BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation. If you work in information security (or want to learn more about it), check out BSidesSLC2016. The board at BSidesSLC is excited to provided another bring another two packed days of workshops, talks, entertainment, games (Hacker Jeopardy, anyone?), and, of course, spending time with our amazing friends in the local Information Security community.
09:00 |
Registration
(45 minutes)
Registration |
10:00 |
10:00 Keynote: Jack Daniel
Keynote by Jack Daniel (1 hour) 10:00 Keynote: Jack Daniel |
11:00 |
Building a Secure Development Lifecycle on a Shoestring Budget
Talk by John Overbaugh in Track 1 (1 hour) Building a Secure Development Lifecycle on a Shoestring Budget |
Red Teaming: Stop Playing By The Rules
Talk by Ryan Watson in Track 2 (1 hour) Red Teaming: Stop Playing By The Rules |
|
Zombie Crush: Exploiting Malicious C2 Servers
Workshop by Bryce Kunz in Workshop 2 (1 hour, 30 minutes) Zombie Crush: Exploiting Malicious C2 Servers |
|
How Near is Your Field? Adventures in NFC and RFID with Arduino. (take home hardware)
Workshop by Steve Fink , Lawrence Davis in Workshop 1 (1 hour, 30 minutes) How Near is Your Field? Adventures in NFC and RFID with Arduino. (take home hardware) |
|
Pin and Tumbler Lock Tear Down
Workshop by Lonnie Bates in Lockpick Village (1 hour) Pin and Tumbler Lock Tear Down |
|
12:00 |
Lunch
(1 hour, 30 minutes)
Lunch |
13:30 |
How to Build an Effective Information Security Risk Management Program
Talk by Kiston Finney in Track 1 (1 hour) How to Build an Effective Information Security Risk Management Program |
Don't be stupid with Github - Even more Github fun
Talk by Metacortex in Track 2 (30 minutes) Don't be stupid with Github - Even more Github fun |
|
Introduction to DFIR
Workshop by Jeff Doty in Workshop 2 (4 hour) Introduction to DFIR |
|
Internal Pentesting and RedTeam Tactics
in Workshop 1
(4 hour)
Internal Pentesting and RedTeam Tactics |
|
14:30 |
Game of Hacks: The Mother of All Honeypots
Talk by Igor Matlin in Track 1 (30 minutes) Game of Hacks: The Mother of All Honeypots |
Canceled
Talk by Canceled in Track 2 (30 minutes) Canceled |
|
15:00 |
The Hacker Will See You Now
Talk by Jay Radcliffe in Track 1 (30 minutes) The Hacker Will See You Now |
The Art of the Jedi Mind Trick
Talk by Jeff Man in Track 2 (30 minutes) The Art of the Jedi Mind Trick |
|
Cracking Combination Master Locks Through Manipulation
Workshop by Lonnie Bates in Lockpick Village (1 hour) Cracking Combination Master Locks Through Manipulation |
|
15:30 |
How HIPAA Compliance helps and hinders true patient data security
Talk by Dan Anderson in Track 1 (30 minutes) How HIPAA Compliance helps and hinders true patient data security |
Hackinabox: Self contained Pen Testing lab
Talk by Marv White in Track 2 (1 hour) Hackinabox: Self contained Pen Testing lab |
|
16:30 |
Googling Like A Boss - Expanding the Powers of OSINT For Both Red and Blue Teams
Talk by Ethan Dodge in Track 1 (1 hour) Googling Like A Boss - Expanding the Powers of OSINT For Both Red and Blue Teams |
Patching monthly Is IMPOSSIBLE, but maintaining compliance is still POSSIBLE
Talk by Adam Steed in Track 2 (1 hour) Patching monthly Is IMPOSSIBLE, but maintaining compliance is still POSSIBLE |
|
17:30 |
Dinner
(1 hour, 30 minutes)
Dinner |
19:00 |
Physical Penetration Testing
Workshop by Keith Pachulski in Workshop 2 (4 hour) Physical Penetration Testing |
DJ Metacortex, Skittish And Bus, and DUAL CORE
(1 hour, 30 minutes)
DJ Metacortex, Skittish And Bus, and DUAL CORE |
10:00 |
Bought Some Lockpicks, Now What?
Talk by Colin Jackson in Track 1 (1 hour) Bought Some Lockpicks, Now What? |
This is how I stole your botnet
Talk by Waylon Grange in Track 2 (1 hour) This is how I stole your botnet |
|
Open Source Intelligence Gathering
Workshop by Stephanie Carruthers in Workshop 2 (3 hours, 30 minutes) Open Source Intelligence Gathering |
|
Lets analyze firmware together, and write an exploit.
Workshop by Aaron Yool in Workshop 1 (3 hours, 30 minutes) Lets analyze firmware together, and write an exploit. |
|
11:00 |
Disable the Easy Button; Pen Test Preparation Steps
Talk by Carrie Roberts in Track 1 (1 hour) Disable the Easy Button; Pen Test Preparation Steps |
Tabletop Cryptography
Talk by Jason R in Track 2 (1 hour) Tabletop Cryptography |
|
Picking Security Pins
Workshop by Lonnie Bates in Lockpick Village (1 hour) Picking Security Pins |
|
12:00 |
Lunch -- not as long for workshops!
(1 hour, 30 minutes)
Lunch -- not as long for workshops! |
13:30 |
Preparing for PowerShellmageddon
Talk by Chad Tilbury in Track 1 (1 hour) Preparing for PowerShellmageddon |
Slaying Rogue Access Points with Python and Cheap Hardware
Talk by Gabriel Ryan in Track 2 (1 hour) Slaying Rogue Access Points with Python and Cheap Hardware |
|
14:30 |
Writing Custom Splunk Applications
Talk by Cody Hatch in Track 1 (30 minutes) Writing Custom Splunk Applications |
App Scanner Galore - How do I choose one?
Talk by Teja Sai and Yashvier Kosaraju in Track 2 (30 minutes) App Scanner Galore - How do I choose one? |
|
Making Lock Picks
Workshop by Lonnie Bates in Lockpick Village (1 hour) Making Lock Picks |
|
15:00 |
Neil Wyler
Keynote by Neil Wyler (1 hour) Neil Wyler |
16:00 |
Raffle/Thank you/Goodbye
(1 hour)
Raffle/Thank you/Goodbye |