BSidesLV 2023
took place Aug. 8, 2023 through Aug. 9, 2023 (1 year, 3 months ago) at an unknown location.
Presentations
Tuesday, Aug. 8, 2023
-
09:00 - Opening Remarks - Day One
-
09:30 - And Together We Crossed the River…
-
10:30 - Jumping from cloud to on-premises and the other way around
-
10:30 - Towards Effective & Scalable Vulnerability Management
-
10:30 - Failing Upwards: How to Rise in Cybersecurity by finding (and exploiting) your weaknesses
-
10:30 - F*** Your ML Model
-
10:30 - Build hybrid mobile applications like a security pro!
-
10:30 - Introduction to the Track, Reflections on a Decade of IATC
-
10:30 - Cyber Threat Hunting (CTH) - Day 1
-
10:30 - Authentication Proxy Attacks: Detection, Response and Hunting
-
10:30 - Threat Modeling 101 - Burn risks, not hope
-
10:30 - How to build a security awareness strategy that works!
-
10:30 - Linux Privilege Escalation
-
11:00 - Enemy at the Gate, and Beyond: Detecting and Stopping Account Takeover
-
11:00 - How to communicate with non-security specialists to drive action
-
11:30 - OH-SINT: Merging OSINT Into RE Workflows to Simplify Analysis
-
11:30 - Machine Learning for Insider Threats: At the Intersection of Security and Privacy
-
11:30 - The Dark Playground of CI/CD: Attack Delivery by GitHub Actions
-
11:30 - So Who's Line Is It Anyway? Recruiter Panel
-
11:30 - Energy Poverty and Potential Impacts to Other Critical Infrastructures & Powerful Paths to Progress
-
11:30 - The History of Malware- From Floppies to Droppers
-
11:30 - Lies, Telephony, and Hacking History
-
11:30 - Could Passwordless be Worse than Passwords?
-
12:00 - Breaking In: Unleashing the Power of Physical Offensive Security
-
12:00 - EMBA - From firmware to exploit
-
13:00 - Penetration Testing Experience and How to Get It
-
14:00 - You CAN get there from here!
-
14:00 - Hungry, Hungry Hackers: A Hacker's Eye-view of the Food Supply
-
14:00 - Strategies for secure development with GraphQL
-
14:00 - ZuoRat: Home (not) Alone
-
14:00 - The Telenovela of Latin America Banking Trojans: A Dramatic story about Cybercrime
-
14:00 - Are your secrets safe - How mobile applications are leaking millions of credentials
-
14:00 - Google Workspace Forensics - Insights from Real-World Hunts & IR
-
14:00 - How to prioritize Red Team Findings? Presenting CRTFSS: Common Red Team Findings Score System Ver. 1.0
-
14:30 - Social Engineering: Training The Human Firewall
-
14:30 - Unveiling the Hidden: Discovering RDP Vulnerabilities using PDF Files
-
15:00 - Emulation, PowerPC, and Transition
-
15:00 - Rockstar Role: Security TPM
-
15:00 - Farm to Fork(ed): The Forces Fueling Food Chain Risk
-
15:00 - Building Your Own AI Platform and Tools Using ChatGPT
-
15:00 - High Stakes HIDe-N-SEEK
-
15:00 - Comprehensive Guide to Runtime Security
-
15:00 - Hyper-scale Detection and Response
-
15:00 - Adding SAST to CI/CD, Without Losing Any Friends
-
15:00 - Got Hashes. Need Plains | Hands-on Password Cracking
-
15:00 - Do you know where your secrets are? Exploring the problem of secret sprawl and secret management maturity
-
15:30 - The Importance of Engineering Privacy From the Get Go
-
16:00 - The GitHub Actions Worm: Compromising GitHub repositories through the Actions dependency tree
-
17:00 - Negotiating Compromise: How to avoid being labeled a "Chicken Little" while promoting better security decision making
-
17:00 - Security Data Science Teams: A Guide to Prestige Classes
-
17:00 - The Evolution of Magecart Attacks
-
17:00 - Water, Water Everywhere: The Krakens, Kelpies, and Mermaids in today's Water Sector
-
17:00 - All You Need is Guest: Beyond Enumeration
-
17:00 - Breaking Windows with your ARM
-
17:00 - Password911: Authentication Adventures in Healthcare
-
17:30 - Wrangling Cats: How We Coordinate Red Team Testing
-
18:00 - Hiding in Plain Sight - The Untold Story of Hidden Vulnerabilities
-
18:00 - How to have perfect vulnerability reports and still get hacked
-
18:00 - Follow the white rabbit down the rabbit hole
-
18:00 - Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations
-
18:00 - Public Service Journeys (To and From Hacking Culture)
-
19:00 - BSides Organizers Meet-Up
Wednesday, Aug. 9, 2023
-
09:00 - Opening Remarks - Day Two
-
09:30 - From LLM Obstacles to Open Doors: A Tale of Three CISOs
-
10:30 - Cyber Crash Investigations: Seizing the Opportunity to Learn from Past Crises
-
10:30 - Defense-in-Depth engineering
-
10:30 - Linux Digital Forensics: a theoretical and practical approach
-
10:30 - Pentesting ICS 101
-
10:30 - The Birds, the Bees, and the CVEs: Understanding the Novel Vulnerabilities in Critical Infrastructure
-
10:30 - Cyber Threat Hunting (CTH) - Day 2
-
10:30 - Email Detection Engineering and Threat Hunting
-
10:30 - Passwords: Policies, Securing, Cracking, and More
-
10:30 - Management Hacking 102: Personalities, Empathy, and Difficult Conversations
-
10:30 - Wolves in Windows Clothing: Weaponizing Trusted Services for Stealthy Malware
-
10:30 - Introduction to IATC Day Two
-
10:30 - Enemy Within: Leveraging Purple Teams for Advanced Threat Detection & Prevention
-
10:30 - Cyber risk: How does cyber events become so costly?
-
10:45 - The British are Coming! (To Talk IOT Secure By Design)
-
11:00 - The Brazillian DeepWeb. How Brazilian fraud groups work on Telegram and WhatsApp
-
11:30 - Separating Fact from Fiction: The Realities of Working in Government
-
11:30 - How to Handle Getting Dumped: Compromised Passwords
-
11:30 - Open Source GitOps for Detection Engineering
-
11:30 - Conti Leaks and CARVER Analysis for Threat Intel Analysts
-
11:30 - Shining a light into the security blackhole of IoT and OT
-
11:30 - Double Entry Accounting for Security
-
11:30 - Mainframe Hacking for CICS and Giggles
-
12:00 - Vulnerability Intelligence for All: Say Goodbye to Data Gatekeeping
-
12:00 - Building a Culture of Cybersecurity: A Case Study Approach to Enhancing Risk Management
-
12:00 - Overcoming Barriers in Security DSLs with BabbelPhish: Empowering Detection Engineers using Large Language Models
-
12:30 - It's all about Talent
-
13:30 - An Everything Is On Fireside Chat with Jen Easterly, Director of US C.I.S.A.
-
13:30 - Home Labs for fun and !profit (Put your home lab on your resume!)
-
14:00 - Breaking Business as Usual: Attacking Android Enterprise Solutions
-
14:00 - Cognitive Security and Social Engineering: A Systems-Based Approach
-
14:00 - Gang Gang: Assembling and Disassembling a Ransomware Gang
-
14:00 - You've Gained +2 Perception! Leveling Up Your Red Team with a New Maturity Model
-
14:00 - Your Ad Here: Helping your organization build their security brand
-
14:00 - Saving Lives in Healthcare: Trust, Teamwork, Tangible Outcomes (Decade of Change) with special government teammates
-
14:00 - How I Met Your Printer
-
14:30 - Actions have consequences: The overlooked Security Risks in 3rd party GitHub Actions
-
15:00 - Navigating Security pitfalls during M&A : Playbooks & Strategies for doing acquisitions right
-
15:00 - System Dynamics in Risk Management: A Primer
-
15:00 - Build Your Own Cat-Shaped USB Hacking Tool!
-
15:00 - Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform
-
15:00 - Big SIEM Energy at micro-SIEM cost
-
15:00 - Hunting Cryptoscam Twitter Bots: Methods, Data & Insights
-
17:00 - Playing Games with Cybercriminals
-
17:00 - The attackers guide to exploiting secrets in the universe
-
17:00 - The Ever-shifting Habits of Cloud-focused Malware Campaigns
-
17:00 - The Art of Letting Go: Secure delegation of permissions in AWS environments
-
17:00 - A Hacker's Guide for Changing The World (and Where do we go from Here?)
-
17:00 - Sure, Let Business Users Build Their Own. What Could Go Wrong?
-
17:00 - It's not the end of the world but you can see it from here.
-
17:30 - Are We too Early for the Party? (the perils of Baking Cyber in from the Beginning)
-
17:55 - Regular expressions are good, actually: A technical deep-dive into an ideal infosec regex implementation
-
18:00 - Next Generation Enterprise Security
-
18:00 - Trusted Devices: Unlocking a Password Manager without a password
-
18:00 - For Intel and Profit: Exploring the Russian Hacktivist Community
-
18:00 - Good Doesn't Always Win: Understanding technical and enterprise tradeoffs in Cybersecurity
-
18:00 - Oops, I Leaked It Again - How we found PII in exposed RDS Snapshots
-
18:30 - What the Yandex Leak Tells Us About How Big Tech Uses Your Data
-
19:00 - Closing Ceremony