Sched.com Conference Mobile Apps
BSidesLV 2015
has ended
Create Your Own Event
BSidesLV 2015
Schedule
Simple
Expanded
Grid
By Tracks
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
or browse by date + venue
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular
menu
Menu
Schedule
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
Popular Events on Tuesday, August 4
#1
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
#2
Pentesting with Docker
#3
Opening Remarks
#4
Getting the data out using social media
#5
Lunch
#6
How to WCTF
#7
Happy Hour
#8
State of Automotive Cyber Safety
#9
Violent Python
#10
NSA Playset: Bridging the Airgap without Radios
#11
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
#12
Speaking Metrics to Executives
#13
When steganography stops being cool
#14
Leading in a "Do"-ocracy
#15
Catching Linux Post-Exploitation with Auditd
#16
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
#17
Exploit Kit Shenanigans: They’re Cheeky!
#18
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
#19
Coffee
#20
Privileges in the Real World: Securing Password Management
#21
Registration Open
#22
Analogue Network Security
#23
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
#24
Practical Application Whitelisting Evasion
#25
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
#26
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
#27
State of Medical Device Cyber Safety
#28
#radBIOS: Wireless networking with audio
#29
Angler Lurking in the Domain Shadows
#30
Check That Certificate
#31
How Portal Can Change Your Security Forever
#32
SIEMple technology
#33
Adding +10 Security to Your Scrum Agile Environment
#34
The Internet of ... Mainframes?! WTF?
#35
What's New Pussycat: Recent Improvements to Powercat
#36
What the heck is this radio stuff, anyway?
#37
How can we ensure safer Automobiles?
#38
The Journey To ICS
#39
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
#40
Pentesting PLCs 101
#41
I Am The Cavalry Track Introduction and Overview
#42
How can we ensure safer Medical Devices?
#43
Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
#44
QueerCon Mixer
#45
Fight back – raising awareness @infosec
#46
Crema: A LangSec-inspired Language
#47
Verum - How Skynet Started as a Context Graph
#48
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
#49
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
#50
Pros vs. Joes CTF and SECTF
Popular by Type
All Types
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular by Day
All days
Tuesday, Aug 4
Wednesday, Aug 5
Recently Active Participants
Adrian Sanabria
Reed Loden
Jon Zeolla
MF
Martin Forssén
MM
Mark Manning
Håkon Fostervold Høydal
Eriks
mauvehed/nate
More →