Sched.com Conference Mobile Apps
BSidesSF 2016
has ended
Create Your Own Event
BSidesSF 2016
Website
|
Twitter
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Villagers
Participants
Tickets
Search
or browse by date + venue
Lockpick Village
Meal
Registration
Track 1 - Main Room
Track 2 - Above DNA
Workshop
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Villagers
Participants
Tickets
Search
Popular Events
#1
Keynote: A Declaration of the Independence of Cyberspace
#2
The Tales of a Bug Bounty Hunter
#3
Lunch
#4
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Information Security
#5
Who’s Breaking into Your Garden? iOS and OS X Malware You May or May Not Know
#6
Developing a Rugged DevOps Approach to Cloud Security
#7
Guest to root - How to Hack Your Own Career Path and Stand Out
#8
Exploiting Broken Webapps
#9
Fraud Detection & Real-time Trust Decisions
#10
Everything Is Awful (And You're Not Helping)
#11
Planning Effective Red Team Exercises
#12
IoT on Easy Mode (Reversing Embedded Devices)
#13
Scan, Pwn, Next! – exploiting service accounts in Windows networks
#14
Lunch
#15
Coffee
#16
A year in the wild: fighting malware at the corporate level
#17
Breaking Honeypots for Fun and Profit
#18
In the crosshairs: the trend towards targeted attacks
#19
Sweet Security: Deploying a Defensive Raspberry Pi
#20
Fuzz Smarter, Not Harder (An afl-fuzz Primer)
#21
Elliptic Curve Cryptography for those who are afraid of mathematics
#22
The Art of the Jedi Mind Trick
#23
Why Can't We Have Nice Things? Conflict Resolution in Information Security
#24
Exploit Development Training & Competition
#25
Happy Hour
#26
Digital Intelligence Gathering: Using the Powers of OSINT for Both Blue and Red Teams
#27
Employee Hijacking: Building a hacktober awareness program
#28
Hackers Hiring Hackers - How to hack the job search and hack talent
#29
Securing the Distributed Workforce
#30
The Ransomware Threat: Tracking the Digital Footprints
#31
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
#32
Using Behavior to Protect Cloud Servers
#33
Mobile App Corporate Espionage
#34
Sucker-punching Malware: A Case Study in Using Bad Malware Design Against Attackers
#35
Venue Open/Registration
#36
Mainframes? On My Internet?
#37
Why it’s all snake oil – and that may be ok
#38
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
#39
Advanced techniques for real-time detection of polymorphic malware
#40
Coffee
#41
Sedating the Watchdog: Abusing Security Products to Bypass Windows Protections
#42
Access Control in 2016 - deep dive
#43
Venue Open/Registration
#44
Ask the EFF
#45
TOOOL
#46
TOOOL
Popular by Type
All Types
Lockpick Village
Meal
Registration
Track 1 - Main Room
Track 2 - Above DNA
Workshop
Popular by Day
All days
Sunday, Feb 28
Monday, Feb 29
Recently Active Participants
Reed Loden
Robert Burns
Duncan Sparrell
Marco Misfailed Mancia
steve11112
Pablo
Fernando Montenegro
Alexandre Sieira
More →