
Ingress Egress: The emerging threats posed by augmented reality gaming.
Chill-Out Room
10:00 •
Opening Keynote Pt. I & II
10:00 •
PvJ CTF
11:00 •
Lock Pick Village
21:30 •
The New Hacker Pyramid
Common Ground
11:00 •
Shall We Play A Game? 30 Years of the CFAA
14:00 •
Welcome to The World of Yesterday, Tomorrow!
15:00 •
Exposing the Neutrino EK: All the Naughty Bits
17:00 •
How to travel to high-risk destinations as safely as possible
18:00 •
DYODE: Do Your Own DiodE for Industrial Control Systems.
Ground Truth
11:00 •
Data Science or Data Pseudo-Science? Applying Data Science Concepts to Infosec without a PhD
12:00 •
Deep Adversarial Architectures for Detecting (and Generating) Maliciousness
14:00 •
Flaying out the Blockchain Ledger for Fun, Profit, and Hip Hop
15:00 •
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
17:00 •
Why it's all snake oil - and that may be ok
18:00 •
How to make sure your data science isn’t vulnerable to attack
Hire Ground
11:00 •
Hire Ground - Opening Remarks
11:30 •
Hire Ground - Open Sessions
12:00 •
Navigating Different Career Paths in Security
14:30 •
Resume Reviews, Mock Interviews and Networking...Oh My!
15:30 •
#recruiterfail vs #candidatefail
17:00 •
How to Become "The" Security Pro
17:30 •
Resume Reviews, Mock Interviews and Networking...Oh My!
18:30 •
How to Stand Out to Talent Acquisition
I Am The Cavalry
11:00 •
IATC Introduction and Overview
11:30 •
Calling All Hacker Heroes: Go Above And Beyond
12:00 •
Panel: Progress On Cyber Safety
14:00 •
Cyber Safety And Public Policy
15:00 •
State Of Healthcare Cyber Safety
16:00 •
State Of Automotive Cyber Safety
Passwords16
11:00 •
Toward Better Password Requirements
12:00 •
What's Up Argon2? The Password Hashing Winner A Year Later
14:00 •
Rock Salt: A Method for Securely Storing and Utilizing Password Validation Data
15:00 •
What we've learned with Two-Secret Key Derivation
17:00 •
I Love myBFF (Brute Force Framework)
17:30 •
Evaluating a password manager
18:00 •
Why does everyone want to kill my passwords?
Proving Ground
11:00 •
Network Access Control: The Company-Wide Team Building Exercise That Only You Know About
11:30 •
Intro to Storage Security, Looking Past the Server
12:00 •
Automation of Penetration Testing and the future
14:00 •
Cruise Line Security Assessment OR Hacking the High Seas
14:30 •
Security Vulnerabilities, the Current State of Consumer Protection Law, & how IOT Might Change It
15:00 •
How to Get and Maintain your Compliance without ticking everyone off
17:00 •
Pushing Security from the Outside
17:30 •
DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools
18:00 •
CFPs 101
Training Ground I & II
08:30 •
Doxing yourself through FOIA: understanding agency data structures to reverse engineer FOIA requests.
FULL
08:30 •
Mobile App Attack
FULL
14:00 •
Mobile App Attack
FULL
14:00 •
How to securely build your own IoT enabling embedded systems: from design to execution and assessment
FULL
Tuscany Casino Parking Lot
19:15 •
Super Soaked Hackers Water Balloon Fight for Hak4Kidz #SSH4K
Tuscany Pool
19:30 •
QueerCon Mixer
Underground
11:00 •
What Snowden and I Have in Common - Reflections of an ex-NSA Hacker
14:00 •
Active Incident Response
15:00 •
Generation C: "Hacker" Kids and the Innovation Nation
17:00 •
An Adversarial View of SaaS Malware Sandboxes
18:00 •
A Peek Behind Vegas Surveillance
Wednesday
, August 3
Breaking Ground
10:00 •
Hunting high-value targets in corporate networks.
10:45 •
Powershell-Fu – Hunting on the Endpoint
11:30 •
Domains of Grays.
14:00 •
Six Degrees of Domain Admin - Using BloodHound to Automate Active Directory Domain Privilege Escalation Analysis
15:00 •
Is that a penguin in my Windows?
17:00 •
Building an EmPyre with Python.
18:00 •
One Compromise to Rule Them All
Chill-Out Room
10:00 •
Lock Pick Village
10:00 •
PvJ CTF
Common Ground
10:00 •
Don't Repeat Yourself: Automating Malware Incident Response for Fun and Profit
11:00 •
Survey says… Making progress in the Vulnerability Disclosure Debate
14:00 •
The Future of BSides
15:00 •
Hacking Megatouch Bartop Games
17:00 •
An Evolving Era of Botnet Empires
18:00 •
Cross-platform Compatibility: Bringing InfoSec Skills into the World of Computational Biology
Ground Truth
10:00 •
Ground Truth Keynote: Great Disasters of Machine Learning
10:35 •
No Silver Bullet. Multi contextual threat detection via Machine Learning.
11:35 •
Labeling the VirusShare Corpus: Lessons Learned
14:00 •
Determining Normal: Baselining with Security Log and Event Data
15:00 •
CyPSA Cyber Physical Situational Awareness
17:00 •
Dominating the DBIR Data
18:00 •
QUESTIONING 42: Where is the “Engineering” in the Social Engineering of Namespace Compromises?
Hire Ground
10:00 •
Hacking Is Easy, Hiring Is Hard: Managing Security People
10:30 •
Resume Reviews, Mock Interviews and Networking...Oh My!
11:30 •
Owning Your Career on a Daily Basis
12:00 •
Improving Your Personal Value Proposition to Take that Next Step in Your Career
14:30 •
Resume Reviews, Mock Interviews and Networking...Oh My!
15:00 •
Hacking Tech Interviews
15:30 •
Exploiting the Recruitment Process
16:00 •
PeerLyst Meet and Greet
17:00 •
Common Mistakes Seen in Interviews
17:30 •
Resume Reviews, Mock Interviews and Networking...Oh My!
I Am The Cavalry
10:00 •
IATC Day 2: Introduction and Overview
10:30 •
Uncomfortable Truths
14:00 •
Uncomfortable Approaches
16:00 •
IATC Closing
Passwords16
10:00 •
Crafting tailored wordlists with Wordsmith
11:00 •
Making Password Meters Great Again
12:00 •
Proactive Password Leak Processing
14:00 •
Modeling Password Creation Habits with Probabilistic Context Free Grammars
15:00 •
Passphrases for Humans: A Cultural Approach to Passphrase Wordlist Generation
17:00 •
PAL is your pal: Bootstrapping secrets in Docker
18:00 •
The Deal with Password Alternatives
Proving Ground
10:00 •
Mapping the Human Attack Surface
10:30 •
A Noobs Intro Into Biohacking, Grinding, DIY Body Augmentation
11:00 •
Stop the Insanity and Improve Humanity: UX for the Win
11:30 •
There is no security without privacy
12:00 •
You Don't See Me - Abusing Whitelists to Hide and Run Malware
14:00 •
Automated Dorking for Fun and Pr^wSalary
14:30 •
Latest evasion techniques in fileless malware
15:00 •
PLC for Home Automation and How It Is as Hackable as a Honeypot
15:30 •
Automation Plumbing
17:00 •
Digging into SIEM Alerts with Visual Graph Analytics
17:30 •
Scalability: Not as Easy as it SIEMs
18:00 •
Ethical implications of In-Home Robots
Training Ground I & II
08:30 •
Mobile App Attack
FULL
08:30 •
Pentesting Industrial Control Systems : Capture the Flag!
FULL
14:00 •
Hands-on Cryptography with Python
FULL
14:00 •
Mobile App Attack
FULL
Tuscany Pool
22:00 •
BSidesLV Pool Party Sponsored by STAGEFRIGHT #BBMFTW
Underground
10:00 •
Ask The EFF
11:30 •
Why Can't We Be Friends?
14:00 •
How to Rob a Bank – or The SWIFT and Easy Way to Grow Your Online Savings Account
15:00 •
That Which Must Not Be Spoken Of: A Personal Look at Mental Health in Infosec
17:00 •
Stealing Food From the Cat's Mouth
18:00 •
Why Snowden’s Leaks Were Inevitable
Timezone
BSidesLV 2016
America/Los Angeles
Filter By Date
BSidesLV 2016
Aug 2
-
3, 2016
Tuesday
, August 2
Wednesday
, August 3
Filter By Where
Las Vegas, NV, United States
Sort schedule by Where
Breaking Ground
Chill-Out Room
Common Ground
Ground Truth
Hire Ground
I Am The Cavalry
Passwords16
Proving Ground
Training Ground I & II
Tuscany Casino Parking Lot
Tuscany Pool
Underground
Filter By Type
Breaking Ground
Common Ground
Event
Ground Truth
Hire Ground
I Am The Cavalry
Keynote
Passwords
Proving Ground
Training Ground
Underground
Recently Active Participants
Reed Loden
ET
Events Team
NS
nicole schwartz
Reg Levy
James Troutman
Colleen Stevens
Jon Zeolla
Joseph Zadeh
More →
Filter sessions
Apply filters to sessions.
close
Dates
Tuesday
, August 2
Wednesday
, August 3
Venue
Breaking Ground
Chill-Out Room
Common Ground
Ground Truth
Hire Ground
I Am The Cavalry
Passwords16
Proving Ground
Training Ground I & II
Tuscany Casino Parking Lot
Tuscany Pool
Underground
Session Type
Breaking Ground
Common Ground
Event
Ground Truth
Hire Ground
I Am The Cavalry
Keynote
Passwords
Proving Ground
Training Ground
Underground
Other Filters