BSides Birmingham 2023

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
08:30
08:30
120min
Registration
Lobby
09:00
09:00
15min
Welcome and introduction of keynote
Alumni Theater
09:15
09:15
45min
KEYNOTE: The Digital Architects of Tomorrow: The Crucial Role of High School Graduates in Information Technology
Gabe Lee

The Digital Architects of Tomorrow: The Crucial Role of High School Graduates in Information Technology - High school and college kids are a demographic that has amazing raw talent that we will lose if we don't engage them.

Alumni Theater
10:00
10:00
320min
Capture the Flag (CTF) Village
Packet Ninjas

CTF Village

Villages
Ballroom C
10:00
50min
Match your cloud security and architecture to your business environment
Gaurav Ravindra Raje

If security is such an absolute requirement, and if AWS makes it so easy to build secure systems, why don't all companies build secure systems? What is it about companies, the stage lifecycle that they are in, that makes one company choose one architecture over other? What are the trade-offs associated with architectures on the cloud? When you build a secure system, what would you have to give up in return? This talk will discuss the various architectural tools and patterns that you could follow on AWS while building a secure, scalable system.

Ballroom D
10:00
150min
Mock Interview/Resume Review Village

Recruiters from APT will conduct mock interviews and review resumes

Villages
Room 314
10:00
50min
Next Generation Malware: Rootkits and Bootkits
Justin Lewis

Rootkits, malware embedded in the kernel, and bootkits, malware embedded in pre boot environment, are an interesting, but extremely dangerous set of malware classes that are on the rise. In this talk, we will look into why these kinds of malware are becoming more popular, what damage can be done in the privilege context they execute in, and what kinds of mitigations exist to prevent system damage.

Alumni Theater
10:00
320min
Tabletop Village

Join us at our Incident Tabletop Village! Dive deep into real-world security scenarios with "Backdoors and Breaches" by Black Hills Information Security.

Villages
Room 316
10:30
10:30
90min
Sponsors
Lobby
11:00
11:00
50min
Insecure OAuth configurations found in the wild
Joey White

The majority of smart home solutions begin with downloading a mobile app to manage the smart home products. The mobile apps controlling the smart homes may provide convenience to quickly manage the security camera, garage door, house alarm, etc. However, do they hold up against modern malicious actors?

Alumni Theater
11:00
50min
Secure for Sea: Designing and Deploying Security Operations and Network Operations in a Mobile, Limited Bandwidth Maritime Environment
Brad Proctor, Danny Joslin, Peter Dreyer

The speakers will discuss the challenges and solutions of deploying monitoring, detection, response, containment, and notification for commercial and government ships, including recent deployments that achieved governmental Authority to Operate (ATO). We will cover the handling of OT systems, including policies and procedures for governmental ATO.

Ballroom D
11:50
11:50
70min
Lunch
Lobby
13:00
13:00
150min
Sponsors
Lobby
13:00
50min
Big Game Hunting: Scanning the Internet for Malware
Skyler Onken

In the ever-evolving landscape of cybersecurity, the hunt for malicious actors and their infrastructure is a relentless pursuit. In our experience, most of known-bad infrastructure is derived from endpoint or firewall alerts, and reported either during or after an attack. This presentation delves into the fascinating world of proactively scanning the internet to uncover malware Command and Control (C2) servers. We will shed light on the "why," "how," and the invaluable results achieved through these endeavors.

Ballroom D
13:00
50min
Sliver Me Timbers: A C2 Alternative to Cobalt Strike
Steven Peterson

Cobalt Strike is the go-to C2 framework for security professionals and cyber criminal. Cobalt Strike's popularity has come at a cost to red teamers. It has become heavily signatured and requires a lot of customization to bypass a competent blue team.

Alumni Theater
14:00
14:00
50min
Rethinking Penetration Testing
Mike Saunders

The current model for traditional penetration testing is broken. Find out the difference between red and purple teams, assumed breach testing, and how to choose the right test to maximize impact.

Alumni Theater
14:00
50min
Securing and Managing the Open-Source Supply Chain
Darrius Robinson

There's no denying that we'll continue to face security breaches reminiscent of those affecting Solarwinds, Log4J, and Kaseya, and vulnerabilities in open-source components like Apache Struts and OpenSSL. Software supply chain threats are now an established part of the tech landscape, encompassing both deliberate attacks and unforeseen accidents. The real puzzle here is how IT leaders can stay proactive in addressing these threats. How can CIOs empower their development teams without inadvertently introducing new security flaws? How can they mend critical code issues in systems the organization might not even know exist, all while ensuring a harmonious balance between security and productivity?

Ballroom D
15:00
15:00
20min
Cloud Misconfigurations and Breaches
Mark Gaddy

In this talk, I give an overview of different cloud misconfigurations that have led to a variety of breaches. I also discuss different remediation steps corresponding to each misconfiguration.

Ballroom D
15:30
15:30
20min
Closing Remarks and Giveaways
Alumni Theater