BSides Las Vegas

  • Rank #
  • Premiered: Jul 2009
  • Episodes: 351
  • Followers: 0
  • Ended
  • Unknown
  • Unknown
  • Special interest

You need to be logged in to mark episodes as watched. Log in or sign up.

Season 2018
2018x1
Cold Case Cyber Investigations: Catfishing Cooper and Other Ops
Episode overview
Air date
Aug 07, 2018
Jim Christy will discuss the history and future of using Digital Forensics to solve almost any investigation, including his role leading Cyber Ops for the D.B. Cooper Cold Case .. show full overview
2018x2
The Best of Security BSides Now and Then: Ten Years of Mixes
Episode overview
Air date
Aug 07, 2018
How to (accidentally?) Change The @%!$ World in just ten years and a couple of two-day follow-ups.
2018x3
ATT&CKing the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK
Episode overview
Air date
Aug 07, 2018
Whenever we discover another breach, adversaries give us a friendly reminder that the status quo in network defense isn’t good enough. Everyone’s telling us that we need to evolve our .. show full overview
2018x4
SiliVaccine: North Korea's Weapon of Mass Detection
Episode overview
Air date
Aug 07, 2018
Meet SiliVaccine – North Korea’s national Anti-Virus solution. SiliVaccine is deployed widely and exclusively in the DPRK, and has been continuously in development by the government. .. show full overview
2018x5
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else
Episode overview
Air date
Aug 07, 2018
Exploits, Backdoors, and Hacks: words we do not commonly hear when speaking of Machine Learning (ML). In this talk, I will present the relatively new field of hacking and manipulate .. show full overview
2018x6
Attacking Ethereum dApps
Episode overview
Air date
Aug 07, 2018
Ethereum dApps (decentralized apps) are a core pillar of why development on the platform has skyrocketed. Many of these dApps work by combining standard web applications with a consensus .. show full overview
2018x7
Serverless Infections: Malware Just Found a New Home
Episode overview
Air date
Aug 07, 2018
We are seeing more and more organizations leverage the advantages introduced by serverless computing. But what does serverless computing entail when it comes to security? With no .. show full overview
2018x8
Who Wants to Be A Regulator: The IoT Security Game Show
Episode overview
Air date
Aug 07, 2018
Everyone talks about IoT security failures, but who should actual do all the things? We bring back 80s style, while tackling the question of government involvement in the IoTs in a .. show full overview
2018x9
How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises
Episode overview
Air date
Aug 07, 2018
Nation-state offensive digital attacks are on the rise. Especially considering the news headlines. But, what is cyber warfare and what’s realistic? Come on a journey into a twisted but .. show full overview
2018x10
Red Teaming a Manufacturing Network (Without Crashing It)
Episode overview
Air date
Aug 07, 2018
Cybersecurity in manufacturing environments is becoming more and more critical. However, many organizations do not know or understand the cyber risk in their manufacturing networks and .. show full overview
2018x11
An Encyclopedia of Wiretaps
Episode overview
Air date
Aug 07, 2018
Warrants. Wiretaps. PRTTs. Subpoenas. Section 702. 2703(d) order. National Security Letters. All Writs Act. Many in the infosec community are aware that the government has an array of .. show full overview
2018x12
You're just complaining because you're guilty: A Guide for Citizens and Hackers to Adversarial Testing of Software Used In the Criminal Justice System
Episode overview
Air date
Aug 07, 2018
Proprietary software is used throughout the criminal justice system, and the trade secrets of software vendors are regularly deemed more important than the rights of the accused to .. show full overview
2018x13
The Chrome Crusader
Episode overview
Air date
Aug 07, 2018
Crusade into the wild world of malicious browser extensions. You will learn how to do keylogging, cookie stealing, credential harvesting and building a C&C server allowing you to execute .. show full overview
2018x14
Active Directory Password Blacklisting
Episode overview
Air date
Aug 07, 2018
Active Directory remains the most popular corporate solution for organizing devices and users on a network. Central to its responsibilities is providing user authentication and .. show full overview
2018x15
Anatomy of NTLMv1/NTLMv1-SSP
Episode overview
Air date
Aug 07, 2018
There has been some confusion about NTLMv1 and NTLMv1-SSP reversing to NTLM hashes using hashcats mode 14000. This was largely due to a talk at Derbycon that had some incomplete .. show full overview
2018x16
Fighting Fraud in the Trenches
Episode overview
Air date
Aug 07, 2018
There are many eCommerce and SaaS businesses that offer loyalty programs. Some involve gift cards and credit points. Some include cash back and currency that can be used somewhere .. show full overview
2018x17
The Effect of Constraints on the Number of Viable Permutations of Passwords
Episode overview
Air date
Aug 07, 2018
Typically the impact of constraints on the maximum number of permutations for a password is not considered much-the-less quantified. Password policies that require a minimum character .. show full overview
2018x18
A scanner darkly: Blue team techniques to break discovery
Episode overview
Air date
Aug 07, 2018
This episode has no summary.
2018x19
Get on the Eye Level: Tailoring the Security Talk
Episode overview
Air date
Aug 07, 2018
“Talking outside the community about security basics and teaching security awareness without resorting to FUD-tactics can be both challenging and satisfying. Challenging because you .. show full overview
2018x20
Who Watches the Watchers?: Understanding the Internet's Background Noise
Episode overview
Air date
Aug 07, 2018
The instant a device is connected to the internet, it gets scanned and interrogated for open ports, software versions, and default passwords. Who conducts these scans? Why? What kind of .. show full overview
2018x21
Lessons Learned by the WordPress Security Team
Episode overview
Air date
Aug 07, 2018
Managing security for the WordPress project is a challenge to say the least. The sheer volume of reports, the resulting noise, securing an aging codebase, handling disclosure -all .. show full overview
2018x22
101 ways to fail at getting value out of your investments in security analytics, and how not to do that
Episode overview
Air date
Aug 07, 2018
The value promised and expected by investing in data analytics simply can’t be delivered unless you can GET the data and get THE data. This case study will detail how a global energy .. show full overview
2018x23
An Introduction to Machine Learning and Deep Learning
Episode overview
Air date
Aug 07, 2018
Machine learning is the science of developing programs that can automatically learn from data. First, this talk will give some simple examples of machine learning. Next, we’ll delve into .. show full overview
2018x24
Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification
Episode overview
Air date
Aug 07, 2018
The proliferation of ransomware has become a widespread problem culminating in numerous incidents that have affected users worldwide. Current ransomware detection approaches are limited .. show full overview
2018x25
Sight beyond sight: Detecting phishing with computer vision.
Episode overview
Air date
Aug 07, 2018
Deep learning architectures have been used with great success to mimic or exceed human visual perception in well-scoped tasks ranging from identifying cats in Youtube videos to cars in .. show full overview
2018x26
Catch me, Yes we can! -Pwning Social Engineers using Natural Language Processing Techniques in real-time
Episode overview
Air date
Aug 07, 2018
Social engineering is a big problem but very little progress has been made in stopping it, aside from the detection of email phishing. We observe that any social engineering attack must .. show full overview
2018x27
Lesley Carhart Kicks Off Hire Ground
Episode overview
Air date
Aug 07, 2018
To kick off Hire Ground, Lesley Carhart will share how best to leverage your time at BSidesLV and in Hire Ground to help your career. You may be either just starting out or a seasoned .. show full overview
2018x28
From Hacker to Serial Entreprenuer
Episode overview
Air date
Aug 07, 2018
Matt DeVost has been hacking for over 25 years and has become one of the leading experts on cyber and security domains. One of Matt’s key phrases is HACKthink – applying the hacker .. show full overview
2018x29
You're Good and You Should Feel Good
Episode overview
Air date
Aug 07, 2018
Everyone knows that security talent is scarce. When interviewing for a position, it is important to fully appreciate what that means. As an interviewee, you have the opportunity to be .. show full overview
2018x30
The Long Way Around – from Software Engineering to Cyber Security (How Choosing Wrong Turned out to be Right)
Episode overview
Air date
Aug 07, 2018
A career in Cyber Security does not always follow a linear path. In some cases, a successful career in cyber security can result from breadth of experience in seemingly unrelated .. show full overview
2018x31
Redefining the Hacker
Episode overview
Air date
Aug 07, 2018
Many women and underrepresented groups have faced adversity and lack of inclusion in their careers in Security. We have been able to rise above and “hack” through the obstacles. This .. show full overview
2018x32
What Did We Learn from Today? (Recruiter Panel)
Episode overview
Air date
Aug 07, 2018
Panelists of recruiters debate and expand upon the major points brought up in today’s sessions. And every question you wanted to ask a recruiter, you can do so now!
2018x33
I Am The Cavalry Kickoff & Panel
Episode overview
Air date
Aug 07, 2018
This episode has no summary.
2018x34
Engaging the Media: Know Your Target
Episode overview
Air date
Aug 07, 2018
Cybersecurity needs more and better ambassadors, particularly on topics that relate to cybersafety, where creating positive social change is more time-sensitive to avoid public harm. A .. show full overview
2018x35
Engaging the Media: Telling Your Story
Episode overview
Air date
Aug 07, 2018
Cybersecurity needs more and better ambassadors, particularly on topics that relate to cybersafety, where creating positive social change is more time-sensitive to avoid public harm. A .. show full overview
2018x36
A Good Day to Die? IoT End of Life
Episode overview
Air date
Aug 07, 2018
IoT security is a known hard problem. A number of efforts are devoted to addressing risks in new devices by codifying and standardizing better security and development practices. The .. show full overview
2018x37
Cyber Safety Disclosure
Episode overview
Air date
Aug 07, 2018
Vulnerability disclosures for safety-critical systems are f’n hard. Even when the finder/reporter and receiver/manufacturer are working closely in good faith, things get weird AF. When .. show full overview
2018x38
Social engineering at scale, for fun
Episode overview
Air date
Aug 07, 2018
I’ve spoken elsewhere about the tech and social ecosystems surrounding massive social engineering using misinformation and other forms of “fake news”. Now it’s time to talk about the .. show full overview
2018x39
Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement
Episode overview
Air date
Aug 07, 2018
User interaction is fundamental to successful IT operations within an organization. A disconnect between the end user point of view and the IT professional is growing. For many IT .. show full overview
2018x40
Building A Teaching / Improvement Focused SOC
Episode overview
Air date
Aug 07, 2018
Effective security monitoring is an ongoing process. How do you get everyone participating? How do you on-board junior colleagues to continuous improvement? The purpose of this .. show full overview
2018x41
Modern Political Warfare: A Look at Strategy and TTPs
Episode overview
Air date
Aug 07, 2018
Political warfare is back. Political warfare or political war is the “use of political means to compel an opponent to do one’s will, political being understood to describe purposeful .. show full overview
2018x42
Legendary Defender - The Voltron Analogy
Episode overview
Air date
Aug 07, 2018
As a practicing Information Security consultant, I’ve seen many organizations fail at implementing effective security programs, not as a result of having incorrect technology, and not .. show full overview
2018x43
Not your Grandpa's Password Policy
Episode overview
Air date
Aug 07, 2018
This talk will describe the password policy at Pure Storage, which involves the security team actively attempting to crack employee passwords, forcing a change when discovered, and .. show full overview
2018x44
Vulnerability Management 101: Practical Experience and Recommendations
Episode overview
Air date
Aug 07, 2018
Vulnerability management, in the context of information security, is a critical, but often overlooked aspect in a comprehensive security posture. Many organizations are limited by time .. show full overview
2018x45
Network Security Monitoring
Episode overview
Air date
Aug 07, 2018
Hands on network security monitoring training with Bro. Students will ssh into a live training environment and analyze PCAPs for common types of attacks – brute forcing, smb related attacks and more.
2018x46
Intro to Industrial Control System Network Analysis
Episode overview
Air date
Aug 07, 2018
Industrial Control Systems (ICS) are the silent machines that control the world all around us. ICS systems are used to control elevators, subways, building HVAC systems and the .. show full overview
2018x47
Windows Internals and Local Attack Surface Analysis using Powershell
Episode overview
Air date
Aug 07, 2018
Inspecting the internals of Microsoft Windows and discovering interesting attack surface for local privilege escalation can be a dark art. Outside of trivial enumeration and fuzzing of .. show full overview
2018x48
Introduction to Cryptographic Attacks
Episode overview
Air date
Aug 07, 2018
Using cryptography is often a subtle practice and mistakes can result in significant vulnerabilities. This workshop will cover many of these vulnerabilities which have shown up in the .. show full overview
2018x49
Mobile Application Hacking - Master Class
Episode overview
Air date
Aug 07, 2018
Mobile Application Hacking is a hands-on class designed to teach participants with techniques and tools for mobile application (both iOS and Android) penetration testing. The class .. show full overview
2018x50 Show finale
Deep Dive into NMAP & Network Scanning
Episode overview
Air date
Aug 07, 2018
This will be an in-depth dive into network scanning with NMAP and the proper way to approach a target network. In this hands-on-the-keyboard training, you will learn recon, scanning, .. show full overview

If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:

Request show update