Invite your friends by posting this on Twitter: #BSidesSeattle
Follow @BsidesSeattle for updates!
|
|
Questions?
hit up:
@BsidesSeattle or [email protected]
2018 Presentations
Title of Talk/Workshop |
Presenter |
Advanced Weapons Training for the Empire |
Jeremy Johnson @beyondnegative |
Cataloging, obfuscating, and de-identifying personal information with Google Cloud DLP |
@josharmour |
Exploits in Wetware |
@robertesell |
Lessons learned from running AppSec |
Michael de Libero
|
Intelligence isn't just a collection of IOCs. |
Tim Gallo @TimJGallo |
Jailbreak detector detector: countermeasures to jailbreak detection on iOS |
Nick Mooney @wellhydrated |
Know your enemy - Make threat intelligence actually work!
|
@niryoo |
Life Out of the Shadows: APT cyber'ing to the private sector |
Jason Kichen @jckichen |
Platform Firmware for Blue Teams: Detecting Evil Maid Attacks |
Lee Fisher (@LeeFisher_PreOS) & Paul English (@penglish_PreOS), PreOS Security |
Red teaming you wish you were doing |
Jessica Payne @jepayneMSFT Gerald Steere @darkpawh |
Sweet Security: Creating a Raspberry Pi Security Appliance |
Travis Smith (@MrTrav) |
The Revolution Will Not Be Televised...It Will Be Automated |
John Grigg @Sk1tchD |
The S in IoT is for Security |
Andrew Watts and Shawn Corey |
Keynote
We are excited to announce Rebekah Brown (@PDXbek) will be our keynote speaker. The title of her talk is "Finding methods in the magic: Solving complex problems with complex thinking"
Rebekah Brown has spent more than a decade working in intelligence and information security; her previous roles include NSA network warfare analyst and Operations Chief of a United States Marine Corps cyber unit. She has helped develop threat intelligence and security awareness programs at the federal, state, and local level, as well as at a Fortune 500 company. Today, Rebekah leads the threat intelligence programs at Rapid7, where her responsibilities include programs architecture, management, analysis, and operations. She is the co-author of the book "Intelligence-Driven Incident Response", and co-author and instructor for SANS578 - Cyber Threat Intelligence. Rebekah recently made the move from Portland, OR to Bellevue, Washington (although you'd never know from her Twitter handle) with her three kids and spends her free time hiking and hacking and reading Harry Potter.
Sponsors
Sorry, we're no longer accepting sponsors for 2018. Please feel free to reach out to us about 2019 if you are interested.
Extreme Ninja
|
Engage the Audience
|
Core Supporter
|
Schedule
Planners
-
Big Kahuna: Josh M (@nerd_monkey)
-
Right Hand of Chaos: Mike Andrews
-
Left Hand of Order: Lea Snyder (@_leisures)
Tags for flickr, twitter, blog, etc.
Please use the tag #BsidesSeattle for content related to this event
Offensive Defense |
|
|
Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.
|
Comments (0)
You don't have permission to comment on this page.