Sched.com Conference Mobile Apps
BSidesLV 2015
has ended
Create Your Own Event
BSidesLV 2015
Schedule
Simple
Expanded
Grid
By Tracks
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
or browse by date + venue
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular
menu
Menu
Schedule
Speakers
Artists
Sponsors
Exhibitors
Volunteers
Participants
Additional Information
Search
Popular Events on Wednesday, August 5
#1
Pool Party Sponsored by Ionic Security
#2
Auction, Raffle, Closing Remarks
#3
WiFi Pineapple: Winning the WiFi Battlefield
#4
Lunch
#5
Remote Access, the APT
#6
Better Spectrum Monitoring with Software Defined Radio
#7
Building an Empire with PowerShell
#8
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
#9
Intro to Data Science for Security
#10
Insider Tricks for Bug Bounty Success
#11
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
#12
Breakfast
#13
Who Watches the Watchers? Metrics for Security Strategy
#14
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
#15
Happy Hour
#16
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
#17
Opening Remarks
#18
Advancing Internet Security Research with Big Data and Graph Databases
#19
Software-Defined Radio Signal Processing with a $5 Microcontroller.
#20
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
#21
All Your RFz Are Belong to Me – Software Defined Radio Exploits
#22
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
#23
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
#24
How Secure Are Multi-Word Random Passphrases?
#25
ZOMG It's OSINT Heaven!
#26
Phishing: Going from Recon to Credentials
#27
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
#28
Wi-Door - Bind/Rev Shells for your Wi-Fi
#29
Have I seen you before?
#30
You Hack, We Capture: Attack Analysis with Honeypots
#31
Rethink, Repurpose, Reuse... Rain Hell
#32
Ask the EFF
#33
Coffee
#34
Android App Security Auditing
#35
It’s Not Just Your Answer: Hacking Tech Interviews
#36
No More Graphical Passwords
#37
Out of Denial: A 12-Step Program for Recovering Admins
#38
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
#39
Closing remarks and thanks from our Emcee
#40
Radare2 an open source reverse engineering framework
#41
Auth for Encrypted Services with Server Side APT
#42
Embedding Web Apps in MITMProxy Scripts
#43
Sue the Fed, Hack your FBI File
#44
Are You Sure That You Still Need Passwords?
#45
Infosec careers, myth vs. reality
#46
Some things you just can’t find on Google.
#47
Being the Paid Expert in the Room: Consulting for a Company or On Your Own
#48
Towards Standardizing Comparisons of Password Guessability
#49
Open Up A Can of OSINT On 'Em
#50
For love of country: 15 years of Security Clearance Decisions
Popular by Type
All Types
Above The Ground Plane
Breaking Ground
Career Track
Chill-Out Room
Common Ground
General
Ground Truth
I Am The Cavalry
Parties/Mixers/After-Hours Events
Passwords
Proving Ground
Training Ground I
Training Ground II
Underground
Popular by Day
All days
Tuesday, Aug 4
Wednesday, Aug 5
Recently Active Participants
Adrian Sanabria
Reed Loden
Jon Zeolla
MF
Martin Forssén
MM
Mark Manning
Håkon Fostervold Høydal
Eriks
mauvehed/nate
More →