Sched.com Conference Mobile Apps
BSidesSF 2020
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Attendees
Tickets
Search
Log in
Sign up
BSidesSF 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Tickets
Search
or browse by date + venue
Career Center
Closing Ceremony
CTF
All
Village
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
All
Lightning Talk
OTR
Panel
Village
Workshop
Popular
Popular Events
#1
[Keynote] Give Away Security’s Legos: Dumping Traditional Security Teams
#2
Opening Remarks
#3
Fantastic AWS Attacks and Where to Find them
#4
Peeling the Web Application Security Onion Without Tears
#5
[Keynote] What's New or Not in 2020: Are we Making Progress on the Intractable Security Problems?
#6
The Road to Zero Trust: Developing a baseline security standard for endpoint devices
#7
Non-Political Security Learnings from the Mueller Report
#8
Happy Hour
#9
Break crypto like a pro!
#10
How to Kill an AWS Access Key
#11
Party
#12
Mistakes we made integrating security scanning into CI/CD
#13
If you’re not using SSH certificates you’re doing SSH wrong
#14
So you’re the first security hire: Creating a security program and integrating security into your company’s culture
#15
Lunch
#16
East vs West: How The Coasts Approach Information Security Differently
#17
Bootstrapping Security
#18
Purple is the new black: Modern Approaches to Application Security
#19
OTR: Tears from The Cloud
#20
Secure by Design: Usable Security Tooling
#21
Opening Remarks
#22
Managing the Assets of Your Security Career
#23
Visualizing Security
#24
What should—and shouldn’t—scare you about Kubernetes and containers
#25
Closing Ceremony
#26
Security Learns to Sprint: DevSecOps
#27
OTR: Disclosing Incidents, Advice from the Front Lines
#28
How to 10X Your Company’s Security (Without a Series D)
#29
The Red Square: Mapping the Connections Inside Russia’s APT Ecosystem
#30
2FA in 2020 and Beyond
#31
Checking your --privileged container
#32
k-rail: A tool to manage k8s securely at speed
#33
How To Write Like It's Your Job
#34
Panel: Lessons Learned from the DevSecOps Trenches
#35
Chrome extension risks and you
#36
Creating Data-Driven Threat Intelligence Signals in a “Zero Trust” Environment
#37
Adventures in vendor security and continuous review
#38
Lunch
#39
Human or Machine? The Voight-Kampff Test for Discovering Web Application Vulnerabilities
#40
Dispatch: Crisis Management Automation When Everything is On Fire
#41
The GCP metadata API; security considerations, vulnerabilities, and remediations
#42
Leveraging Osquery for DFIR at scale
#43
Breakfast
#44
Hanging on the telephone: hacking VoIP
#45
OTR: Responding to Firefox 0-days in the wild
#46
OTR: Campfire Stories of Vendor Security Horror
#47
Script All the Things, Reverse All the Malware: A Look at Jython-Enhanced Reverse Engineering with Ghidra
#48
Graph Based Detection and Response with Grapl
#49
Serverless osquery Backend and Big Data Exploration
#50
Sharks in the Water: Open Source Component Risk and Mitigation
Popular by Type
All Types
Career Center
Closing Ceremony
CTF
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
Village
Workshop
Popular by Day
All days
Saturday, Feb 22
Sunday, Feb 23
Monday, Feb 24
Recently Active Attendees
Breanne Boland
Jayson Grace
MG
Michael Giraldo
Maria Mora
HG
Himanshu Gupta
Arkadiy Goykhberg
Jed Boulton
Markus De Shon
More →
Twitter Feed