These are the videos from the BSides San Francisco conference. Special thanks to Mike & Doug for having me out, Steen, Zappo & Jeremy for their house AV work, and n0ty3p, Forest, Nick, James & others I'm forgetting for their help recording
Track 1
Keynote: A Declaration of the Independence of Cyberspace
John Perry Barlow
The Tales of a Bug Bounty Hunter
Arne Swinnen
Who's Breaking into Your Garden? iOS and OS X Malware You May or May Not Know
Claud Xiao
A year in the wild: fighting malware at the corporate level
Kuba Sendor
Breaking Honeypots for Fun and Profit
Gadi Evron, Dean Sysman, Itamar Sher
Everything Is Awful (And You're Not Helping)
Jan Schaumann
Why it's all snake oil - and that may be ok
Pablo Breuer
Ask the EFF
Kurt Opsahl, Eva Galperin, Andrew Crocker, Shahid Buttar, Cooper Quintin
Sweet Security: Deploying a Defensive Raspberry Pi
Travis Smith
Planning Effective Red Team Exercises
Sean T. Malone
Fraud Detection & Real-time Trust Decisions
James Addison
Fuzz Smarter, Not Harder (An afl-fuzz Primer)
Craig Young
Elliptic Curve Cryptography for those who are afraid of mathematics
Martijn Grooten
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
Gadi Evron
Track 2
Mainframes? On My Internet?
Soldier of Fortran (not recorded)
Securing the Distributed Workforce
William Bengtson
Hackers Hiring Hackers - How to hack the job search and hack talent
IrishMASMS (not recorded)
Scan, Pwn, Next! - exploiting service accounts in Windows networks
Andrey Dulkin, Matan Hart
Guest to root - How to Hack Your Own Career Path and Stand Out
Javvad Malik
IoT on Easy Mode (Reversing Embedded Devices)
Elvis Collado
In the crosshairs: the trend towards targeted attacks
Lance Cottrell
Developing a Rugged DevOps Approach to Cloud Security
Tim Prendergast
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
Alex Pinto
The Ransomware Threat: Tracking the Digital Footprints
Kevin Bottomley
Access Control in 2016 - deep dive
Dr. Ulrich Lang
Using Behavior to Protect Cloud Servers
Anirban Banerjee
The Art of the Jedi Mind Trick
Jeff Man
Mobile App Corporate Espionage
Michael Raggo
Advanced techniques for real-time detection of polymorphic malware
Ajit Thyagarajan
Downloads:
https://archive.org/details/BSidesSF2016
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek