About
About Security BSides
BoD & Staff
Speakers
Talks
Press
CoC & Photo Policy
Sponsors
Year-round Support
Media
Archive
Participate
Registration
Call for Volunteers
Call for Papers
Corporate Sponsorship
Individual Donors
Events
Schedule
Silent Auction & Raffle
Hire Ground
Proving Ground
Training Ground
Evening Entertainment
Daytime Events
Pros vs Joes CTF
Venue
Covid Information
Room Block
Conference Map
Shuttles Info
Middle Ground
Breaking Ground
Common Ground
Ground Floor
Ground Truth
Hire Ground
I Am The Cavalry
PasswordsCon
Proving Ground
Training Ground
Underground
Tuesday
August 8th
Wednesday
August 9th
Middle Ground
Breaking Ground
Common Ground
Ground Floor
Ground Truth
Hire Ground
I Am The Cavalry
PasswordsCon
Proving Ground
Training Ground
Underground
12:30-13:55
Lunch Break
20:00-02:00
Volunteer Appreciation Poolside Karaoke
08:00-08:05
Registration Re-Opens
08:30-08:55
Middle Ground Opens Day 2
09:30-10:30
Day Two Opening Remarks & Keynote in Breaking Ground
10:30-12:30
Talks
12:30-14:00
Lunch Break
14:00-15:55
Talks
16:00-16:55
Happy Hour
17:00-18:55
Talks
20:00-21:30
Friends Of Bill W Meet-Up
22:00-04:00
BSides Las Vegas Pool Party
09:00-09:20
Daemon Tamer
Opening Remarks - Day Two
09:30-10:15
Sounil Yu
From LLM Obstacles to Open Doors: A Tale of Three CISOs
10:30-11:15
Michael Bargury
Wolves in Windows Clothing: Weaponizing Trusted Services for Stealthy Malware
11:30-12:15
Jay Smith
,
Jan Nunez
Mainframe Hacking for CICS and Giggles
13:30-13:55
Keren Elazari
,
Jen Easterly
An Everything Is On Fireside Chat with Jen Easterly, Director of US C.I.S.A.
14:00-14:45
Priyank Nigam
Breaking Business as Usual: Attacking Android Enterprise Solutions
15:00-15:45
Or Aspir
Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform
17:00-17:45
Matt Muir
The Ever-shifting Habits of Cloud-focused Malware Campaigns
18:00-18:45
Ariel Szarf
,
Doron Karmi
Oops, I Leaked It Again - How we found PII in exposed RDS Snapshots
19:00-19:45
Daemon Tamer
Closing Ceremony
10:30-11:15
David Stocks
,
Julia Wighton
Cyber Crash Investigations: Seizing the Opportunity to Learn from Past Crises
11:30-11:50
will baggett
Conti Leaks and CARVER Analysis for Threat Intel Analysts
12:00-12:20
Jerry Gamblin
Vulnerability Intelligence for All: Say Goodbye to Data Gatekeeping
14:00-14:45
Leif Dreizler
,
Coleen Coolidge
Your Ad Here: Helping your organization build their security brand
15:00-15:45
Kenneth Kaye
Big SIEM Energy at micro-SIEM cost
17:00-17:20
Michael Bargury
Sure, Let Business Users Build Their Own. What Could Go Wrong?
17:30-17:50
Steve Bichler
,
Lillian Ash Baker
Are We too Early for the Party? (the perils of Baking Cyber in from the Beginning)
18:00-18:20
Vanessa Redman
Good Doesn't Always Win: Understanding technical and enterprise tradeoffs in Cybersecurity
18:30-18:50
Kaileigh McCrea
What the Yandex Leak Tells Us About How Big Tech Uses Your Data
10:30-11:15
Jayson Grace
,
Adam Bradbury
Enemy Within: Leveraging Purple Teams for Advanced Threat Detection & Prevention
11:30-12:15
Zach Wasserman
Open Source GitOps for Detection Engineering
14:00-14:20
Brent Harrell
,
Garet Stroup
You’ve Gained +2 Perception! Leveling Up Your Red Team with a New Maturity Model
14:30-14:50
Yaron Avital
Actions have consequences: The overlooked Security Risks in 3rd party GitHub Actions
15:00-15:45
Murali Vadakke Puthanveetil
,
vinay prabhushankar
Navigating Security pitfalls during M&A : Playbooks & Strategies for doing acquisitions right
17:00-17:45
Sara Perez
The Art of Letting Go: Secure delegation of permissions in AWS environments
18:00-18:45
Josh Bressers
Next Generation Enterprise Security
10:30-11:15
Wendy Hou-Neely
Cyber risk: How does cyber events become so costly?
11:30-11:50
Sounil Yu
Double Entry Accounting for Security
12:00-12:20
Bobby Filar
Overcoming Barriers in Security DSLs with BabbelPhish: Empowering Detection Engineers using Large Language Models
14:00-14:45
Matthew Canham
,
Dr. Ben D. Sawyer
Cognitive Security and Social Engineering: A Systems-Based Approach
15:00-15:45
Stephanie Losi
System Dynamics in Risk Management: A Primer
17:00-17:45
Jonathan Lusthaus
Playing Games with Cybercriminals
17:55-18:40
Rob King
Regular expressions are good, actually: A technical deep-dive into an ideal infosec regex implementation
Don't forget to take advantage of our
Career Coaches & Resume Reviewers
10:30-11:15
Tom Eston
Management Hacking 102: Personalities, Empathy, and Difficult Conversations
11:30-12:15
Steve Luczynski
,
Ayan Islam
,
Arun Viswanathan
,
Chris Paris
,
Tim Weston
Separating Fact from Fiction: The Realities of Working in Government
12:30-13:15
Barry Maclaughlin SHRM-SCP
It's all about Talent
13:30-14:15
Kat Fitzgerald
Home Labs for fun and !profit (Put your home lab on your resume!)
15:00-18:00
Resume Review & Career Coaching (Day 2)
10:30-10:45
Josh Corman
Introduction to IATC Day Two
10:45-12:30
Charlie Gladstone
,
David Rogers MBE
,
Peter Stephens
The British are Coming! (To Talk IOT Secure By Design)
14:00-15:55
Dr. Suzanne Schwartz
Saving Lives in Healthcare: Trust, Teamwork, Tangible Outcomes (Decade of Change) with special government teammates
17:00-18:50
Josh Corman
,
Beau Woods
A Hacker’s Guide for Changing The World (and Where do we go from Here?)
10:30-11:15
Derek Melber
Passwords: Policies, Securing, Cracking, and More
11:30-11:50
Susan Paskey
How to Handle Getting Dumped: Compromised Passwords
14:00-14:45
Tom Pohl
How I Met Your Printer
17:00-17:45
Mackenzie Jackson
The attackers guide to exploiting secrets in the universe
18:00-18:45
Rick van Galen
,
James Griffin
Trusted Devices: Unlocking a Password Manager without a password
10:30-10:55
Iain Deason
The Birds, the Bees, and the CVEs: Understanding the Novel Vulnerabilities in Critical Infrastructure
11:00-11:20
Thiago Bordini
The Brazillian DeepWeb. How Brazilian fraud groups work on Telegram and WhatsApp
11:30-11:55
(void *)Huxley Barbee
Shining a light into the security blackhole of IoT and OT
12:00-12:25
Lewis Heuermann
Building a Culture of Cybersecurity: A Case Study Approach to Enhancing Risk Management
10:30-18:30
Josh Kamdjou
,
Alfie Champion
Email Detection Engineering and Threat Hunting
10:30-14:30
Thomas DIOT
,
Maxime Meignan
,
Axel Roc
Linux Digital Forensics: a theoretical and practical approach
10:30-18:30
Bruno Guerreiro
Cyber Threat Hunting (CTH) -- Day 2
10:30-18:00
John Poulin
,
Michael McCabe
Defense-in-Depth engineering
10:30-14:30
Arnaud SOULLIE
,
Alexandrine Torrents
Pentesting ICS 101
15:00-19:00
Alex Lynd
Build Your Own Cat-Shaped USB Hacking Tool!
14:00-14:45
Ms.Harb
Gang Gang: Assembling and Disassembling a Ransomware Gang
15:00-15:45
Gal Bitensky
Hunting Cryptoscam Twitter Bots: Methods, Data & Insights
17:00-17:45
Nathan Case
It's not the end of the world but you can see it from here.
18:00-18:45
Daniel Smith
,
Pascal Geenens
For Intel and Profit: Exploring the Russian Hacktivist Community