Sched.com Conference Mobile Apps
BSides Austin 2018
has ended
Create Your Own Event
BSides Austin 2018
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Management
All
Entry level
Intermediate
Other
All
Entry level
Technical
All
Advanced
Entry level
Intermediate
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
Quick and Dirty Malware Analysis for the Rest of Us
#2
Navigating the Alternative Facts of Malware Prevention
#3
Operational Security in a Weaponized World
#4
Inside a Breach: Lesson Learned
#5
50 Shades of Graylog
#6
Rise of the Machines
#7
Hiding in the Clouds - Leveraging cloud infrastructure to evade detection
#8
The Human Pentest
#9
Target-based Security Model: Mapping Network Attacks to Security Controls
#10
Opening remarks
#11
Containers: It’s Not Your Mamas Tupperware
#12
Choose Your Own Adventure: A Career Guide to InfoSec
#13
Security instrumentation: Be the hero getting value from security
#14
Becoming a strategic cybersecurity leader
#15
Thinking outside the security box: Assembling non-traditional security teams
#16
Security Development: Going Beyond the Tool
#17
Develop the Best: Artifact Based Mentoring for Security Engineers
#18
SniffAir – An Open-Source Framework for Wireless Security Assessments
#19
Building an Empire with (Iron)Python
#20
Fire Marshal talks, networking and party: OFF-SITE at Casa Chapala
#21
How (Not) to Patch Command Injection Bugs
#22
Registration/coffee
#23
Security in Mergers and Acquisitions (M&A)
#24
Career and Job Search Tips
#25
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restaurants.
#26
Fire Marshal talks, networking and party: OFF-SITE at Casa Chapala
#27
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restaurants.
#28
Registration/coffee
#29
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restaurants.
#30
KEYNOTE: Next gen CTFs: Integrating blue-team oriented and live network challenges into jeopardy-style CTFs
#31
Compromise Assessments: Best Practices & Lessons from the Field
#32
ELK - Not Just for Application Logging
#33
A story of writing malware for 5 years
#34
Credential Stealing Emails - What you need to know
#35
A day in the life of a pentester
#36
Privacy Management and the GDPR
#37
Metasploit Minus Metasploit
#38
Closing ceremonies
#39
Make Vishing Great Again
#40
Peering into the Abyss - Understanding the dark side of Uninitialized Structures
#41
Caught my WebApp cheating on me!
#42
Research Baron
#43
Introduction to Smart Cards and leveraging them in attacks
#44
Enhancing SOC1 by using feedback loops
#45
Post-mortem on deploying osquery, Kolide, and writing to kinesis
#46
Strengthen Your SecOps Team by Leveraging Neurodiversity
#47
Registration/coffee
#48
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restaurants.
#49
Registration/coffee
#50
Lunch break: You can purchase lunch at the Commons Café or at any of a number of close-by restaurants.
Popular by Type
All Types
Management
Other
Technical
Popular by Day
All days
Thursday, Mar 8
Friday, Mar 9
Recently Active Attendees
Adrian Sanabria
KS
Kyle Smith
Josh Sokol
Pedro Fortuna
D
Daniel
MP
Matt Pardo
JK
John K
AD
Anthony DiDonato
More →