• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BsidesSeattle2018

 

 

 

 


  

 

 

 

When

February 3, 2018 

Doors open

8:00 am - 8:00 pm

 

Where

The Commons Mixer Building 
15255 NE 40th Street

Redmond, WA  98052

 

Park in the commons garage, then follow signs for Microsoft commons:

https://drive.google.com/open?id=1qWav33NG01iNx7nibonaJEm_IJV2Pldf&usp=sharing 

 

TICKETS

 

SOLD OUT!                                                    

 

 

 

 

Invite your friends by posting this on Twitter: #BSidesSeattle 

Follow @BsidesSeattle for updates! 

 

 

 

Questions?

 

hit up:  

@BsidesSeattle or bsidesseattle@gmail.com

 


 

2018 Presentations

Title of Talk/Workshop Presenter
Advanced Weapons Training for the Empire Jeremy Johnson @beyondnegative
Cataloging, obfuscating, and de-identifying personal information with Google Cloud DLP @josharmour
Exploits in Wetware @robertesell
Lessons learned from running AppSec Michael de Libero
Intelligence isn't just a collection of IOCs. Tim Gallo @TimJGallo
Jailbreak detector detector: countermeasures to jailbreak detection on iOS Nick Mooney @wellhydrated
Know your enemy - Make threat intelligence actually work!
@niryoo
Life Out of the Shadows: APT cyber'ing to the private sector Jason Kichen @jckichen
Platform Firmware for Blue Teams: Detecting Evil Maid Attacks Lee Fisher (@LeeFisher_PreOS) & Paul English (@penglish_PreOS), PreOS Security
Red teaming you wish you were doing Jessica Payne @jepayneMSFT Gerald Steere @darkpawh
Sweet Security: Creating a Raspberry Pi Security Appliance Travis Smith (@MrTrav)
The Revolution Will Not Be Televised...It Will Be Automated John Grigg @Sk1tchD
The S in IoT is for Security Andrew Watts and Shawn Corey

 

 

Keynote

 

We are excited to announce Rebekah Brown (@PDXbek) will be our keynote speaker. The title of her talk is "Finding methods in the magic: Solving complex problems with complex thinking"

 

Rebekah Brown has spent more than a decade working in intelligence and information security; her previous roles include NSA network warfare analyst and Operations Chief of a United States Marine Corps cyber unit. She has helped develop threat intelligence and security awareness programs at the federal, state, and local level, as well as at a Fortune 500 company. Today, Rebekah leads the threat intelligence programs at Rapid7, where her responsibilities include programs architecture, management, analysis, and operations. She is the co-author of the book "Intelligence-Driven Incident Response", and co-author and instructor for SANS578 - Cyber Threat Intelligence. Rebekah recently made the move from Portland, OR to Bellevue, Washington (although you'd never know from her Twitter handle) with her three kids and spends her free time hiking and hacking and reading Harry Potter.

 

 


 

Sponsors

 

Sorry, we're no longer accepting sponsors for 2018. Please feel free to reach out to us about 2019 if you are interested. 

 

Extreme Ninja

 

 

 

Engage the Audience 

 

 

 

 

Core Supporter 

 

 

 

 

 

Schedule

 

  

 

Planners

 

  • Big Kahuna:  Josh M (@nerd_monkey)

  • Right Hand of Chaos: Mike Andrews

  • Left Hand of Order: Lea Snyder (@_leisures)

 

Tags for flickr, twitter, blog, etc.

Please use the tag #BsidesSeattle for content related to this event 

 

 

 

 

 

 

 

 

 

 

 

 

 

Offensive Defense Print E-mail

Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware and exploits are effective against AV scanners for many years, thus showing that attackers are proactively avoiding detection when building malware. In this day of age malicious binaries are generated on demand by server-side kits when a victim visits a malicious web page, making reliance solely on hash based solutions inadequate. In the last 15 years detection techniques have evolved in an attempt to keep up with attack trends. In the last few years security companies have looked for supplemental solutions such as the use of machine learning to detect and mitigate attacks against cyber criminals. Let's not pretend attackers can't bypass each and every detection technique currently deployed. Join me as I present and review current detection methods found in most host and network security solutions found today. We will re-review the defense in depth strategy while keeping in mind that a solid security strategy consists of forcing an attacker to spend as much time and effort while needing to know a variety of skills and technologies in order to successfully pull off the attack. In the end I hope to convince you that thinking defensively requires thinking offensively.

 

Comments (0)

You don't have permission to comment on this page.