Sched.com Conference Mobile Apps
BSidesSF 2019
has ended
Create Your Own Event
BSidesSF 2019
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Villagers
Tickets
Search
or browse by date + venue
Closing Ceremony
All
Closing Ceremony
Coat Check
CTF
Food & Drink
General
Keynote
Sponsor Lounge
Track: City View
All
Talk
Track: IMAX
All
Talk
Track: Theater 14
All
Talk
Track: Theater 15
All
Talk
Village
Workshop
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Sponsors
Villagers
Tickets
Search
Popular Events
#1
Opening Remarks
#2
The Path to Infosec Is Not Always Linear
#3
Securing Online Identities with Simple, Secure, Open Standards
#4
Lunch
#5
Opening Remarks
#6
Happy Hour
#7
How to Orchestrate a Cyber Security Incident Tabletop Exercise
#8
How to Lose a Container in 10 Minutes
#9
Security Automation Simplified
#10
Don't Boil the Ocean: Using MITRE ATT&CK to Guide Hunting Activity
#11
Party
#12
Back to the SOCless Future: Implementing Monitoring & Response Through Automation
#13
Navigating Passwordless Authentication with FIDO2 & WebAuthn
#14
Lyft Cartography: Automating Security Visibility and Democratization
#15
Lunch
#16
Automating Web Application Bug Hunting
#17
All Your Containers Are Belong to Us
#18
Closing Ceremony
#19
Breakfast
#20
Breakfast
#21
DevSecOps State of the Union
#22
Building Identity for an Open Perimeter
#23
HTTP Security Headers: A Technology History Through Scar Tissue
#24
Concrete Steps to Create a Security Culture
#25
How to Build an Application Security Program
#26
Offensive Javascript Techniques for Red Teamers (Or Anyone Really)
#27
Containers: Your Ally in Improving Security
#28
Making Sense of Unstructured Threat Data
#29
Career Mutation: A Panel on the Evolution to Management in Security
#30
Slack App Security: Securing Your Workspaces from a Bot Uprising
#31
Ethical Hacking: DIY Mobile Security Workstation (For Cheap)
#32
WHOIS Calling the 80s to Get Their Finger Back: LOL with Old TCP Services
#33
Implementing a Kick-Butt Training Program: BLUE TEAM GO!
#34
Do You Even Tech Anymore: Management & Leadership in Security?
#35
Cats? In My Certificate Transparency Logs? It's More Likely Than You Think
#36
Bye-Bye False Positives: Using AI to Improve Detection
#37
Anti-Privacy Anti-Patterns
#38
Registration
#39
Ask the EFF
#40
Hacking with a Heads Up Display
#41
Fuzzing Malware for Fun & Profit: Applying Coverage-Guided Fuzzing to Find and Exploit Bugs in Modern Malware
#42
A Deep Dive into Go Malware: Using Metadata to Empower the Analyst
#43
BADPDF: Stealing Windows Credentials via PDF Files
#44
Arcades and Audits: What Gaming Can Do for Your Security Posture
#45
Friend or Replicant: How Attackers Automate and Disguise Themselves in a Shroud of Authenticity to Gain Followers, Control Influence, and Malign Credit
#46
Strangeways, Here We Come: A Journey from On-Prem to Cloud First with AWS
#47
How to Fix the Diversity Gap in Cybersecurity
#48
Deploying Two-Factor Authentication to Millions of Users
#49
RadRAT: An all-in-one toolkit for complex espionage ops
#50
Conquer the Enterprise from Inside with Penetration Testing Dropboxes
Popular by Type
All Types
Closing Ceremony
Coat Check
CTF
Food & Drink
General
Keynote
Sponsor Lounge
Track: City View
Track: IMAX
Track: Theater 14
Track: Theater 15
Village
Workshop
Popular by Day
All days
Saturday, Mar 2
Sunday, Mar 3
Monday, Mar 4
Twitter Feed