Sched.com Conference Mobile Apps
BSidesSF 2020
has ended
Create Your Own Event
BSidesSF 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Attendees
Tickets
Search
or browse by date + venue
Career Center
Closing Ceremony
CTF
All
Village
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
All
Lightning Talk
OTR
Panel
Village
Workshop
Popular
menu
Menu
Schedule
Speakers
Sponsors
Attendees
Tickets
Search
Popular Talk Events
#1
Fantastic AWS Attacks and Where to Find them
#2
Peeling the Web Application Security Onion Without Tears
#3
Non-Political Security Learnings from the Mueller Report
#4
Break crypto like a pro!
#5
How to Kill an AWS Access Key
#6
Bootstrapping Security
#7
Purple is the new black: Modern Approaches to Application Security
#8
Secure by Design: Usable Security Tooling
#9
Managing the Assets of Your Security Career
#10
Visualizing Security
#11
OTR: Disclosing Incidents, Advice from the Front Lines
#12
The Red Square: Mapping the Connections Inside Russia’s APT Ecosystem
#13
Checking your --privileged container
#14
Adventures in vendor security and continuous review
#15
Human or Machine? The Voight-Kampff Test for Discovering Web Application Vulnerabilities
#16
Dispatch: Crisis Management Automation When Everything is On Fire
#17
Hanging on the telephone: hacking VoIP
#18
OTR: Responding to Firefox 0-days in the wild
#19
Script All the Things, Reverse All the Malware: A Look at Jython-Enhanced Reverse Engineering with Ghidra
#20
Graph Based Detection and Response with Grapl
#21
Serverless osquery Backend and Big Data Exploration
#22
Sharks in the Water: Open Source Component Risk and Mitigation
#23
Transform your presentation skills
#24
Someone set us up the SBOM – How software transparency can help save the world
#25
Ask the EFF
#26
CISO Vendor Relationship Podcast - Live Recording
#27
The Road to Zero Trust: Developing a baseline security standard for endpoint devices
#28
Mistakes we made integrating security scanning into CI/CD
#29
If you’re not using SSH certificates you’re doing SSH wrong
#30
So you’re the first security hire: Creating a security program and integrating security into your company’s culture
#31
East vs West: How The Coasts Approach Information Security Differently
#32
OTR: Tears from The Cloud
#33
What should—and shouldn’t—scare you about Kubernetes and containers
#34
Security Learns to Sprint: DevSecOps
#35
How to 10X Your Company’s Security (Without a Series D)
#36
2FA in 2020 and Beyond
#37
k-rail: A tool to manage k8s securely at speed
#38
How To Write Like It's Your Job
#39
Panel: Lessons Learned from the DevSecOps Trenches
#40
Chrome extension risks and you
#41
Creating Data-Driven Threat Intelligence Signals in a “Zero Trust” Environment
#42
The GCP metadata API; security considerations, vulnerabilities, and remediations
#43
Leveraging Osquery for DFIR at scale
#44
OTR: Campfire Stories of Vendor Security Horror
#45
When GDPR and CCPA strike: Silver lining for security teams in data protection clouds
#46
Security, Politics, Neutrality, and Protecting Users
#47
OTR: Campaign Security is Hard
#48
San-Serif Rules Everything Around Me
#49
Panel: Mental Health for Hackers: Contents Under Pressure
#50
Phishy Little Liars - Pretexts That Kill
Popular by Type
All Types
Career Center
Closing Ceremony
CTF
Food & Drink
General
Keynote
Opening Remarks
Simulcast
Talk
Village
Workshop
Popular by Day
All days
Saturday, Feb 22
Sunday, Feb 23
Monday, Feb 24
Recently Active Attendees
Vladimir Startsev
Peter C
Maria Mora
Peter Scheffler
Lenin Alevski
Markus De Shon
Bridget Pelletier-Ross
A
Alvaro
More →
Twitter Feed