Sched.com Conference Mobile Apps
BSidesLV 2015
has ended
Create Your Own Event
BSidesLV 2015
Schedule
Simple
Expanded
Grid
By Tracks
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
or browse by date + venue
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular
menu
Menu
Schedule
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
Popular Events
#1
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
#2
Pentesting with Docker
#3
Opening Remarks
#4
Getting the data out using social media
#5
Lunch
#6
How to WCTF
#7
Happy Hour
#8
State of Automotive Cyber Safety
#9
Violent Python
#10
NSA Playset: Bridging the Airgap without Radios
#11
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
#12
Speaking Metrics to Executives
#13
When steganography stops being cool
#14
Leading in a "Do"-ocracy
#15
Catching Linux Post-Exploitation with Auditd
#16
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
#17
Exploit Kit Shenanigans: They’re Cheeky!
#18
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
#19
Coffee
#20
Privileges in the Real World: Securing Password Management
#21
Registration Open
#22
Analogue Network Security
#23
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
#24
Pool Party Sponsored by Ionic Security
#25
Auction, Raffle, Closing Remarks
#26
WiFi Pineapple: Winning the WiFi Battlefield
#27
Lunch
#28
Remote Access, the APT
#29
Better Spectrum Monitoring with Software Defined Radio
#30
Building an Empire with PowerShell
#31
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
#32
Intro to Data Science for Security
#33
Insider Tricks for Bug Bounty Success
#34
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
#35
Breakfast
#36
Who Watches the Watchers? Metrics for Security Strategy
#37
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
#38
Happy Hour
#39
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
#40
Opening Remarks
#41
Advancing Internet Security Research with Big Data and Graph Databases
#42
Software-Defined Radio Signal Processing with a $5 Microcontroller.
#43
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
#44
All Your RFz Are Belong to Me – Software Defined Radio Exploits
#45
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
#46
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
#47
How Secure Are Multi-Word Random Passphrases?
#48
ZOMG It's OSINT Heaven!
#49
Phishing: Going from Recon to Credentials
#50
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
Popular by Type
All Types
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular by Day
All days
Tuesday, Aug 4
Wednesday, Aug 5
Recently Active Participants
Adrian Sanabria
Reed Loden
Jon Zeolla
MF
Martin Forssén
MM
Mark Manning
Håkon Fostervold Høydal
Eriks
mauvehed/nate
More →