Sched.com Conference Mobile Apps
BSidesSF 2017
has ended
Create Your Own Event
Menu
Schedule
Speakers
Artists
Sponsors
Villagers
Volunteers
Search
Log in
Sign up
BSidesSF 2017
Website
|
Twitter
|
Facebook
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Artists
Sponsors
Villagers
Volunteers
Search
or browse by date + venue
Break
Capture The Flag
Food
Happy Hour
Keynote - DNA Lounge
Lockpick Village
Party
Registration
Special Event
Track 1 - DNA Lounge
Track 2 - BuzzWorks
Workshop
Popular
Popular Events
#1
Illusion vs Reality: An FBI Agent’s take on how private sector realities are masked by government sector illusions of intelligence sharing, public-private partnerships and best practices
#2
Advanced Internet dataset combinations for #ThreatHunting & Attack Prediction
#3
Building an Effective Intrusion Detection Program
#4
DNS attacks, a history and overview
#5
Swimming Upstream: Regulation vs Security
#6
How to Build a Security Team and Program
#7
Make Alerts Great Again
#8
Breakfast
#9
Live Dissection: Anatomy of a Browser Based Botnet
#10
Tired of Playing Exploit Kit Whack-A-Mole? Let's automate
#11
Ask the EFF
#12
Registration
#13
BeyondCorp: Beyond “fortress” security
#14
Better SSH management with ephemeral keys
#15
Lunch
#16
Sunday Night Party
#17
How Secure are your Docker Images?
#18
Look Ma, No Hands! - Decentralizing security for scale
#19
Happy Hour
#20
Five Keys to Building an Application Security Program in the Age of DevOps
#21
Security through Visibility: Organizational Communication Strategies for InfoSec Teams
#22
Bypassing malware analysis sandboxes is easy, let’s discuss how they are doing it and why it works
#23
Breakfast
#24
Fighting Email Phishing with a Custom Cloud IDS
#25
The Underground Economy of Apple ID
#26
Assessing the Embedded Devices On Your Network
#27
Weathering the Storm: The Art of Crisis Communications
#28
Exploiting Broken Webapps
#29
Does DoD Level Security Work in the Real World?
#30
Linux Monitoring at Scale with eBPF
#31
Lunch
#32
When Bandit(s) Strike - Defend your Python Code
#33
Access Control with Concierge: One Tool to Rule Them All
#34
Exploiting Websites Hands-On
#35
Reducing “Mixtape to Master Key” Scenarios: How to block the Dark Army from mayhem using API-driven access control
#36
Should I Pay or Should I Go? Game Theory and Ransomware
#37
Break
#38
Opinionless Enforcement of Opinions on Operational Secrets
#39
#securityselfie (size up your appsec program with new metrics)
#40
Dormant DOMination
#41
Break
#42
Break
#43
Break
#44
Break
#45
Securing Kubernetes
#46
Break
#47
Hijacking .NET to Defend PowerShell
#48
AtomBombing: Injecting Code Using Windows’ Atoms
#49
Break
#50
Break
Popular by Type
All Types
Break
Capture The Flag
Food
Happy Hour
Keynote - DNA Lounge
Lockpick Village
Party
Registration
Special Event
Track 1 - DNA Lounge
Track 2 - BuzzWorks
Workshop
Popular by Day
All days
Sunday, Feb 12
Monday, Feb 13