InfoconDB
Toggle navigation
Support
About
InfoconDB
Security BSides
BSidesSF 2017
BSidesSF 2017
BSidesSF 2017
took place Feb. 12, 2017 through Feb. 13, 2017 (8 years ago) at an unknown location.
http://www.securitybsides.com/w/page/111866644/BSidesSF2017
Presentations
Sunday, Feb. 12, 2017
10:30 -
Illusion vs Reality: An FBI Agent’s take on how private sector realities are masked by government sector illusions of intelligence sharing, public-private partnerships and best practices
11:45 -
Reducing “Mixtape to Master Key” Scenarios: How to block the Dark Army from mayhem using API-driven access control
11:45 -
DNS attacks, a history and overview
12:25 -
Building an Effective Intrusion Detection Program
12:25 -
Assessing the Embedded Devices On Your Network
13:30 -
Exploiting Broken Webapps
13:30 -
Weathering the Storm: The Art of Crisis Communications
13:30 -
Make Alerts Great Again
14:10 -
Security through Visibility: Organizational Communication Strategies for InfoSec Teams
14:10 -
BeyondCorp: Beyond “fortress” security
14:50 -
Live Dissection: Anatomy of a Browser Based Botnet
14:50 -
Better SSH management with ephemeral keys
15:30 -
The Cyber Insurance Emperor Has No Clothes
15:30 -
Advanced Internet dataset combinations for #ThreatHunting & Attack Prediction
16:10 -
Linux Monitoring at Scale with eBPF
16:10 -
How to Build a Security Team and Program
16:50 -
Tired of Playing Exploit Kit Whack-A-Mole? Let's automate
16:50 -
Should I Pay or Should I Go? Game Theory and Ransomware
17:20 -
Ask the EFF
Monday, Feb. 13, 2017
09:30 -
Swimming Upstream: Regulation vs Security
10:45 -
How Secure are your Docker Images?
10:45 -
Witchcraft Compiler Collection : Towards programs self awareness
11:30 -
Fighting Email Phishing with a Custom Cloud IDS
11:30 -
Five Keys to Building an Application Security Program in the Age of DevOps
13:30 -
When Bandit(s) Strike - Defend your Python Code
13:30 -
#securityselfie (size up your appsec program with new metrics)
13:30 -
Exploiting Websites Hands-On
14:10 -
Opinionless Enforcement of Opinions on Operational Secrets
14:10 -
Securing Kubernetes
14:50 -
AtomBombing: Injecting Code Using Windows’ Atoms
14:50 -
Hijacking .NET to Defend PowerShell
15:30 -
Access Control with Concierge: One Tool to Rule Them All
15:30 -
Bypassing malware analysis sandboxes is easy, let’s discuss how they are doing it and why it works
16:10 -
Look Ma, No Hands! - Decentralizing security for scale
16:10 -
Does DoD Level Security Work in the Real World?
16:50 -
The Underground Economy of Apple ID
16:50 -
Dormant DOMination
Presenters
Alex Maestretti
Amanda Rousseau
Anjum Ahuja
Aren Sandersen
Arian J Evans
Brendan Gregg
Chris Dorros
Chris Steipp
Claud Xiao
Dan Borges
Daniel Popescu
David Tomaschik
E. Coleen Coolidge
Erica Portnoy
Gennie Gebhart
Gough, Michael
Ilya Nesterov
Jamie Lee Williams
Jason Craig
Jason Truppi (@NotTruppi)
Jeff Man
Jen Ellis
Jesse Endahl
Jim O'Leary
Jonathan Brossard /
endrazine
Jonathan Freedman
Josh Feinblum
Karthik Rangarajan
Katie Ledoux
Kurt Opsahl
Manideep Konakandla
Nate Cardozo
Neal Mueller
Nick Mckenna
Niru Ragupathy
Robert Wood
Russell C. Thomas
Sam Bowne
Steve Ginty
Tal Liberman
Tim Jarrett
Tony Martin-Vegue
Travis McPeak
Udi Yavo
Vivian Ho
xntrik