BSides Las Vegas

  • Rank #
  • Premiered: Jul 2009
  • Episodes: 351
  • Followers: 0
  • Ended
  • Unknown
  • Unknown
  • Special interest

You need to be logged in to mark episodes as watched. Log in or sign up.

Season 2013
2013x1
KEYNOTE - The Security Industry - How to Survive Becoming Management
Episode overview
Air date
Jul 31, 2013
Christien Rioux will be discussing ‘The Security Industry: How to Survive Becoming Management’. Discussion about what the path to management looks like, what to expect from a start-up .. show full overview
2013x2
Discovering Dark Matter: Towards better Android Malware Heuristics
Episode overview
Air date
Jul 31, 2013
"There are nearly 1,000,000 free and paid Android apps available. A very small percentage of these mean to do you harm. Figuring out which apps are the bad ones is difficult enough for .. show full overview
2013x3
Mom! I Broke My Insulin Pump….Again!
Episode overview
Air date
Jul 31, 2013
Exactly two years ago I gave a presentation on weaknesses in diabetic medical devices, and how similar they were to industrial SCADA systems. Well, I got a new insulin pump, and I have .. show full overview
2013x4
Dungeons & Dragons, Siege Warfare, and Fantasy Defense in Depth
Episode overview
Air date
Jul 31, 2013
"Overzealous Admin: “I bet you can’t break in to my network! I got my stuff together…” Pentester: “I’m just here to help out and find the weaknesses the bad guys might or have .. show full overview
2013x5
HiveMind: Distributed File Storage Using JavaScript Botnets
Episode overview
Air date
Jul 31, 2013
Some data is too sensitive or volatile to store on systems you own. What if we could store it somewhere else without compromising the security or availability of the data, while .. show full overview
2013x6
gitDigger: Creating useful wordlists from public GitHub repositories
Episode overview
Air date
Jul 31, 2013
This presentation intends to cover the thought process and logistics behind building a better wordlist using github public repositories as its source. With an estimated 2,000,000 github .. show full overview
2013x7
Collaborative Penetration Testing With Lair
Episode overview
Air date
Jul 31, 2013
Lair is an open-source project developed for and by pentesters. Built on Meteor and Node.js with a dash of Python, Lair is a web application that normalizes, centralizes, and manages .. show full overview
2013x8
Social Aftermath Responding to Social Pwnage
Episode overview
Air date
Jul 31, 2013
Many social engineering talks focus on the exploitation of trust relationship and the resulting compromise of corporate and personal assets. However, what happens after the pwnage is .. show full overview
2013x9
Diamonds, Fitness and Cults: Manipulation for Fun and Profit
Episode overview
Air date
Jul 31, 2013
Why is the diamond a sign of love and devotion? Why do baseball players always step over the first base line? The history behind these questions are examples of how small manipulations .. show full overview
2013x10
Vulnerability & Exploit Trends: A Deep Look Inside The Data
Episode overview
Air date
Jul 31, 2013
While the past isn’t a direct indication of future performance, knowing the past is essential to predicting the future. In security, this requires reviewing large quantities of .. show full overview
2013x11
EC2 or Bust – How to Build Your Own Pen Testing Lab in Amazon EC2
Episode overview
Air date
Jul 31, 2013
Interested in building your own pen test training lab but lack the hardware or software to roll your own? One option is to go the way that most companies are doing these days and build .. show full overview
2013x12
Techniques for Escaping the AppSec Labyrinth
Episode overview
Air date
Jul 31, 2013
How can you secure your server if you have no idea what files, registry keys, users, groups, services, or other artifacts are created when an application is installed? Most vendor .. show full overview
2013x13
The Erudite Inebriate’s Guide to Life, Liberty, and the Purfuit of Happinefs
Episode overview
Air date
Jul 31, 2013
It is possible to eat healthy foods, moderate (or even eliminate) alcohol consumption, and exercise- both at home and while traveling. But life is too short for that nonsense, so let’s .. show full overview
2013x14
Hack the Hustle! Career Strategies for Information Security Professionals
Episode overview
Air date
Jul 31, 2013
While information security is widely considered a negative-unemployment industry (it’s actually closer to 3%), most of us will look for a job at some point. Seasoned technical recruiter .. show full overview
2013x15
Information Sharing, or “I’ve got 99 problems and they’re probably pretty similar to yours”
Episode overview
Air date
Jul 31, 2013
As infosec practitioners, we often operate in a vacuum or within silos. Reaching out to others in the community to share ideas, indicators, and problems helps to build a more relevant, .. show full overview
2013x16
Never Mind Your Diet, Cut the Crap From Your Vocabulary
Episode overview
Air date
Jul 31, 2013
It is never too inchoate to commence elucidating your obfuscated intelligence. Have you ever really listened to yourself or read what you have written? How many words can be reworded or .. show full overview
2013x17
The 7 habits of highly effective CISOs
Episode overview
Air date
Jul 31, 2013
Despite being l33t technologists, many infosec leaders feel overwhelmed, marginalized and resigned to the notion that CISO stands for “Career is So Over”. This talk is about positive .. show full overview
2013x18
The Little Dutch Boy
Episode overview
Air date
Jul 31, 2013
Does this sound painfully familiar: After hardening your systems and implementing a firewall, application and vulnerability scanners, network intrusion detection, and comprehensive patch .. show full overview
2013x19
Human Blue Teaming (Learning to patch the vulnerabilities in ourselves)
Episode overview
Air date
Jul 31, 2013
The Hacker Mentality is applied to technology with fervor. Take a thing, learn how it works, make it do cool things, bend it to your will. Yet in other areas, we take things at face .. show full overview
2013x20
Stop Shooting Blanks: No magic bullets in your arsenal
Episode overview
Air date
Jul 31, 2013
There is no one single device that will provide a total security solution. All those “magic” and 4th quadrant solutions will not protect you. Security is not a framework, not a .. show full overview
2013x21
Flameout – Burnout Supernova
Episode overview
Air date
Jul 31, 2013
The information security industry is notorious for flameouts of brilliant people. In looking back at the circumstances that lead to a dramatic situation, we can usually find early .. show full overview
2013x22
The Sensual Side of 3D Printing
Episode overview
Air date
Jul 31, 2013
Come one, come all! In this stimulating oral presentation, learn how to harness 3D printing technology for a purpose that we can all get behind: sex toys. You’ll be taken through the .. show full overview
2013x23
Attacking and Defending Full Disk Encryption
Episode overview
Air date
Jul 31, 2013
One of your company’s laptops was just stolen. You know that there was sensitive information on the machine. You also know that full disk encryption was deployed. Is your data safe? Can .. show full overview
2013x24
Say It to My Face
Episode overview
Air date
Jul 31, 2013
As we are becoming more immersed in technology the “talent” of face to face communication is becoming a commodity. This talk will look at Communication Degradation and its effect on .. show full overview
2013x25
Alex Dreams of Risk: How the Concept of Being a Craftsman can Help you Find Meaning and Avoid Burnout
Episode overview
Air date
Jul 31, 2013
Much talk has been given to the concept of burnout and recurring feelings of futility by InfoSec professionals.This talk will discuss the Japanese concept of the craftman’s spirit — .. show full overview
2013x26
GTFO FTW: Hacking Your Lifestyle for Fun and Profit
Episode overview
Air date
Jul 31, 2013
“See the world. Meet interesting people. Hack the planet.” You don’t have to join the military or the Peace Corps. Just be ready, able and enthusiastic to DROP TABLE status_quo;– .. show full overview
2013x27
You can’t make people act more securely, you can help them want to
Episode overview
Air date
Jul 31, 2013
Trying to make non-security people to follow security systems is incredibly difficult when it works, and incredibly difficult and frustrating when it fails. This presentation not only .. show full overview
2013x28
Your Droid Has No Clothes
Episode overview
Air date
Jul 31, 2013
With all of the recent focus on Android vulnerabilities, the Android landscape seems like an antivirus vendor’s dream. Unfortunately, for those who are using traditional protection .. show full overview
2013x29
You Are Being Watched!
Episode overview
Air date
Jul 31, 2013
Network Video Recorders (NVR) are network devices that record and store video from local and remote IP cameras on HDD storage. These NVRs are increasingly used in surveillance systems of .. show full overview
2013x30
Calling All Researchers: A Discussion on Building a Security Research Framework
Episode overview
Air date
Jul 31, 2013
Independent researchers are lifeblood of the hacking community. Discovering new vulnerabilities, formulating new strategies and ideas, publishing white papers and blogs, and creating .. show full overview
2013x31
Evil Empire: SIEM FTW
Episode overview
Air date
Jul 31, 2013
Come witness the prognosticators of the SIEM as we travel through the mysterious 5 Ages of Logging and Security. We will reveal the (likely bleak) future of every InfoSec pro’s fave .. show full overview
2013x32
Silence Equals Death
Episode overview
Air date
Aug 01, 2013
Sex, drugs and… censorship? This talk includes the Sex + Drugs talk that was censored under duress at BSides San Francisco, and begins by exploring why no topics should ever be off .. show full overview
2013x33
The Cavalry Isn’t Coming: Starting the Revolution to Fsck it All!
Episode overview
Air date
Aug 01, 2013
We have some good news and some bad news. The good news is that security is now top of mind for the people of planet Earth. The bad news is that their security illiteracy has lead to .. show full overview
2013x34
A Fire In The Eye
Episode overview
Air date
Aug 01, 2013
Signatureless attack detection is becoming the hot topic in threat prevention. Client side security vulnerabilities are often found in zero day exploits in the wild, meaning that .. show full overview
2013x35
Defense Evasion Modeling
Episode overview
Air date
Aug 01, 2013
Cybercriminals persistently challenge the security of organizations through the rapid implementation of diverse attack methodologies, state of the art malware, and innovative evasion .. show full overview
2013x36
“Malware Management Framework” – We detected WinNTI with it!
Episode overview
Air date
Aug 01, 2013
With all the security products you use, you still don’t have confidence that your networks are malware-free. And you’re right. They aren’t. You want to know a dirty little secret? .. show full overview
2013x37
Crunching the Top 10,000 Websites’ Password Policies and Controls
Episode overview
Air date
Aug 01, 2013
A detailed analysis of password policies and authentication controls for widely-used websites hadn’t been conducted and seemed to be a daunting effort. To address this I supplemented .. show full overview
2013x38
Governments and UFOs: A Historical Analysis of Disinformation and Deception
Episode overview
Air date
Aug 01, 2013
This talk is about the ways the many components of governments interact and respond to challenging and anomalous events–highly relevant to hacking by all definitions and at all levels. .. show full overview
2013x39
Strange interactions in personal data: Brokers and the CFAA
Episode overview
Air date
Aug 01, 2013
There is one very important fact, most people overlook when considering privacy and user data: Data cannot be owned. Personal data cannot be owned. This small fact has astounding .. show full overview
2013x40
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn’t Suck
Episode overview
Air date
Aug 01, 2013
As security professionals, almost every action we take comes down to making a risk-based decision. Web application vulnerabilities, malware infections, physical vulnerabilities, and .. show full overview
2013x41
How embracing social media helped me stop the hackers, save the world and get the girl!
Episode overview
Air date
Aug 01, 2013
I used to be a security professional, but even my boss didn’t remember my name. My brilliant ideas weren’t listened to, I was never invited to speak at conferences and not even my mother .. show full overview
2013x42
Malware Automation
Episode overview
Air date
Aug 01, 2013
Automation is key when it comes to production. The same is true for malware. Malware production has moved on from the traditional manual method to a more efficient automated assembly .. show full overview
2013x43
Popping the Penguin: An Introduction to the Principles of Linux Persistence
Episode overview
Air date
Aug 01, 2013
Breaking in is half the battle. I’ve talked to so many people whose only objective is to try and break into systems. I get that. It’s awesome, the rush you get when you bring up that .. show full overview
2013x44
Network Survival WCS
Episode overview
Air date
Aug 01, 2013
Imagine you have just started a new job and been handed a new (to you) desktop. It’s running Windows 7 and you have no local admin rights. Your new boss has challenged you to find out as .. show full overview
2013x45
The Slings and Arrows of Open Source Security
Episode overview
Air date
Aug 01, 2013
Creating and distributing useful software requires significant intellectual, emotional, temporal, and financial resources. Security software tends to require some level of operational .. show full overview
2013x46
What if Petraeus was a hacker? Email privacy for the rest of us
Episode overview
Air date
Aug 01, 2013
Almost every day there are new revelations about violations of user’s online privacy. Usually these infractions are for the monetary gain of an online entity, but at other times it can .. show full overview
2013x47
Fun with WebSockets using Socket Puppet
Episode overview
Air date
Aug 01, 2013
WebSockets are HTML5s solution for low latency communications. Support is now stable in major browsers, and developers are starting to use them for chat, games, videoconferencing, and .. show full overview
2013x48
Using Machine Learning to Support Information Security
Episode overview
Air date
Aug 01, 2013
Big Data, Data Science, Machine Learning and Analytics are a few of the new buzzwords that have invaded out industry of late. Again we are being sold a unicorn-laden, silver-bullet .. show full overview
2013x49
The Truth, You Thought We Wouldn’t Know?
Episode overview
Air date
Aug 01, 2013
OSINT is often mentioned, but not really covered. Occasionally mention is made of a particular tool, but the aspiring professional is left to their own means to discover how to use .. show full overview
2013x50
Vulnerabilities in Application Whitelisting: Malware Case Studies
Episode overview
Air date
Aug 01, 2013
In recent years, Application Whitelisting has been one of the new breeds of antimalware technology. However, malware has already developed techniques for dealing with and impeding this .. show full overview
2013x51
The Goodness is Baked In: Baking Assurance into Software
Episode overview
Air date
Aug 01, 2013
In an ever-changing world where the technological dependence is ever increasing — the government wants to provide transparency, everyone has 500+ friends on Facebook, your kids can use .. show full overview
2013x52
Matriux Leandros:An Open Source Penetration Testing and Forensic Distribution
Episode overview
Air date
Aug 01, 2013
Matriux is the first full-fledged Debian-based security distribution designed for penetration testing and forensic investigations. Although it is primarily designed for security .. show full overview
2013x53
Sixteen Colors: Archiving the Evolution of ANSI and ASCII Art
Episode overview
Air date
Aug 01, 2013
ANSI (and ASCII) art dominated online communication for a short time. However, in that small window the medium evolved from a necessary function of early online systems into an art form .. show full overview
2013x54
Swiping Cards At The Source: POS & Cash Machine Security
Episode overview
Air date
Aug 01, 2013
You put your credit card in, I take your cash out. Point of Sale systems and Cash Machines are frequently targeted but rarely discussed. This talk will be a frank discussion about the .. show full overview
2013x55
Busticating Same-Origin : The Fun Way
Episode overview
Air date
Aug 01, 2013
This episode has no summary.
2013x56
OMFG China!
Episode overview
Air date
Aug 01, 2013
The “China threat” is an incredibly hot topic in government and in the popular media. Information security companies have used the publicity to sell their services, and for the first .. show full overview
2013x57
ASK THE EFF – PANEL
Episode overview
Air date
Aug 01, 2013
Once again, the Electronic Frontier Foundation returns to the Underground to answer your toughest Off-the-Record queries. Question some of the greatest minds in the field of internet .. show full overview
2013x58
Catawampus
Episode overview
Air date
Aug 01, 2013
This episode has no summary.
2013x59
Mobile Fail: Cracking open “secure” android containers
Episode overview
Air date
Aug 01, 2013
We’ve known for some time that physical access to a device means game over. In response we’ve begun to rely more and more on “secure” container applications to keep our private and .. show full overview
2013x60
Legacy 0-Day: How Hackers Breached the Logica Mainframe
Episode overview
Air date
Aug 01, 2013
In early 2012 a group of 3 hackers were caught when a mainframe at Logica was no longer running as expected. This was the first warning that hackers had penetrated the once unpenetrable .. show full overview
2013x61
Attribution Shmatribution! FIX YOUR SHIT!
Episode overview
Air date
Aug 01, 2013
APT, Cyberwar, ANONYMOUS, ACTIVE DEFENSE! All things you will hear along with the word “Attribution” but what is the point of attribution anyway? Are you going to hack back? Will you .. show full overview
2013x62 Season finale
Breach Panel
Episode overview
Air date
Aug 01, 2013
“A burglar steals an unencrypted powered-down laptop containing PII and is immediately hit and killed by a bus. Data breach?” as more laws are passed there remain many difficult .. show full overview

If there are missing episodes or banners (and they exist on TheTVDB) you can request an automatic full show update:

Request show update