- 101
- 9 489
BSides Tampa
United States
Приєднався 25 бер 2021
B-Sides Tampa is an Information Technology Security Conference hosted by the Tampa Bay Chapter of (ISC)², a registered 501(c)3 non-profit organization.
The purpose of the B-Sides Tampa is to provide an open platform for Information Security industry professionals to collaborate, exchange ideas and develop long standing relationships with others in the community.
The B-Sides Tampa IT Security Conference will take place Virtually starting on March 26th-27th, 2021.
The purpose of the B-Sides Tampa is to provide an open platform for Information Security industry professionals to collaborate, exchange ideas and develop long standing relationships with others in the community.
The B-Sides Tampa IT Security Conference will take place Virtually starting on March 26th-27th, 2021.
Відео
CISO Track Panel
Переглядів 287 місяців тому
CISO Track Panel Members include: Christina Shannon, Andrew Cannata, Kyle Redding, Larry Whiteside, Dave Summit, G Mark Hardy, James Bowie, Kathleen Mullin, and Brett Colon.
Finding Secrets in PDF Files by Kenny Brown & Nikita Mazurov
Переглядів 717 місяців тому
Finding Secrets in PDF Files by Kenny Brown & Nikita Mazurov Description This presentation will explore the myriad of ways available to curious minds to find secrets lurking in PDF files content the authors never intended their readers to discover. Investigative techniques covered will include undoing redactions and cropping, exploring metadata to uncover document details, extracting high resol...
Attack of the Clones! How AI can boost your API Security! by Dr. Sunny Wear
Переглядів 487 місяців тому
Attack of the Clones! How AI can boost your API Security! by Dr. Sunny Wear Description Learn how Artificial Intelligence (AI) can be used to improve the security posture of your API endpoints. Leveraging the power of AI, see how you can protect your organization against some of the deadliest API attacks occurring today. While developers are coding, building, and testing APIs, these techniques ...
Mock Interview 1 Q&A - Recruiter Matt Schwope by Matt Schwope
Переглядів 587 місяців тому
Mock Interview 1 Q&A - Recruiter Matt Schwope by Matt Schwope
Cyber Resilience Starts Within: A Mental Health Perspective by Ben Hartwick
Переглядів 407 місяців тому
Cyber Resilience Starts Within: A Mental Health Perspective by Ben Hartwick Description The presentation I would like to give will provide insights on coping with Day to Day issues folks in the security industry face that are different stressors than other fields. It will include coping tactics, treating yourself right, and building resiliency to within to handle the day to day in a stressful o...
Phish & Furious: Unraveling Campaign Builder Vulnerabilities in a Blink-and-Breach World
Переглядів 277 місяців тому
Phish & Furious: Unraveling Campaign Builder Vulnerabilities in a Blink-and-Breach World by Raae Wolfram Description The presentation explores campaign builder vulnerabilities in the digital landscape, analyzing real-world cases for insights into phishing attacks. "Phish and Furious" provides strategies for dynamic cybersecurity defense, contributing to the conference dialogue on evolving threa...
GRC & The Min & Max of Multi-Framework Optimization by Elsa Arcilla
Переглядів 487 місяців тому
GRC & The Min & Max of Multi-Framework Optimization by Elsa Arcilla Description Discover the keys to effective MultiFramework Optimization in GRC, navigating complexities to minimize risk and maximize efficiency. Explore methodical strategies and practical insights to harmonize diverse frameworks, empowering organizations to build resilience in the face of evolving cyber threats. At the end of ...
Navigating the Shadows: A Comprehensive Exploration of Popular and Malicious Tools on the Dark Web
Переглядів 787 місяців тому
Navigating the Shadows: A Comprehensive Exploration of Popular and Malicious Tools on the Dark Web by Michaelangelo Zummo Description In his extensive experience presenting and instructing at security conferences across North America, Zummo has consistently informed audiences on the nuances of safely navigating the dark web, conducting threat hunting in the clandestine corners of the internet, ...
Winning by deception: tactics, techniques, and procedures of adversarial A.I.
Переглядів 1027 місяців тому
Winning by deception: tactics, techniques, and procedures of adversarial A.I. by Michael Mallen & Jeremy Rasmussen Description Machiavelli advised: “Never attempt to win by force what can be won by deception.” Adversarial use of A.I. by hackers is a growing concern because it turns the very power of A.I. - as a force multiplier for human analysts - against itself. Attackers can exploit vulnerab...
Career Panel Discussion
Переглядів 677 місяців тому
Career Panel Discussion Description Panel Team: Kurt Sanger, Ajay Menendez, Leyla Balaskas, Orlando Haynes, Kasandra Perez Topics o How to work with a recruiter and use them for your benefit o LinkedIn = How to use it for jobs, how to use it for networking, and how recruiters use it to find candidates o What are some Red Flags recruiters and employer’s look at? o How to discuss salary for a new...
Gaining experience through CTFs by Angela Ramos
Переглядів 2437 місяців тому
Gaining experience through CTFs by Angela Ramos Description The purpose of the talk would introduce people to CTF events focusing on newbies to cyber or those who are trying to transition into a cyber role using CTFs has a platform to demonstrate skills when experience in the field is lacking
Digital Forensics - The Importance of Forensic Triage Images by Ryan Irving
Переглядів 657 місяців тому
Digital Forensics - The Importance of Forensic Triage Images by Ryan Irving Description How long do you wait to collect digital evidence in the midst of a cyber incident? What forensic artifacts should I collect? What tools do I have to collect the data the needed? These questions and more will be answered and discussed during the presentation. With a focus on Windows based systems, we will del...
Basic Malware Analysis for Incident Responders by Jared Graff
Переглядів 867 місяців тому
Basic Malware Analysis for Incident Responders by Jared Graff Description My presentation goes over some basic malware analysis techniques to help incident responders in their investigation. My presentation will go over some of the following topics: PeStudio, trid, pdf-parser, pdfid, Strings, FLOSS, Differences in strings in binaries and stacked strings, finding network indicators in binaries u...
Not Your Mama's Risk Assessment by Seth Earby
Переглядів 387 місяців тому
Not Your Mama's Risk Assessment by Seth Earby
Evasive Facility Breach: From Ingress to Egress in 15 Minutes or Less by Ralph May & Travis Weathers
Переглядів 417 місяців тому
Evasive Facility Breach: From Ingress to Egress in 15 Minutes or Less by Ralph May & Travis Weathers
The New and Improved NIST CSF 2.0 by Michael Brown Security & Compliance Director FRG Systems
Переглядів 707 місяців тому
The New and Improved NIST CSF 2.0 by Michael Brown Security & Compliance Director FRG Systems
Navigating the Cyber World: The Impact of AI on Cybersecurity Strategies by Erich Kron KnowBe4
Переглядів 877 місяців тому
Navigating the Cyber World: The Impact of AI on Cybersecurity Strategies by Erich Kron KnowBe4
Container Security, Are You Doing It Wrong? by Jeff Weatherford Oteemo
Переглядів 1198 місяців тому
Container Security, Are You Doing It Wrong? by Jeff Weatherford Oteemo
Leveling Up your Cybersecurity Career by Hacking Your Mental Programming by Jennifer Roman
Переглядів 1098 місяців тому
Leveling Up your Cybersecurity Career by Hacking Your Mental Programming by Jennifer Roman
Who Let the Dogs Out? When PUPs Become BlackCat's Best Friend Ryan Rath & Matthew Boyle
Переглядів 1028 місяців тому
Who Let the Dogs Out? When PUPs Become BlackCat's Best Friend Ryan Rath & Matthew Boyle
The Fault in Our Metrics: Rethinking How We Measure Detection & Response by Allyn Stott
Переглядів 2778 місяців тому
The Fault in Our Metrics: Rethinking How We Measure Detection & Response by Allyn Stott
Future-proofing Your Career in Cybersecurity by Nicolas Moy
Переглядів 1658 місяців тому
Future-proofing Your Career in Cybersecurity by Nicolas Moy
Understanding CMMC and NIST 800-171 for CUI by Peter Bagley
Переглядів 678 місяців тому
Understanding CMMC and NIST 800-171 for CUI by Peter Bagley
Attacks on JSON Web Tokens: A Comprehensive Analysis by Chesleah Kribs
Переглядів 1978 місяців тому
Attacks on JSON Web Tokens: A Comprehensive Analysis by Chesleah Kribs
Measures for Securing Privileged Users in M365&Azure Every Organization Should Take by Eric Woodruff
Переглядів 698 місяців тому
Measures for Securing Privileged Users in M365&Azure Every Organization Should Take by Eric Woodruff
New Legal & Regulatory Developments Impacting the IT Professional Community by Kurt Sanger
Переглядів 238 місяців тому
New Legal & Regulatory Developments Impacting the IT Professional Community by Kurt Sanger
amazing talk, so much valuable information for interviews, Peter Bagley killed it.
🔥
Enjoyed the discussion. Several good talking points.
Loved this guy he was a great speaker!
Thx! 🦄
He’s just a kid…that’s getting into the NBA not based on merit or skill but based on his ties to his father. He didn’t earn it like the other guys to come before him. They aren’t trying to stop him live out his dream, they are holding you accountable for your forcing something to happen.
0th viewer
Thanks for the great instructions and tutorial. I have now completed my first soldering project!
One of the best talk ❤🔥❤🔥❤🔥
🔥
🔥
🔥
🔥
🔥
OUTSTANDING!
God willing I'll be your aprintis and Lear the Force
😩 P r o m o S M
Promo SM
What a great presentation!