Sched.com Conference Mobile Apps
BSidesSF 2018
has ended
Create Your Own Event
Menu
Schedule
Presenters
Artists
Sponsors
Villagers
Tickets
Search
Log in
Sign up
BSidesSF 2018
Website
|
Twitter
|
Facebook
Schedule
Simple
Expanded
Grid
By Venue
Presenters
Artists
Sponsors
Villagers
Tickets
Search
or browse by date + venue
Capture The Flag
Food & Drink
All
Happy Hour
Party
General
Keynote
All
Talk
Special Event
All
Contest
Mixer
Track 1
All
Panel
Talk
Track 2
All
Talk
Track 3
All
Talk
Village
All
Contest
Workshop 1
Workshop 2
Popular
Popular Events
#1
Fix All The Things: Rapid-fire Stories of Creative Solutions to InfoSec Problems
#2
Opening Remarks
#3
Party!
#4
Demystifying DNS Security – Practical Steps for Reducing Exposure and Detecting Compromise
#5
Tales of Red Teaming, aka "Continuous Intrusion Continuous Deception"
#6
Lunch
#7
Happy Hour
#8
From Bounties to Bureaucracy - The Hidden Market Factors of Exploit Economics
#9
Blue Team Fundamentals
#10
Lunch
#11
Six degrees of infiltration: Using graph to understand your infrastructure and optimize security decision making
#12
Logging, Monitoring, and Alerting in AWS (The TL;DR)
#13
Managing secrets in your cloud environment: AWS, GCP, and containers (and beyond)
#14
Closing Ceremony
#15
Opening Remarks
#16
Breakfast
#17
Breakfast
#18
Unraveling the Threat of Chrome Based Malware
#19
The IoT Hacker's Toolkit
#20
Overcoming obstacles in operationalizing security: A tale from the trenches
#21
So you think you can patch: The game show that questions your security assumptions
#22
Machine Learning: Too smart for its own good.
#23
Your Secrets are Showing! -- How to find if your developers are leaking secrets?
#24
Starting a security program: Thrills and Spills
#25
Simple. Open. Mobile: A Look at the Future of Strong Authentication
#26
Lessons learned implementing meaningful access controls to customer data
#27
Bring in the $$ : Moving Security from Cost Center to Revenue Generator
#28
Crimeware Chaos: Empirical Analysis of HTTP-based Botnet C&C Panels
#29
privacy for safety - opsec when the threat is in the home
#30
Pensieve: Finding malicious artifacts in container environments
#31
Raffle
#32
You want to step outside? What we can learn from Google’s fight with phishing
#33
Caught my WebApp cheating on me!
#34
Ask the EFF
#35
Deconstructing APT28's XAgent for OSX
#36
Violent Python
#37
No more XSS: Deploying CSP with nonces and strict-dynamic
#38
Listen to your Engine: Unearthing Security Signals from the Modern Linux Kernel
#39
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
#40
Raffle
#41
A Case Study of MacOS Supply Chain Compromise
#42
Modern Red Team Immersion Bootcamp, Condensed
#43
Honeypots 2.0: A New ‘Twist’ on Defending Enterprise Networks with Dynamic Deception at Scale
#44
The SecDevOpronomicon - Arcane Secrets for Scaling your Company’s Security
#45
The Memory of a Meltdown, and no we don't mean Britney
#46
The Bucket List: Experiences Operating S3 Honeypots
#47
Rise of coinminers
#48
Building Intelligent Automatons with Semantic Reasoning and Horse Glue
#49
Navigating the Vast Ocean of Browser Fingerprints
#50
Fundamentals of Corporate Physical Access: Attack Surface and Approach
Popular by Type
All Types
Capture The Flag
Food & Drink
General
Keynote
Special Event
Track 1
Track 2
Track 3
Village
Workshop 1
Workshop 2
Popular by Day
All days
Sunday, Apr 15
Monday, Apr 16
Twitter Feed