Sched.com Conference Mobile Apps
BSidesSF 2018
has ended
Create Your Own Event
BSidesSF 2018
Website
|
Twitter
|
Facebook
Schedule
Simple
Expanded
Grid
By Venue
Presenters
Artists
Sponsors
Villagers
Tickets
Search
or browse by date + venue
Capture The Flag
Food & Drink
All
Happy Hour
Party
General
Keynote
All
Talk
Special Event
All
Contest
Mixer
Track 1
All
Panel
Talk
Track 2
All
Talk
Track 3
All
Talk
Village
All
Contest
Workshop 1
Workshop 2
Popular
menu
Menu
Log in
Sign up
Schedule
Presenters
Artists
Sponsors
Villagers
Tickets
Search
Popular Events on Monday, April 16
#1
Fix All The Things: Rapid-fire Stories of Creative Solutions to InfoSec Problems
#2
Demystifying DNS Security – Practical Steps for Reducing Exposure and Detecting Compromise
#3
Happy Hour
#4
Lunch
#5
Logging, Monitoring, and Alerting in AWS (The TL;DR)
#6
Managing secrets in your cloud environment: AWS, GCP, and containers (and beyond)
#7
Closing Ceremony
#8
Opening Remarks
#9
Breakfast
#10
Unraveling the Threat of Chrome Based Malware
#11
The IoT Hacker's Toolkit
#12
Simple. Open. Mobile: A Look at the Future of Strong Authentication
#13
Lessons learned implementing meaningful access controls to customer data
#14
Bring in the $$ : Moving Security from Cost Center to Revenue Generator
#15
privacy for safety - opsec when the threat is in the home
#16
Pensieve: Finding malicious artifacts in container environments
#17
You want to step outside? What we can learn from Google’s fight with phishing
#18
Listen to your Engine: Unearthing Security Signals from the Modern Linux Kernel
#19
Building a Predictive Pipeline to Rapidly Detect Phishing Domains
#20
Raffle
#21
A Case Study of MacOS Supply Chain Compromise
#22
Modern Red Team Immersion Bootcamp, Condensed
#23
Honeypots 2.0: A New ‘Twist’ on Defending Enterprise Networks with Dynamic Deception at Scale
#24
The SecDevOpronomicon - Arcane Secrets for Scaling your Company’s Security
#25
Navigating the Vast Ocean of Browser Fingerprints
#26
PostgreSQL Threats and Attacks in the Wild
#27
Supply Chain Attack Through CCleaner - Evidence Aurora Operation Still Active
#28
Prospecting Ransomware Tech
#29
Crypto Hero
#30
How to Hack Radios: A Practical Approach to RF Physical Layers
#31
An Open Source Malware Classifier and Dataset
#32
Introduction to Windows Kernel Mode Debugging
#33
Securing DNSSEC with Ritual and Ceremony (or for steampunks, How Neo-Victorians Keep Out Cads and Bounders)
#34
Fuzzing Ruby and C Extensions
#35
Lockpick Village
#36
Capture The Flag
#37
Resume Rewriting
#38
Spymaster Challenge
#39
Living Security Escape Room (Session 2.3)
#40
IoT Village
#41
Registration
#42
Living Security Escape Room (Session 2.1)
#43
T-shirt Sales
#44
Living Security Escape Room (Session 2.4)
#45
Living Security Escape Room (Session 2.2)
#46
Living Security Escape Room (Session 2.5)
#47
Coat Check
#48
Sponsors Registration
#49
Resume Rewriting
Popular by Type
All Types
Capture The Flag
Food & Drink
General
Keynote
Special Event
Track 1
Track 2
Track 3
Village
Workshop 1
Workshop 2
Popular by Day
All days
Sunday, Apr 15
Monday, Apr 16
Twitter Feed