Sched.com Conference Mobile Apps
BSidesSF 2020
has ended
Create Your Own Event
BSidesSF 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Tickets
Search
or browse by date + venue
Career Center
Closing Ceremony
CTF
All
Village
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
All
Lightning Talk
OTR
Panel
Village
Workshop
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Attendees
Tickets
Search
Popular Events
#1
[Keynote] Give Away Security’s Legos: Dumping Traditional Security Teams
#2
Opening Remarks
#3
Fantastic AWS Attacks and Where to Find them
#4
Peeling the Web Application Security Onion Without Tears
#5
Non-Political Security Learnings from the Mueller Report
#6
Happy Hour
#7
Break crypto like a pro!
#8
How to Kill an AWS Access Key
#9
Party
#10
Lunch
#11
Bootstrapping Security
#12
Purple is the new black: Modern Approaches to Application Security
#13
Secure by Design: Usable Security Tooling
#14
Managing the Assets of Your Security Career
#15
Visualizing Security
#16
OTR: Disclosing Incidents, Advice from the Front Lines
#17
The Red Square: Mapping the Connections Inside Russia’s APT Ecosystem
#18
Checking your --privileged container
#19
Adventures in vendor security and continuous review
#20
Human or Machine? The Voight-Kampff Test for Discovering Web Application Vulnerabilities
#21
Dispatch: Crisis Management Automation When Everything is On Fire
#22
Breakfast
#23
Hanging on the telephone: hacking VoIP
#24
OTR: Responding to Firefox 0-days in the wild
#25
Script All the Things, Reverse All the Malware: A Look at Jython-Enhanced Reverse Engineering with Ghidra
#26
Graph Based Detection and Response with Grapl
#27
Serverless osquery Backend and Big Data Exploration
#28
Sharks in the Water: Open Source Component Risk and Mitigation
#29
[Keynote] What's New or Not in 2020: Are we Making Progress on the Intractable Security Problems?
#30
The Road to Zero Trust: Developing a baseline security standard for endpoint devices
#31
Mistakes we made integrating security scanning into CI/CD
#32
If you’re not using SSH certificates you’re doing SSH wrong
#33
So you’re the first security hire: Creating a security program and integrating security into your company’s culture
#34
East vs West: How The Coasts Approach Information Security Differently
#35
OTR: Tears from The Cloud
#36
Opening Remarks
#37
What should—and shouldn’t—scare you about Kubernetes and containers
#38
Closing Ceremony
#39
Security Learns to Sprint: DevSecOps
#40
How to 10X Your Company’s Security (Without a Series D)
#41
2FA in 2020 and Beyond
#42
k-rail: A tool to manage k8s securely at speed
#43
How To Write Like It's Your Job
#44
Panel: Lessons Learned from the DevSecOps Trenches
#45
Chrome extension risks and you
#46
Creating Data-Driven Threat Intelligence Signals in a “Zero Trust” Environment
#47
Lunch
#48
The GCP metadata API; security considerations, vulnerabilities, and remediations
#49
Leveraging Osquery for DFIR at scale
#50
OTR: Campfire Stories of Vendor Security Horror
Popular by Type
All Types
Career Center
Closing Ceremony
CTF
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
Village
Workshop
Popular by Day
All days
Saturday, Feb 22
Sunday, Feb 23
Monday, Feb 24
Recently Active Attendees
Aeva Black
Gene Wood
A
Alvaro
Vladimir Startsev
David Phillips
Chloé Messdaghi
Maria Mora
Coleen Coolidge
More →
Twitter Feed