Sched.com Conference Mobile Apps
BSidesSF 2017
has ended
Create Your Own Event
BSidesSF 2017
Website
|
Twitter
|
Facebook
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Artists
Sponsors
Villagers
Volunteers
Search
or browse by date + venue
Break
Capture The Flag
Food
Happy Hour
Keynote - DNA Lounge
Lockpick Village
Party
Registration
Special Event
Track 1 - DNA Lounge
Track 2 - BuzzWorks
Workshop
Popular
menu
Menu
Schedule
Speakers
Artists
Sponsors
Villagers
Volunteers
Search
Popular Events
#1
Illusion vs Reality: An FBI Agent’s take on how private sector realities are masked by government sector illusions of intelligence sharing, public-private partnerships and best practices
#2
Advanced Internet dataset combinations for #ThreatHunting & Attack Prediction
#3
Building an Effective Intrusion Detection Program
#4
DNS attacks, a history and overview
#5
How to Build a Security Team and Program
#6
Make Alerts Great Again
#7
Breakfast
#8
Live Dissection: Anatomy of a Browser Based Botnet
#9
Tired of Playing Exploit Kit Whack-A-Mole? Let's automate
#10
Ask the EFF
#11
Registration
#12
BeyondCorp: Beyond “fortress” security
#13
Better SSH management with ephemeral keys
#14
Lunch
#15
Sunday Night Party
#16
Security through Visibility: Organizational Communication Strategies for InfoSec Teams
#17
Assessing the Embedded Devices On Your Network
#18
Weathering the Storm: The Art of Crisis Communications
#19
Exploiting Broken Webapps
#20
Linux Monitoring at Scale with eBPF
#21
Reducing “Mixtape to Master Key” Scenarios: How to block the Dark Army from mayhem using API-driven access control
#22
Should I Pay or Should I Go? Game Theory and Ransomware
#23
Break
#24
Break
#25
Break
#26
Break
#27
Break
#28
Break
#29
Swimming Upstream: Regulation vs Security
#30
How Secure are your Docker Images?
#31
Look Ma, No Hands! - Decentralizing security for scale
#32
Happy Hour
#33
Five Keys to Building an Application Security Program in the Age of DevOps
#34
Bypassing malware analysis sandboxes is easy, let’s discuss how they are doing it and why it works
#35
Breakfast
#36
Fighting Email Phishing with a Custom Cloud IDS
#37
The Underground Economy of Apple ID
#38
Does DoD Level Security Work in the Real World?
#39
Lunch
#40
When Bandit(s) Strike - Defend your Python Code
#41
Access Control with Concierge: One Tool to Rule Them All
#42
Exploiting Websites Hands-On
#43
Opinionless Enforcement of Opinions on Operational Secrets
#44
#securityselfie (size up your appsec program with new metrics)
#45
Dormant DOMination
#46
Securing Kubernetes
#47
Hijacking .NET to Defend PowerShell
#48
AtomBombing: Injecting Code Using Windows’ Atoms
#49
Break
#50
Break
Popular by Type
All Types
Break
Capture The Flag
Food
Happy Hour
Keynote - DNA Lounge
Lockpick Village
Party
Registration
Special Event
Track 1 - DNA Lounge
Track 2 - BuzzWorks
Workshop
Popular by Day
All days
Sunday, Feb 12
Monday, Feb 13