Sched.com Conference Mobile Apps
BSidesSF 2018
has ended
Create Your Own Event
BSidesSF 2018
Website
|
Twitter
|
Facebook
Schedule
Simple
Expanded
Grid
By Venue
Presenters
Artists
Sponsors
Villagers
Tickets
Search
or browse by date + venue
Capture The Flag
Food & Drink
All
Happy Hour
Party
General
Keynote
All
Talk
Special Event
All
Contest
Mixer
Track 1
All
Panel
Talk
Track 2
All
Talk
Track 3
All
Talk
Village
All
Contest
Workshop 1
Workshop 2
Popular
menu
Menu
Schedule
Presenters
Artists
Sponsors
Villagers
Tickets
Search
Popular Events on Sunday, April 15
#1
Opening Remarks
#2
Party!
#3
Tales of Red Teaming, aka "Continuous Intrusion Continuous Deception"
#4
Lunch
#5
From Bounties to Bureaucracy - The Hidden Market Factors of Exploit Economics
#6
Blue Team Fundamentals
#7
Six degrees of infiltration: Using graph to understand your infrastructure and optimize security decision making
#8
Breakfast
#9
Overcoming obstacles in operationalizing security: A tale from the trenches
#10
So you think you can patch: The game show that questions your security assumptions
#11
Machine Learning: Too smart for its own good.
#12
Your Secrets are Showing! -- How to find if your developers are leaking secrets?
#13
Starting a security program: Thrills and Spills
#14
Crimeware Chaos: Empirical Analysis of HTTP-based Botnet C&C Panels
#15
Raffle
#16
Caught my WebApp cheating on me!
#17
Ask the EFF
#18
Deconstructing APT28's XAgent for OSX
#19
Violent Python
#20
No more XSS: Deploying CSP with nonces and strict-dynamic
#21
The Memory of a Meltdown, and no we don't mean Britney
#22
The Bucket List: Experiences Operating S3 Honeypots
#23
Rise of coinminers
#24
Building Intelligent Automatons with Semantic Reasoning and Horse Glue
#25
Fundamentals of Corporate Physical Access: Attack Surface and Approach
#26
Fighting Secrets In Source Code With TruffleHog
#27
Keep it Like a Secret: When Android Apps Contain Private Keys
#28
Netrepser – A JavaScript targeted attack
#29
Hacking the Law: Are Bug Bounties a True Safe Harbor?
#30
Women in Security Mixer
#31
Using ancient math to speed up security assessments of Windows executables
#32
KubeScope for the Extraordinary World of Containers
#33
Iron Clad Development: Building Secure Web and Webservice Applications
#34
Data Driven Bug Bounty
#35
Registration
#36
Lockpick Village
#37
Capture The Flag
#38
Resume Rewriting
#39
IoT Village
#40
T-shirt Sales
#41
Living Security Escape Room (Session 1.1)
#42
Living Security Escape Room (Session 1.3)
#43
Spymaster Challenge
#44
Living Security Escape Room (Session 1.4)
#45
Living Security Escape Room (Session 1.5)
#46
Living Security Escape Room (Session 1.2)
#47
Living Security Escape Room (Session 1.6)
#48
Information Desk
#49
Resume Rewriting
#50
Coat Check
Popular by Type
All Types
Capture The Flag
Food & Drink
General
Keynote
Special Event
Track 1
Track 2
Track 3
Village
Workshop 1
Workshop 2
Popular by Day
All days
Sunday, Apr 15
Monday, Apr 16
Twitter Feed