BSides CHS 2019 Schedule

08:00 - 09:00


09:00 - 10:00


Switching Sides: The Practical Benefits of Switching from Red to Blue to Purple by Maddie Stone

Track 1

Track 2

Track 3

10:00 - 10:30

trustno1: Protecting your Data in a Zero Trust World by David Medical Records and Default Passwords by Q (30min) Venemy – An Intelligence Tool for Venmo by Michael Portera

10:30 - 11:00

Security metrics: is it even possible? by DrX(30min)

11:00 - 12:00

Keeping your Threat Intelligence Program in Pace with your Continuous Monitoring. by duckie PErfidious: Make PE backdooring great again! by Shreyans Doshi How to test Network Investigative Techniques(NITs) used by the FBI by Matthew Miller

12:00 - 13:00


13:00 - 14:00

The Red Team Machine: Optimizing for Success by Patrick Fussell, Tom Porter A Practical Guide to Securing OpenShift by Phillip Kramp, Chris Grimm An Introduction to Open Source Intelligence Gathering with Maltego by Patrick Haughney

14:00 - 15:00

Real News and Fake Photos: Towards Usable Privacy for Journalism and Photo Sharing by Kelly Caine The Overlooked Security Risk: 3rd Party Risk Management by Rose Songer Translating Cybersecurity into Business Risk, How to get your CFOs attention and keep it! by Brian Byrne

15:00 - 16:00

Security at Speed: Securing Code in your DevOps Pipeline by Daniel Byrnside Having your pick of the litter: Storing Malware Stagers in Enterprise Services by Fernando Tomlinson Enabling Effective Cloud Security Monitoring with Security Onion by Wes Lambert

16:00 - 17:00

Detectors as Code - Building Better Detectors by Brandon Poole The Top 5 Ways I Own Your Internal Network by Heath Adams An Introduction to Cuckoo Sandbox by Rick Matthews

17:00 - 17:30

Closing Remarks