Sched.com Conference Mobile Apps
BSides Austin
has ended
Create Your Own Event
BSides Austin
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
AppSec
Blue team
Cloud
Crypto
ICS
IOT
Keynote
Malware
Purple team
Red team
Security Industry
Social Engineering
Workshop
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
BSides Austin Keynote : Ed Skoudis
#2
Protecting your toys - Attempts at securing the IoT
#3
Purple Teaming: The Best of Both Worlds
#4
If I Knew Then What I Know Now: Building an InfoSec Program from Scratch
#5
How to Catch a Pentester
#6
The modern SOC: Adapting the Security Operations model to how we work.
#7
Opening remarks
#8
Master Your Game: Incentivizing Security Event Analysis Through Gamification
#9
Fire marshal talks, pizza, beer and networking
#10
Registration/breakfast
#11
It's not just about the technology, it's also about the psychology.
#12
The Node.js Highway: Attacks Are At Full Throttle
#13
You Got Fail!
#14
Entry level position, 3 years’ experience required!
#15
Break
#16
Hackformers meeting - Ed Skoudis
#17
Capture the Flag by jgor and alek --- Lockpick village Longhorn Lockpicking Club and Houston Locksport --- Scavenge the Flag by Team Cryptolingus
#18
'I'm a software developer. What do you mean I'm on the blue team?': What we can learn in a red/blue world
#19
BSides Austin wrap-up, awards and raffle
#20
IoT on Easy Mode
#21
Cloud Access Security Brokers: What’s with all the hype?
#22
Post-con party featuring DualCore!
#23
Enterprise Vulnerability Management - Back to Basics
#24
Taking AppSec to 11: AppSec Pipelines, DevOps and Making Things Better
#25
Commodity malware means YOU! And everybody in this room, let’s look at one called Dridex
#26
Rapid Covert Physical Entry
#27
Evolution of the Angler Exploit Kit
#28
Sections, Segments, and Functions, oh my! Hashing your way to analytical shortcuts.
#29
Registration/breakfast
#30
Scan. Break in. Persist. Repeat.
#31
Detecting Credential Theft with Practical Security Analytics and Visualizations
#32
Virustotal Spelunking
#33
Break
#34
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
#35
Modern Crypto and you!
#36
If You Can't Beat 'Em, Join 'Em: Tips For Running a Successful Bug Bounty Program
#37
WORKSHOP: Malware Analysis 101
#38
Quit Blaming The Damned Passwords
#39
The Beginner's Guide to ICS: How to Never Sleep Soundly Again
#40
WORKSHOP: Symbolic Execution: No need to be angr-y
#41
WORKSHOP: Taking a mental walk in the users' mind
#42
Capture the Flag (CTF) by jgor and alek -- Lockpick village --- Scavenge the Flag by Team Cryptolingus
Popular by Type
All Types
AppSec
Blue team
Cloud
Crypto
ICS
IOT
Keynote
Malware
Purple team
Red team
Security Industry
Social Engineering
Workshop
Popular by Day
All days
Thursday, Mar 31
Friday, Apr 1
Recently Active Attendees
Carl Perry
Michael Gee
D
Daniel
MP
Matt Pardo
Miriam Levenstein
KB
Kate Brew
Mano 'dash4rk' Paul
David H Deans
More →