About
About Security BSides
BoD & Staff
Speakers
Talks
Press
CoC & Photo Policy
Sponsors
Year-round Support
Media
Archive
Participate
Registration
Call for Volunteers
Call for Papers
Corporate Sponsorship
Individual Donors
Events
Schedule
Slogan Contest
Silent Auction & Raffle
Memorial Observation
Hire Ground
Proving Ground
Training Ground
Evening Entertainment
Daytime Events
Pros vs Joes CTF
Venue
Covid Information
Room Block
Conference Map
Shuttles Info
Middle Ground
Breaking Ground
Common Ground
Ground Floor
Ground Truth
Hire Ground
I Am The Cavalry
PasswordsCon
Proving Ground
Training Ground
Underground
Tuesday
August 9th
Wednesday
August 10th
Middle Ground
Breaking Ground
Common Ground
Ground Floor
Ground Truth
Hire Ground
I Am The Cavalry
PasswordsCon
Proving Ground
Training Ground
Underground
7:30
Registration open
8:30
Middle Ground opens
9:15-10:25
Opening remarks and Keynote in Breaking Ground
10:30-12:30
Talks
12:30-14:00
Lunch break
14:00-15:55
Talks
16:00-16:55
Happy hour
Sponsored by
17:00-19:00
Talks
21:00-1:00
Karaoke by the pool
9:30-10:25
Chris Hoff
Fragilience - The quantum state of survivable resilience in a world of fragile indifference
10:30-11:25
Rock Stevens
,
Matt Hand
Watching the Watchers: Exploiting Vulnerable Monitoring Solutions
11:30-12:25
IDigitalFlame
So You Wanta Build a C2?
14:00-14:55
Jonathan Leitschuh
,
Patrick Way
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
15:00-15:55
Daniel A Donze
See you later, allocator!': Updating Volatility's analysis of modern Linux memory allocators
17:00-17:55
Jonathan Fischer
,
Jeremy Miller
Injectyll-HIDe: Hardware Implants at Scale
18:00-18:55
Omri Misgav
Putting Driver Signature Enforcement Tampering to Rest?!
10:30-11:25
Chris Kubecka
Russian Malware in the Ukraine War
11:30-12:25
Shea Nangle
,
Wendy Knox Everette
I'm a Little Bit (FedRAMP) Country, I'm a Little Bit SOC2 'n Roll
14:00-14:55
Alyssa Miller
How to Win Over Executives and Hack the Board
15:00-15:55
David Levitsky
,
Matthew J Lorimor
Whose encryption key is this? It's a secret to everybody.
17:00-17:55
Kat Fitzgerald
Honey, I'm Home! (Customizing honeypots for fun and !profit)
18:00-18:55
Hossein Siadati
,
Trupti Shiralkar
SBOM challenges and how to fix them!
10:30-11:25
Remi Escourrou
,
Xavier Gerondeau
,
Gauthier Sebaux
CICD security: A new eldorado (talk)
11:30-12:25
Omer Gil
,
Asaf Greenholts
Climbing the Production Mountain: Practical CI/CD Attacks Using CI/CD Goat
14:00-14:55
Cybelle Oliveira
Look! The scammer is coming! The peculiarities of Brazilian frauds, hackers creativity, and their resilience
15:00-15:55
Tanya Janca
When DevSecOps Fails
17:00-17:55
Ron Bowes
From Vulnerability to CTF
18:00-18:55
Karan Dwivedi
Clean Forensics: Analyzing network traffic of vacuum bots
10:30-11:25
Joshua D Saxe
Security AI in the real world: Lessons learned from building practical machine learning systems deployed to hundreds of thousands of networks
14:00-14:55
Ben U Gelman
That Escalated Quickly: A System for Alert Prioritization
15:00-15:55
Joshua D Saxe
,
Younghoo Lee
GPT-3 and me: How supercomputer-scale neural network models apply to defensive cybersecurity problems
17:00-17:55
Emily Austin
Back to Basics: Using Descriptive Statistics to Study the Shape of the Internet
18:00-18:55
Security Data Science Meet-Up
Don't forget to take advantage of our
Career Coaches & Resume Reviewers
10:30-11:25
Steve Winterfeld
Find your north star
11:30-12:25
Wes G Sheppard
Failing Upwards: How to Rise in Cybersecurity by finding (and exploiting) your weaknesses
14:00-14:55
Will Baggett III
Hacking Remote Interviewing: Lessons Learned
10:30-11:25
Joshua Corman
,
Beau Woods
Rivers on Fire; Shaping the next phase of the mission
11:30-12:25
Kendra L Martin
,
Michelle Holko
Lessons Learned from the CISA COVID Task Force & Healthcare Attacks
14:00-15:25
David Batz
STUFF is on Fire - a Panel
15:30-15:55
Don Benack
,
Tom Millar
Target Rich Cyber Poor
17:00-17:55
Leonard Bailey
,
Jack Cable
,
Jen Ellis
The Hip Hacker's Guide to Policy.
18:00-18:55
Day One Feedback Loop: What did we hear?
10:30-10:55
Per Thorsheim
Password surveys are shit!
11:00-11:55
Jeffrey P Goldberg
Can a password management service safely learn about users' passwords?
12:00-12:25
Jeremy Brown
Your Passwords Should Be Shorter
14:00-14:25
Jim Fenton
Comparing Centrally and Locally Verified Memorized Secrets
14:30-14:55
Christiaan J Brand
Passkeys: Where we started and where we’re going
14:30-14:55
Tim Cappalli
,
Andrew Shikiar
,
Christiaan J Brand
,
Per Thorsheim
All Things FIDO (Panel + Q&A)
17:00-17:55
Steve Thomas
bscrypt - A Cache Hard Password Hash
18:00-18:55
Mia Landsem
,
Mia Landsem
Why kidz couldn’t care less about your password advice.
10:30-12:25
Mouse
,
Falcon Darkstar
Proving Ground Prep/Signups
14:00-17:55
Rodrigo Montoro
Speeding Up AWS IAM Least Privileges with Cloudsplaining, Elastic Stack & AWS Access Analyzer
14:00-17:55
Toni De la Fuente
,
Sergio Garcia
Prowler Open Source Cloud Security: A Deep Dive Workshop
14:00-14:55
Kurt Opsahl
,
Andrés Arrieta
,
Hannah Zhao
,
Bill Budington
,
Mukund Rathi
Ask the EFF
15:00-15:55
Andrew Buel
Ask a Fed
18:00-18:55
It’s Malware
Follow the Rabbit