{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2026.1.0.dev0"}, "schedule": {"url": "https://pretalx.com/bsidesatl-2024/schedule/", "version": "09122024", "base_url": "https://pretalx.com", "conference": {"acronym": "bsidesatl-2024", "title": "BSides Atlanta 2024", "start": "2024-09-14", "end": "2024-09-14", "daysCount": 1, "timeslot_duration": "00:05", "time_zone_name": "America/New_York", "colors": {"primary": "#3aa57c"}, "rooms": [{"name": "Atrium - Vendors", "slug": "3431-atrium-vendors", "guid": "0b70ef3a-27f1-5f2e-879a-e6744a17d0e7", "description": null, "capacity": null}, {"name": "Atrium - Check in", "slug": "3432-atrium-check-in", "guid": "1d32949b-9014-59ea-acc2-d7c766f2fc01", "description": null, "capacity": null}, {"name": "Room 300", "slug": "3442-room-300", "guid": "a2540b1a-06fa-52d6-97ac-925a19bce272", "description": null, "capacity": null}, {"name": "Room 400", "slug": "3434-room-400", "guid": "53dd3a69-77a3-5f40-a2d2-2671474b2b90", "description": null, "capacity": null}, {"name": "Room 401", "slug": "3435-room-401", "guid": "985abe3b-f61f-5d8e-a2a3-24f2e3229473", "description": null, "capacity": null}, {"name": "Room 402", "slug": "3436-room-402", "guid": "f3b42678-7831-500f-9380-2e39c7e154ea", "description": null, "capacity": null}, {"name": "Room 441", "slug": "3437-room-441", "guid": "01eb5701-4e85-5adb-80b4-56dd16ae2b9a", "description": null, "capacity": null}, {"name": "Room 460", "slug": "3438-room-460", "guid": "c834068a-2bde-5583-bea4-db6f6459dcaf", "description": null, "capacity": null}, {"name": "Room 461", "slug": "3439-room-461", "guid": "f5625c7b-5c65-58e7-84cf-43c597d175a5", "description": null, "capacity": null}, {"name": "Room 462", "slug": "3440-room-462", "guid": "a3dc2254-f5fe-5026-9287-95c894cb495a", "description": null, "capacity": null}, {"name": "Room 464", "slug": "3441-room-464", "guid": "fb119e79-1bea-53d8-ae02-de84ffe9bb19", "description": null, "capacity": null}], "tracks": [{"name": "Trends", "slug": "4942-trends", "color": "#F42121"}, {"name": "Tactics", "slug": "4943-tactics", "color": "#4826ED"}, {"name": "Trust", "slug": "4944-trust", "color": "#3EAC3B"}, {"name": "Village", "slug": "4945-village", "color": "#C730BC"}], "days": [{"index": 1, "date": "2024-09-14", "day_start": "2024-09-14T04:00:00-04:00", "day_end": "2024-09-15T03:59:00-04:00", "rooms": {"Atrium - Vendors": [{"guid": "e8e305f5-c253-5653-bb19-c8223bbe0841", "code": "TZ78GA", "id": 55015, "logo": null, "date": "2024-09-14T09:00:00-04:00", "start": "09:00", "duration": "08:00", "room": "Atrium - Vendors", "slug": "bsidesatl-2024-55015-vendor-village", "url": "https://pretalx.com/bsidesatl-2024/talk/TZ78GA/", "title": "Vendor Village", "subtitle": "", "track": null, "type": "Full-day Village", "language": "en", "abstract": "Vendor village", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/TZ78GA/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/TZ78GA/", "attachments": []}], "Atrium - Check in": [{"guid": "f3d08c8d-ca56-566e-beee-dd31c59f8c02", "code": "CU99AH", "id": 55014, "logo": null, "date": "2024-09-14T08:00:00-04:00", "start": "08:00", "duration": "09:00", "room": "Atrium - Check in", "slug": "bsidesatl-2024-55014-attendee-check-in", "url": "https://pretalx.com/bsidesatl-2024/talk/CU99AH/", "title": "Attendee check-in", "subtitle": "", "track": null, "type": "Full-day Village", "language": "en", "abstract": "Attendee check-in and registration", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/CU99AH/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/CU99AH/", "attachments": []}], "Room 300": [{"guid": "af7f4c5b-4be2-5f8e-aa6b-c271aca39cc2", "code": "8NHVPS", "id": 54873, "logo": null, "date": "2024-09-14T09:30:00-04:00", "start": "09:30", "duration": "00:20", "room": "Room 300", "slug": "bsidesatl-2024-54873-hunter-method-fusing-cyberpsychology-and-real-life-cybercrime-stories-to-enhance-enterprise-awareness-training", "url": "https://pretalx.com/bsidesatl-2024/talk/8NHVPS/", "title": "Hunter Method: Fusing cyberpsychology and real life cybercrime stories to enhance enterprise awareness training", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "Learn how to revolutionize your cybersecurity awareness training with Allie Hunter\u2019s groundbreaking \u201cHunter Method.\u201d Utilizing relatable stories, employees become captivated while internalizing crucial lessons needed to protect themselves, their families, the organization and its customers.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VEP7LD", "name": "Ben Halpert", "avatar": "https://pretalx.com/media/avatars/VEP7LD_83KBCZu.webp", "biography": "By day, he is a Fractional CISO and Cybersecurity Advisor for multiple companies building, running, and optimizing cybersecurity programs. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.", "public_name": "Ben Halpert", "guid": "faaa0f45-3813-5d38-bd81-51ab8fdbd976", "url": "https://pretalx.com/bsidesatl-2024/speaker/VEP7LD/"}, {"code": "N7LRXU", "name": "Allie Hunter", "avatar": "https://pretalx.com/media/avatars/N7LRXU_0gYq4PT.webp", "biography": "Allie Hunter is a Cybersecurity Awareness Manager and Advisory Board Member with experience in promoting cybersecurity best practices and awareness. She is dedicated to ensuring organizations understand and implement effective cybersecurity measures. Allie also volunteers as a Marketing Manager/Moderator for Fireside Chat with IT/Cyber Leaders and contributes to quality assurance initiatives with Women in Technology (WIT). Her diverse educational background includes degrees and certificates in Marketing Management, Fine Arts, and Psychology, along with IT and Cybersecurity from Kennesaw State University, College of Coastal Georgia and Emory University.", "public_name": "Allie Hunter", "guid": "b9ef71ef-377a-5ac1-bc92-95cc86b07338", "url": "https://pretalx.com/bsidesatl-2024/speaker/N7LRXU/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/8NHVPS/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/8NHVPS/", "attachments": []}, {"guid": "252eb88e-f46a-5b28-a50b-32db7104e01c", "code": "BMJEXA", "id": 54580, "logo": null, "date": "2024-09-14T10:00:00-04:00", "start": "10:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2024-54580-how-not-to-have-a-bad-time-with-risky-data", "url": "https://pretalx.com/bsidesatl-2024/talk/BMJEXA/", "title": "How Not to Have a Bad Time with Risky Data", "subtitle": "", "track": "Trust", "type": "50 minute talk", "language": "en", "abstract": "Students, security researchers, journalists, and many other professionals have to interact with Internet sourced data, weird or sketchy websites, and sometimes even known malicious code to learn, conduct investigations, inform the public, and defend everyone. In this talk we will outline some of the concerns (risks) and potential bad outcomes in these activities before offering practical guidance on how to minimize those risks. Our emphasis is on attitudes, foreknowledge, and safer practices, but we may recommend some public tools and capabilities to illustrate points. Background: 10 year infosec career, malware analyst, security instructor, avid reader", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "NTAWHZ", "name": "Ben S. Knowles", "avatar": "https://pretalx.com/media/avatars/NTAWHZ_VkUPPR7.webp", "biography": "Ben S. Knowles @dfirnotes (they) is a cybersecurity leader and educator in the Atlanta, Georgia, USA area. Ben presents at local groups and conferences on analysis, forensics, and security education, led Community classes on defense, response, and analysis with the SANS Institute, and has bugs and patches in a few public tools. Currently they are a cybersecurity architect at a large corporation.", "public_name": "Ben S. Knowles", "guid": "76b37d40-8e73-5f41-98fd-b89ff8bead31", "url": "https://pretalx.com/bsidesatl-2024/speaker/NTAWHZ/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/BMJEXA/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/BMJEXA/", "attachments": []}, {"guid": "a4c23d85-9c9e-55de-947a-6e4c1c566ded", "code": "VDKEFF", "id": 54969, "logo": null, "date": "2024-09-14T11:00:00-04:00", "start": "11:00", "duration": "00:20", "room": "Room 300", "slug": "bsidesatl-2024-54969-ludus-cris-speed-how-to-set-up-a-vulnerable-lab-in-less-than-20-min", "url": "https://pretalx.com/bsidesatl-2024/talk/VDKEFF/", "title": "Ludus-cris Speed (How to set up a vulnerable lab in less than 20 min)", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "Ludus is an open-source project that helps automate the deployment of labs. This presentation will walk you through how to install Ludus and set up your first lab using Ludus, all in less than 20 minutes.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "DYMC3U", "name": "Steven Peterson", "avatar": "https://pretalx.com/media/avatars/DYMC3U_rKkGCcM.webp", "biography": "Steven is a seasoned veteran of the network security space with over 18 years of experience in both offensive and defensive roles. Steven is the Founder and Chief Hacking Officer of White Box Security. With a degree in Information Security and Assurance from Kennesaw State University and numerous well recognized industry certifications, Steven is well-equipped to lead teams in assessing risk and testing defenses.", "public_name": "Steven Peterson", "guid": "9b4c955b-afa0-5df9-bd3a-1b4a8373cccb", "url": "https://pretalx.com/bsidesatl-2024/speaker/DYMC3U/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/VDKEFF/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/VDKEFF/", "attachments": []}, {"guid": "1d743b8a-21fc-539a-a1b9-46923bef97bb", "code": "HJMYYN", "id": 54961, "logo": null, "date": "2024-09-14T11:30:00-04:00", "start": "11:30", "duration": "00:20", "room": "Room 300", "slug": "bsidesatl-2024-54961-can-you-trust-your-edr-vendor-threat-modeling-privileged-agents-in-the-enterprise", "url": "https://pretalx.com/bsidesatl-2024/talk/HJMYYN/", "title": "Can you trust your EDR vendor? Threat modeling privileged agents in the enterprise", "subtitle": "", "track": "Trust", "type": "20 minute talk", "language": "en", "abstract": "Trust in our security vendors is fundamental for every security organization in the world. We trust them to provide material value to our programs, to develop new features to address emerging security challenges, and to not cause fleet-wide BSOD outages on Fridays. After a cybersecurity company\u2019s recent global outage, EDR customers understand (now more than ever) the necessity of building operational resilience into their deployments. In this talk, we will discuss the base architecture of EDR agents and how this inherently-privileged sensor presents unique risks to customers. We will dive deep into the principles of operational resilience, weighing security risk against operational risk, and provide guidance on customer-driven controls that tangibly reduce operational risk of privileged agents. We describe the shared-responsibility between an EDR vendor and its customers through a threat model of an agent\u2019s deployment at a company. Rebuilding trust requires transparency from technology and leadership, and operational resilience requires we don\u2019t trust the agent to fail gracefully!", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "LGLBZY", "name": "Gabe Bello", "avatar": "https://pretalx.com/media/avatars/LGLBZY_Amtv6Lm.webp", "biography": "Gabe is a senior security engineer with experience in endpoint security, SaaS security, DLP, and threat detection. He focuses on enterprise threats to high-tech businesses, building scalable engineering solutions to materially reduce risk for organizations. He also volunteers time with Columbus State University and with extracurricular organizations in the community towards Cybersecurity students looking to enter the field.\r\n\r\nGabe holds a B.S. in Computer Science from Columbus State University and a M.S. in Cybersecurity from NYU.", "public_name": "Gabe Bello", "guid": "6489d753-e016-5ff9-ba1b-d6c1162413c3", "url": "https://pretalx.com/bsidesatl-2024/speaker/LGLBZY/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/HJMYYN/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/HJMYYN/", "attachments": []}, {"guid": "54c7acca-f17f-5660-9370-4be22c74a81e", "code": "3WYCZB", "id": 54921, "logo": null, "date": "2024-09-14T13:00:00-04:00", "start": "13:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2024-54921-hacking-the-human-zero-trust-breaches", "url": "https://pretalx.com/bsidesatl-2024/talk/3WYCZB/", "title": "Hacking the Human: Zero Trust & Breaches", "subtitle": "", "track": "Trust", "type": "50 minute talk", "language": "en", "abstract": "Ever wonder what it's like to outsmart the smartest? Join me, as we dive deep into the art of \"Hacking the Human: Zero Trust & Breaches.\" We\u2019ll explore the vulnerabilities that hackers love to exploit\u2014human trust. Social engineering isn't just a buzzword; it's the most effective tool in a hacker's arsenal, and I'll show you exactly how it's done.\r\n\r\nIn this session, we'll break down real-world examples of how I and others have bypassed some of the most secure systems by targeting the weakest link: people. I\u2019ll also share how zero trust can be a game-changer in securing organizations, ensuring that no one\u2014even the most trusted employees\u2014gets a free pass.\r\n\r\nThis isn't your typical cybersecurity talk. Expect stories, live demonstrations, and a no-nonsense approach to understanding and defending against the threats lurking in organizations. If you think your firewall is enough, think again. Let\u2019s dig into the human factor and turn the weakest link into the strongest defense.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "ZJRQHX", "name": "Keelan Knox", "avatar": "https://pretalx.com/media/avatars/ZJRQHX_76DWaYp.webp", "biography": "Knox serves as Security Engagement Manager for Alias Cybersecurity. Quickly moving through the ranks after joining Alias in 2022. He brings cybersecurity, business development, and project management expertise to each engagement. He also has experience in SOC management services, network penetration testing, and risk compliance. Knox conducts IT auditing, incident response, security assessments & awareness training, and performs social engineering for Alias as well. After being promoted from Security Engineer to Security Engagement Manager, Knox manages a team of security engineers & analysts while also overseeing both engineering and SOC projects.", "public_name": "Keelan Knox", "guid": "ddcf4baf-d416-59dc-b65b-c29049c46cd9", "url": "https://pretalx.com/bsidesatl-2024/speaker/ZJRQHX/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/3WYCZB/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/3WYCZB/", "attachments": []}, {"guid": "81f277e2-52a4-5e2d-af89-4ebd06326b47", "code": "GDXAE3", "id": 54767, "logo": null, "date": "2024-09-14T15:00:00-04:00", "start": "15:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2024-54767-solving-dumb-hacker-problems-with-nix", "url": "https://pretalx.com/bsidesatl-2024/talk/GDXAE3/", "title": "Solving Dumb Hacker Problems with Nix", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Between Python version mismatches, virtual environments, and containers, getting even popular software to work on every operating system and setup is more cumbersome than it should be. Hackers should be fighting vulnerabilities, not their own tooling.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "HJRXPQ", "name": "Ryan Basden", "avatar": "https://pretalx.com/media/avatars/HJRXPQ_6jgGhrJ.webp", "biography": "I am a penetration tester and red teamer with eight years of information security and threat emulation experience. I specialize in simulating realistic attacks against complex environments. Ultimately, I am a hacker who cares about the way humans use technology, and even more about how it affects us.", "public_name": "Ryan Basden", "guid": "72702771-d4d1-591f-9963-cfaf1db75279", "url": "https://pretalx.com/bsidesatl-2024/speaker/HJRXPQ/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/GDXAE3/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/GDXAE3/", "attachments": []}, {"guid": "8dadb74b-7869-5b05-a35b-520c306b852b", "code": "RFEZSN", "id": 54729, "logo": "https://pretalx.com/media/bsidesatl-2024/submissions/RFEZSN/1000010907_1sBextU.png", "date": "2024-09-14T16:00:00-04:00", "start": "16:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2024-54729-breaking-into-your-cybersecurity-career-by-blackhack-society", "url": "https://pretalx.com/bsidesatl-2024/talk/RFEZSN/", "title": "Breaking Into Your Cybersecurity Career, by BlackHack Society!", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "This lecture will provide aspiring cybersecurity professionals with practical guidance on entering the field.\r\nHe'll cover:\r\n\r\n- Essential skills and knowledge areas\r\n- Educational pathways and certifications\r\n- Building hands-on experience\r\n- Networking and job search strategies\r\n- Common entry-level roles and career trajectories\r\n\r\nWhether you're a student, career changer, or IT professional looking to specialize, this session will not only equip you with actionable steps to launch your cybersecurity career, but also inform you of market trend data, entertain you with relatable anecdotal stories, and inspire you to pursue a career within the Cybsecurity Industry.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "QWAMEZ", "name": "Aaron Butler", "avatar": "https://pretalx.com/media/avatars/QWAMEZ_1xAXeIh.webp", "biography": "Aaron Butler, before anything else, is but a simple black guy with a laptop. As Founder of the BlackHack Society, Home for Ethical Hackers, he has been in the hacker world for 20 years and has a background in Network Engineering, Linux, Incident Response, GRC, and Product IOT Security. When he's not hacking the planet and convincing people that there's a (non-existent) pool on the roof they should -totally- check out, he's out traveling looking for his next great experience, looking to try new foods, or attending conferences, festivals, and events.", "public_name": "Aaron Butler", "guid": "0e961d2d-4aa6-5628-a613-558addb4836a", "url": "https://pretalx.com/bsidesatl-2024/speaker/QWAMEZ/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/RFEZSN/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/RFEZSN/", "attachments": []}], "Room 400": [{"guid": "05cdda32-5530-546f-b78e-cd9001fcffc0", "code": "RKA78H", "id": 55016, "logo": null, "date": "2024-09-14T08:45:00-04:00", "start": "08:45", "duration": "00:15", "room": "Room 400", "slug": "bsidesatl-2024-55016-organizers-welcome-remarks", "url": "https://pretalx.com/bsidesatl-2024/talk/RKA78H/", "title": "Organizers welcome remarks", "subtitle": "", "track": null, "type": "Organizers remarks", "language": "en", "abstract": "Organizers welcome remarks", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "7CYWHU", "name": "Yvette Johnson", "avatar": null, "biography": null, "public_name": "Yvette Johnson", "guid": "629d0fad-7ce9-5f72-9387-01fcee05e47a", "url": "https://pretalx.com/bsidesatl-2024/speaker/7CYWHU/"}, {"code": "NCRDAA", "name": "Dr. Andy Green", "avatar": "https://pretalx.com/media/avatars/NCRDAA_cYJvGYM.webp", "biography": "test", "public_name": "Dr. Andy Green", "guid": "3928b93d-394b-54f3-96eb-31daa4c6806a", "url": "https://pretalx.com/bsidesatl-2024/speaker/NCRDAA/"}, {"code": "FYQ7V7", "name": "JoEtta LeSueur", "avatar": null, "biography": null, "public_name": "JoEtta LeSueur", "guid": "ba69a066-56a6-54c0-afce-f2943298a45b", "url": "https://pretalx.com/bsidesatl-2024/speaker/FYQ7V7/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/RKA78H/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/RKA78H/", "attachments": []}, {"guid": "ade5fa15-be4f-5880-a080-40b67a898685", "code": "DZ3EXQ", "id": 55017, "logo": null, "date": "2024-09-14T09:00:00-04:00", "start": "09:00", "duration": "00:25", "room": "Room 400", "slug": "bsidesatl-2024-55017-keynote-address-with-a-little-help-from-my-friends-how-i-joined-a-community-of-awesomeness-and-you-can-too", "url": "https://pretalx.com/bsidesatl-2024/talk/DZ3EXQ/", "title": "Keynote address - \"With a Little Help From My Friends: How I Joined a Community of Awesomeness (AND YOU CAN TOO)\"", "subtitle": "", "track": null, "type": "Keynote", "language": "en", "abstract": "Keynote address", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "EX8NNC", "name": "Catherine Ullman", "avatar": "https://pretalx.com/media/avatars/EX8NNC_ngdnDa5.webp", "biography": "Dr. Catherine J. Ullman is a security researcher, speaker, author, and Principal Technology Architect, Security, at the University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a digital forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness among faculty and staff which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at numerous information security conferences including DEF CON and Blue Team Con. Cathy is a contributor to the O\u2019Reilly title 97 Things Every Information Professional Should Know and the author of the Wiley title The Active Defender. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo Zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.", "public_name": "Catherine Ullman", "guid": "f194b162-fcbc-51d3-b0c7-cc3a387eb7a3", "url": "https://pretalx.com/bsidesatl-2024/speaker/EX8NNC/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/DZ3EXQ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/DZ3EXQ/", "attachments": []}, {"guid": "1b6ef8f3-1d67-5811-a82d-c889976c4586", "code": "3GVWQF", "id": 55018, "logo": null, "date": "2024-09-14T12:00:00-04:00", "start": "12:00", "duration": "00:55", "room": "Room 400", "slug": "bsidesatl-2024-55018-lunch", "url": "https://pretalx.com/bsidesatl-2024/talk/3GVWQF/", "title": "Lunch", "subtitle": "", "track": null, "type": "50 minute talk", "language": "en", "abstract": "Lunch time!", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/3GVWQF/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/3GVWQF/", "attachments": []}, {"guid": "e89a0e10-ba97-5eac-9297-ff294d089c7b", "code": "BUSVBD", "id": 55896, "logo": null, "date": "2024-09-14T16:00:00-04:00", "start": "16:00", "duration": "00:50", "room": "Room 400", "slug": "bsidesatl-2024-55896-osint-ctf-winner-s-panel", "url": "https://pretalx.com/bsidesatl-2024/talk/BUSVBD/", "title": "OSINT CTF Winner's Panel", "subtitle": "", "track": null, "type": "50 minute talk", "language": "en", "abstract": "Throughout the day at BSides Atlanta, bright-eyed contestants will be vying for the crown in the OSINT CTF (Open Source Intelligence Capture the Flag). Only the most creative, persistent recon artists will collect enough flags to rise to the top of the leaderboard. You are invited to join a panel where the winners of the OSINT CTF will spill their secrets, letting you in on the action behind the scenes of the CTF. Plus, take advantage of the opportunity to ask a question in the live Q&A!", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/BUSVBD/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/BUSVBD/", "attachments": []}, {"guid": "1abf5fc0-4e20-5521-babf-20b317963d27", "code": "VQGUQG", "id": 55019, "logo": null, "date": "2024-09-14T17:00:00-04:00", "start": "17:00", "duration": "00:00", "room": "Room 400", "slug": "bsidesatl-2024-55019-organizers-closing-remarks-and-giveaways", "url": "https://pretalx.com/bsidesatl-2024/talk/VQGUQG/", "title": "Organizers closing remarks and giveaways", "subtitle": "", "track": null, "type": "Organizers remarks", "language": "en", "abstract": "Organizers closing remarks and giveaways", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GDRFQZ", "name": "Dr. Andy Green", "avatar": "https://pretalx.com/media/avatars/GDRFQZ_f9bm4fk.webp", "biography": "BSides Atlanta organizer\r\nChief Curmudgeon Officer", "public_name": "Dr. Andy Green", "guid": "2f898a4e-b310-5826-9707-ad136bdcf413", "url": "https://pretalx.com/bsidesatl-2024/speaker/GDRFQZ/"}, {"code": "7CYWHU", "name": "Yvette Johnson", "avatar": null, "biography": null, "public_name": "Yvette Johnson", "guid": "629d0fad-7ce9-5f72-9387-01fcee05e47a", "url": "https://pretalx.com/bsidesatl-2024/speaker/7CYWHU/"}, {"code": "FYQ7V7", "name": "JoEtta LeSueur", "avatar": null, "biography": null, "public_name": "JoEtta LeSueur", "guid": "ba69a066-56a6-54c0-afce-f2943298a45b", "url": "https://pretalx.com/bsidesatl-2024/speaker/FYQ7V7/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/VQGUQG/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/VQGUQG/", "attachments": []}], "Room 401": [{"guid": "07e4faf4-6348-5675-97b0-a83139109ed3", "code": "DAEAEH", "id": 54907, "logo": null, "date": "2024-09-14T09:30:00-04:00", "start": "09:30", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2024-54907-pentest-program-quality", "url": "https://pretalx.com/bsidesatl-2024/talk/DAEAEH/", "title": "Pentest Program Quality", "subtitle": "", "track": "Trends", "type": "50 minute talk", "language": "en", "abstract": "How can you get the best security testing? If you're regularly consuming security testing services from one or more vendors, there are many things you can do to make sure you are getting the best test results on an ongoing basis. Phil will go over quality management techniques gleaned from decades of working with the most mature pentesting programs in the world.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "9CYTPA", "name": "Phil Brass", "avatar": "https://pretalx.com/media/avatars/9CYTPA_vu1bC9s.webp", "biography": "Phil Brass moved to Atlanta in 1998 to work for Internet Security Systems, and has been a member of the security community ever since. He started doing network penetration testing and application security assessments in 2002, and has been in adversarial security consulting since then. He is currently Vice President of Professional Services at DirectDefense, where he oversees nearly 50 consultants doing appsec, netpen, PCI and OT/SCADA assessment work. In his spare time he likes to hike in the Cohutta wilderness, row on the Chattahoochee, play pickleball, and do CTFs with the DeepThonts CTF team.", "public_name": "Phil Brass", "guid": "fc5bc4fb-9119-59ac-a28c-a95c3d375ed4", "url": "https://pretalx.com/bsidesatl-2024/speaker/9CYTPA/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/DAEAEH/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/DAEAEH/", "attachments": []}, {"guid": "a4b3383b-55bb-5123-8d49-adb130fffce8", "code": "DMAVGA", "id": 54875, "logo": "https://pretalx.com/media/bsidesatl-2024/submissions/DMAVGA/SCK_logo_bH5g7wU.png", "date": "2024-09-14T10:30:00-04:00", "start": "10:30", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2024-54875-implementing-a-cybersecurity-focused-employee-community-volunteer-engagement-program", "url": "https://pretalx.com/bsidesatl-2024/talk/DMAVGA/", "title": "Implementing a cybersecurity focused employee community volunteer engagement program", "subtitle": "", "track": "Trends", "type": "20 minute talk", "language": "en", "abstract": "Did you know that the human brain is happiest when it gets to do something good for someone else? Are you part of a remote first company? A hybrid company? Or a global enterprise with multiple physical locations? We have an employee community volunteer engagement program focused on educating young children in areas where your coworkers live, anywhere in the world!\r\n\r\nJoin us to learn step-by-step how to get your coworkers out into their local elementary schools using the free volunteer materials from Savvy Cyber Kids.  Your coworkers will thank you!", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VEP7LD", "name": "Ben Halpert", "avatar": "https://pretalx.com/media/avatars/VEP7LD_83KBCZu.webp", "biography": "By day, he is a Fractional CISO and Cybersecurity Advisor for multiple companies building, running, and optimizing cybersecurity programs. By night, he champions cyber safety and ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded. Ben has presented at the World Economic Forum, NACD directorship training, RSA Conference, TEDxSaintThomas, TEDxKids@Vilnius, GISEC Global, InfoSec World, SecureWorld, IEEE, ACM, CSO50, CIO/CISO Summits, and many other events. In addition to his numerous publications, Ben has been featured in the New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, among others.", "public_name": "Ben Halpert", "guid": "faaa0f45-3813-5d38-bd81-51ab8fdbd976", "url": "https://pretalx.com/bsidesatl-2024/speaker/VEP7LD/"}, {"code": "N7LRXU", "name": "Allie Hunter", "avatar": "https://pretalx.com/media/avatars/N7LRXU_0gYq4PT.webp", "biography": "Allie Hunter is a Cybersecurity Awareness Manager and Advisory Board Member with experience in promoting cybersecurity best practices and awareness. She is dedicated to ensuring organizations understand and implement effective cybersecurity measures. Allie also volunteers as a Marketing Manager/Moderator for Fireside Chat with IT/Cyber Leaders and contributes to quality assurance initiatives with Women in Technology (WIT). Her diverse educational background includes degrees and certificates in Marketing Management, Fine Arts, and Psychology, along with IT and Cybersecurity from Kennesaw State University, College of Coastal Georgia and Emory University.", "public_name": "Allie Hunter", "guid": "b9ef71ef-377a-5ac1-bc92-95cc86b07338", "url": "https://pretalx.com/bsidesatl-2024/speaker/N7LRXU/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/DMAVGA/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/DMAVGA/", "attachments": []}, {"guid": "021269d3-293f-5845-b0f5-209f8e628b05", "code": "SVKXPX", "id": 54910, "logo": null, "date": "2024-09-14T11:00:00-04:00", "start": "11:00", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2024-54910-executing-your-unemployment-incident-response-plan", "url": "https://pretalx.com/bsidesatl-2024/talk/SVKXPX/", "title": "Executing Your Unemployment Incident Response Plan", "subtitle": "", "track": "Trends", "type": "50 minute talk", "language": "en", "abstract": "I got laid off a year ago and it went great! Losing a job can happen to anybody and can be very stressful; especially during waves of industry-wide layoffs when so many of our peers are competing for fewer and fewer job offers. This talk presents the steps one should take when faced with job loss in the context of the familiar NIST incident response framework. In this session, we'll discuss how to:\r\n- prepare for job loss\r\n- identify the signs of potential impending job loss\r\n- contain the negative impacts of it\r\n- eradicate job loss (by getting another job)\r\n- recover from your period of unemployment\r\n- learn lessons to be better prepared for job loss in the future", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "JAJUES", "name": "Mike Doyle", "avatar": null, "biography": null, "public_name": "Mike Doyle", "guid": "b537c0b0-abf4-5aca-b1a9-1d661c8b4de1", "url": "https://pretalx.com/bsidesatl-2024/speaker/JAJUES/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/SVKXPX/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/SVKXPX/", "attachments": []}, {"guid": "38272178-2021-5c4f-b01f-0cd4accc3d3d", "code": "73TEBS", "id": 54916, "logo": "https://pretalx.com/media/bsidesatl-2024/submissions/73TEBS/Firefly_artificial_intelligence_powered_security_opera_101YYUy.jpg", "date": "2024-09-14T13:00:00-04:00", "start": "13:00", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2024-54916-ai-in-security-what-you-should-be-asking-and-how-it-will-change-your-role", "url": "https://pretalx.com/bsidesatl-2024/talk/73TEBS/", "title": "AI in Security: What you should be asking and how it will change your role", "subtitle": "", "track": "Trends", "type": "20 minute talk", "language": "en", "abstract": "AI is affecting every career associated with data.  You need to be asking the right questions about AI in security solutions as a security operator, and security leaders should be asking what can it feasibly do to improve their security program.  Everyone in the security organization must ask how it's going to change their role and responsibilities as the business implements AI and how it will change the security program's mission.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "EUX9ZC", "name": "John Collins", "avatar": null, "biography": "Broadcaster of cyber security realism", "public_name": "John Collins", "guid": "4c6f925b-1d56-54b2-8cdb-28a332a2c3d8", "url": "https://pretalx.com/bsidesatl-2024/speaker/EUX9ZC/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/73TEBS/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/73TEBS/", "attachments": []}, {"guid": "f1fae6e6-c249-532b-9bf0-5278b03ae7e3", "code": "TRPCPM", "id": 54790, "logo": "https://pretalx.com/media/bsidesatl-2024/submissions/TRPCPM/AAAAA_zkPidkj.png", "date": "2024-09-14T13:30:00-04:00", "start": "13:30", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2024-54790-portable-soc-automating-integration-with-socfortress-copilot-wazuh-and-velociraptor", "url": "https://pretalx.com/bsidesatl-2024/talk/TRPCPM/", "title": "Portable SOC: : Automating Integration with SOCFortress CoPilot, Wazuh, and Velociraptor", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Discover the innovative approach to simplifying security operations with SOCFortress CoPilot, a platform designed to provide a unified view of your security landscape. This session will explore how CoPilot enhances the usability and accessibility of open-source security tools by integrating with key systems like Wazuh for endpoint and cloud workload protection, and Velociraptor for advanced forensic analysis. Learn how to automate and deploy these integrations seamlessly, optimizing your security operations for efficiency and effectiveness. Join us to see how you can fortify your security posture with this powerful trio.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "V7Q38C", "name": "Robert McCurdy", "avatar": "https://pretalx.com/media/avatars/V7Q38C_7GRJCc9.webp", "biography": "I am an experienced IT security professional with over 20 years of hands-on experience in networking and information security. I have a passion for growing local information security groups and talent by speaking at conferences, creating online videos/articles, and teaching Red/Blue Team at a local maker space. Sharing my knowledge and learning from others is something I truly enjoy.\r\n\r\nThroughout my career, I have worked with various platforms and networks in small to Fortune 500 companies. I can assist in identifying and collaborating to resolve both known and previously unknown issues.\r\n\r\nCyber Defense AI Developer\ud83e\udd16Senior Security Engineer/Analyst Lead \ud83d\udccaThreat Intelligence Developer\ud83e\udde0Lead Security Developer\ud83d\udda5\ufe0fPenetration Testing Lead\ud83d\udc68\u200d\ud83d\udcbb", "public_name": "Robert McCurdy", "guid": "ce57d203-78a3-535d-89db-6604e9e57222", "url": "https://pretalx.com/bsidesatl-2024/speaker/V7Q38C/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/TRPCPM/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/TRPCPM/", "attachments": []}, {"guid": "c1f533e9-4469-5155-ae8f-5e781869751c", "code": "L9ZB8D", "id": 54855, "logo": null, "date": "2024-09-14T14:30:00-04:00", "start": "14:30", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2024-54855-defending-beyond-defense", "url": "https://pretalx.com/bsidesatl-2024/talk/L9ZB8D/", "title": "Defending Beyond Defense", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Assumptions burn defenders every day. Perhaps the most pernicious one is that systems and their controls will always work as designed. Best practices in security may be good guidelines, but unfortunately also suffer from these same blind spots. For example, best practice recommends the use of LAPS for local administrator account passwords of domain-joined computers, yet misconfiguration of active directory can turn it from a protective control into a vulnerability. But what if there was a way to challenge these assumptions up front? The best way to dismantle these types of assumptions is to experience how deeply flawed they are. There is no better way to gain first hand experience into this perspective than immersion in the offensive security space. In this talk we'll explore how to immerse yourself in the offensive security world to obtain this knowledge without needing to change careers or obtain additional certifications. By being more informed about offensive security, defenders are better able to recognize relevant intel, understand existing threats, and more readily discover attacker behavior. Join me as I discuss how there's more to defending than just defense, and how you can find and engage with the amazing resources that are out there waiting to be explored.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "EX8NNC", "name": "Catherine Ullman", "avatar": "https://pretalx.com/media/avatars/EX8NNC_ngdnDa5.webp", "biography": "Dr. Catherine J. Ullman is a security researcher, speaker, author, and Principal Technology Architect, Security, at the University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a digital forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness among faculty and staff which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at numerous information security conferences including DEF CON and Blue Team Con. Cathy is a contributor to the O\u2019Reilly title 97 Things Every Information Professional Should Know and the author of the Wiley title The Active Defender. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo Zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.", "public_name": "Catherine Ullman", "guid": "f194b162-fcbc-51d3-b0c7-cc3a387eb7a3", "url": "https://pretalx.com/bsidesatl-2024/speaker/EX8NNC/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/L9ZB8D/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/L9ZB8D/", "attachments": []}, {"guid": "cc530b84-84ed-57aa-afcf-e259c945f8b0", "code": "P3Y8DB", "id": 54922, "logo": null, "date": "2024-09-14T15:30:00-04:00", "start": "15:30", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2024-54922-using-attack-path-mapping-to-develop-your-security-roadmap", "url": "https://pretalx.com/bsidesatl-2024/talk/P3Y8DB/", "title": "Using Attack Path Mapping to Develop your Security Roadmap", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "With numerous threats and vulnerabilities emerging constantly, prioritizing security efforts can be overwhelming. This presentation introduces a practical method for leveraging MITRE ATT&CK and MITRE D3FEND to enhance threat modeling and refine your security roadmap. Attendees will gain insights into how these frameworks can help identify and prioritize the most impactful threats, leading to more effective and strategic security measures. This approach ensures that resources are allocated efficiently, and defenses are focused where they will make the greatest difference, moving beyond reactive responses to a more data-driven and strategic security posture.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "7A8P78", "name": "Hudson Bush", "avatar": "https://pretalx.com/media/avatars/7A8P78_IGOVE5e.webp", "biography": "Hudson Bush is a Security Architect who has been immersed in hacking and infosec since his teenage years. His experience ranges from consulting for some of the world\u2019s largest companies, managing security for major enterprise mergers and acquisitions, and building a security program from the ground up at a security startup. With this broad expertise and passion for the field, Hudson\u2019s mission is to share his lessons so others can learn from his mistakes.", "public_name": "Hudson Bush", "guid": "dafa2df5-1eba-5d97-bf5b-4f9485a275dc", "url": "https://pretalx.com/bsidesatl-2024/speaker/7A8P78/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/P3Y8DB/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/P3Y8DB/", "attachments": []}, {"guid": "a6b6ba02-29c7-53f4-bda7-8ba52f6ab9b6", "code": "N7TUMS", "id": 54919, "logo": "https://pretalx.com/media/bsidesatl-2024/submissions/N7TUMS/Aishwarya_Desai_Headshot_M5SWNwf.jpg", "date": "2024-09-14T16:00:00-04:00", "start": "16:00", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2024-54919-anatomy-of-a-ransomware-attack-from-patient-zero-to-lessons-learned", "url": "https://pretalx.com/bsidesatl-2024/talk/N7TUMS/", "title": "Anatomy of a Ransomware Attack - From Patient Zero to Lessons Learned", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Are you prepared to respond to a ransomware attack? Ransomware has emerged as one of the most pressing cybersecurity threats, affecting businesses and organizations worldwide. The consequences can be devastating, crippled operations, financial losses, reputational damage, and even potential legal repercussions. Security teams may lack firsthand experience in handling these incidents. This talk will provide a comprehensive look at how ransomware attacks unfold, what to expect during an incident, and how to effectively prepare, investigate, and respond. We'll explore a real-life case study to make these insights relevant. By the end of this deep dive, the audience will not only understand how a ransomware attack works but will also be equipped with the knowledge needed to prepare for, respond to, and mitigate its impact on their organization.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "TGH3GS", "name": "Aishwarya Desai", "avatar": "https://pretalx.com/media/avatars/TGH3GS_VCuAMsu.webp", "biography": "Aishwarya Desai is a Senior Digital Forensics and Incident Response (DFIR) Consultant at Aon, with 5 years of experience in the field. He has led numerous engagements, including ransomware attacks, unauthorized access incidents, and business email compromise cases.", "public_name": "Aishwarya Desai", "guid": "3ec63b34-2000-536c-89ba-5c81882fdbf9", "url": "https://pretalx.com/bsidesatl-2024/speaker/TGH3GS/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/N7TUMS/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/N7TUMS/", "attachments": []}], "Room 402": [{"guid": "55b2b6a9-fdf6-5d78-9c63-e858488bb8e7", "code": "DTFZVN", "id": 54573, "logo": null, "date": "2024-09-14T09:30:00-04:00", "start": "09:30", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2024-54573-your-hacking-os-sucks-the-real-best-option", "url": "https://pretalx.com/bsidesatl-2024/talk/DTFZVN/", "title": "Your Hacking OS Sucks: The Real \"Best\" Option", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Let's face it, most of us are too reliant on a specific OS for hacking. This is a far too common pitfall that new and seasoned security professionals find themselves in. The beginning of their learning process hinges on having a \"hacking OS\" installed, rather than learning a tool at a time. This can lead to a multitude of problems. In this talk, we will review when the use of a \"Hacking OS\" is appropriate, why our choice could hinder the learning and execution processes, how to easily choose an alternative best to your favorite, and how to make our alternative choice more convenient down the line.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "7WZQSJ", "name": "Brett Jenson", "avatar": "https://pretalx.com/media/avatars/7WZQSJ_wsJFYhO.webp", "biography": null, "public_name": "Brett Jenson", "guid": "06b3194f-5fd4-5804-b8f3-8fb306d84fdc", "url": "https://pretalx.com/bsidesatl-2024/speaker/7WZQSJ/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/DTFZVN/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/DTFZVN/", "attachments": []}, {"guid": "474fce31-afa2-53fb-b87d-f355f58a8408", "code": "SYN389", "id": 54918, "logo": null, "date": "2024-09-14T10:30:00-04:00", "start": "10:30", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2024-54918-this-is-a-gated-community-please-get-off-the-property", "url": "https://pretalx.com/bsidesatl-2024/talk/SYN389/", "title": "This is a gated community please get off the property", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "If you\u2019ve ever hosted a party or any other type of social event, you\u2019re probably familiar with the concept of the guest who wouldn\u2019t leave/begins to overstay their welcome and becomes a great source of annoyance for the host.\r\nNow picture what it would be like to have someone come onto your property uninvited, and then decide to live there indefinitely. The unfortunate truth is\u2026this is something that happens everyday. It\u2019s called \u201csquatting.\u201d", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "LYQW9J", "name": "Simon Abisoye", "avatar": "https://pretalx.com/media/avatars/LYQW9J_0ZrVDQG.webp", "biography": "Born in Lewisham, London, England Simon Abisoye is a graduate of Georgia State University. He works as a Staff Security Consultant for HanaByte.", "public_name": "Simon Abisoye", "guid": "1e53bdd2-0bfd-5284-8c40-d071bb52a7bd", "url": "https://pretalx.com/bsidesatl-2024/speaker/LYQW9J/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/SYN389/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/SYN389/", "attachments": []}, {"guid": "04c5054e-5bdd-566f-ab3d-bb2d8d1ef734", "code": "SD9MBQ", "id": 54579, "logo": null, "date": "2024-09-14T11:00:00-04:00", "start": "11:00", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2024-54579-redneck-reverse-engineering-faux-and-folly", "url": "https://pretalx.com/bsidesatl-2024/talk/SD9MBQ/", "title": "Redneck Reverse Engineering: Faux and Folly", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "A talk about the adventures of reverse engineering in the past year, as most talks focus on successes this one focuses on my failures and creates discussion on tactics of reverse engineering and encouraging collaboration in that where one person fails another may succeed but only on the shoulders of those who came before", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "3MT7QC", "name": "Carson Reynolds", "avatar": null, "biography": "Blub", "public_name": "Carson Reynolds", "guid": "f7e1c170-801b-55a0-919a-5b6f1cb0239d", "url": "https://pretalx.com/bsidesatl-2024/speaker/3MT7QC/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/SD9MBQ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/SD9MBQ/", "attachments": []}, {"guid": "4ef5d6b0-12bd-5e41-b21a-441a9a1cb014", "code": "UWWSZC", "id": 54854, "logo": null, "date": "2024-09-14T13:00:00-04:00", "start": "13:00", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2024-54854-cyber-insurance-considerations-for-security-practitioners", "url": "https://pretalx.com/bsidesatl-2024/talk/UWWSZC/", "title": "Cyber Insurance Considerations For Security Practitioners", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "Cyber practitioners will gain insight into cyber insurance preparedness and basics when it comes to coverage and claims, as well as some perks that may come along with their policies that aren't always utilized.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GJGA9X", "name": "Brandy Vargas", "avatar": "https://pretalx.com/media/avatars/GJGA9X_cFKqRJm.webp", "biography": "Brandy Vargas is the Sr. Manager of Incident Response on the eRisk team for Crum and Forster. In this role she provides cybersecurity consulting services to internal and external stakeholders during the underwriting and claims process, and serves as a resource to C&F\u2019s insured throughout their\u00a0cyber insurance policy. Brandy previously worked at Avalon Cyber, a MSSP, where she was the director of cybersecurity operations overseeing incident response, penetration testing, vulnerability assessments, and managed detection and response. Prior to Avalon she worked for Flowers Foods as a litigation support specialist championing the company\u2019s legal initiatives as it related to class-action litigation, eDiscovery, digital forensics, cybersecurity, internal investigations, and corporate compliance. Brandy has a masters in the study of law degree with a focus in business law and corporate compliance from Wake Forest Law. She also holds various cyber certs, including the CISM, CCSK, Security+, ECIH, and some Microsoft cloud certs.", "public_name": "Brandy Vargas", "guid": "90cb624c-01cf-50b6-8a06-8a7f3bb30034", "url": "https://pretalx.com/bsidesatl-2024/speaker/GJGA9X/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/UWWSZC/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/UWWSZC/", "attachments": []}, {"guid": "89e3df0f-89cc-599c-a3c8-3da0c0ef6b82", "code": "SKKNZL", "id": 54962, "logo": null, "date": "2024-09-14T13:30:00-04:00", "start": "13:30", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2024-54962-snowflake-and-okta-and-breaches-oh-my-scalably-securing-your-saas-apps-with-sspm", "url": "https://pretalx.com/bsidesatl-2024/talk/SKKNZL/", "title": "Snowflake and Okta and Breaches, Oh My! Scalably securing your SaaS apps with SSPM", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Whether it\u2019s proof of concept attacks, dev-environment data exposure, or full-blown leaked customer credentials, one thing is clear \u2013 SaaS applications continue to be a growing threat vector for vendors and customers alike. SaaS customers are often playing catch up to the latest attacks for a given application, chasing down ghost tenants and struggling to maintain security best practices across the enterprise. In this talk, we discuss our successes and failures implementing an enterprise-scale SaaS configuration management program. We cover topics such as overcoming technical limitations of vendor APIs, educating app owners to be security champions of their tools, building a robust monitoring platform to identify posture drift for our apps, stack ranking your crown jewel apps to prioritize work, identifying key metrics that security leadership cares about, as well as the woes of non-burdensome ticketing for app owners to manage their security risk alongside their other expected job functions. We share a multi-year roadmap that takes us from near-zero protection or visibility to operationalized KTLO with quantitative value at each step. Securing SaaS apps from risky configurations such as ghost admins, SSO-bypass and weak MFA is a mountainous task when you may have anywhere from dozens to thousands of apps across your company. It takes a village!", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "LGLBZY", "name": "Gabe Bello", "avatar": "https://pretalx.com/media/avatars/LGLBZY_Amtv6Lm.webp", "biography": "Gabe is a senior security engineer with experience in endpoint security, SaaS security, DLP, and threat detection. He focuses on enterprise threats to high-tech businesses, building scalable engineering solutions to materially reduce risk for organizations. He also volunteers time with Columbus State University and with extracurricular organizations in the community towards Cybersecurity students looking to enter the field.\r\n\r\nGabe holds a B.S. in Computer Science from Columbus State University and a M.S. in Cybersecurity from NYU.", "public_name": "Gabe Bello", "guid": "6489d753-e016-5ff9-ba1b-d6c1162413c3", "url": "https://pretalx.com/bsidesatl-2024/speaker/LGLBZY/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/SKKNZL/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/SKKNZL/", "attachments": []}, {"guid": "6b92a0dc-5a0d-5f11-a2b7-19a725fcf11c", "code": "ASGK39", "id": 54731, "logo": null, "date": "2024-09-14T14:30:00-04:00", "start": "14:30", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2024-54731-unlocking-hidden-superpowers-neurodiversity-in-information-security", "url": "https://pretalx.com/bsidesatl-2024/talk/ASGK39/", "title": "Unlocking Hidden Superpowers - Neurodiversity in Information Security", "subtitle": "", "track": "Tactics", "type": "50 minute talk", "language": "en", "abstract": "Dive into a transformative journey celebrating the unique strengths and untapped potential of neurodivergent individuals in the realm of information security. Explore the concept of neurodiversity as a catalyst for innovation, redefining differences in brain function as valuable assets. Delve into the world of ADHD, autism, and other neurodivergent conditions, unveiling the extraordinary superpowers they bring to the table.\r\n\r\nThis presentation provides more than just information; it is a call to action. It aims to empower neurodivergent individuals to confidently pursue careers in information security and equip leaders with the tools to foster a thriving, inclusive workforce. Let\u2019s bridge the gap, embrace the full spectrum of minds, and secure our future one innovative solution at a time.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VSLX9U", "name": "Xavier Ashe", "avatar": "https://pretalx.com/media/avatars/VSLX9U_Qp4iDtf.webp", "biography": "Xavier Ashe is currently a Senior Vice President in Truist\u2019s Cyber Operations and Technology division where he was awarded the Truist Performance Award.  He is Chairman of the Board for the Technology Association of Georgia (TAG) Information Security Society.  Xavier is a Georgia Institute of Technology alumnus and has over 30 years of leadership experience in information security, working for various firms including IBM, Gartner, and Carbon Black.  Xavier was the first hire at the startup, Drawbridge Networks, where he was instrumental in bringing the first microsegmentation solution for servers and workstations to market.  Mr. Ashe has plenty of war stories, including the first DDOS attack ever, Target, Sony, Aramco, [REDACTED], and others.  Xavier is an accomplished speaker and has presented at many security conferences including DefCon, BlackHat, RSA, BSides, Splunk .conf, SANS, and others.", "public_name": "Xavier Ashe", "guid": "e6456c5e-156f-5bc9-8f3e-1a2ee8e12da2", "url": "https://pretalx.com/bsidesatl-2024/speaker/VSLX9U/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/ASGK39/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/ASGK39/", "attachments": []}, {"guid": "faf483f1-9b2d-5255-a891-13a30536bbf5", "code": "ATTXF9", "id": 54685, "logo": null, "date": "2024-09-14T15:30:00-04:00", "start": "15:30", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2024-54685-what-the-three-amigos-taught-me-about-crisis-communications-when-responding-to-a-cyber-incident-the-good-the-bad-and-the-ugly", "url": "https://pretalx.com/bsidesatl-2024/talk/ATTXF9/", "title": "What \u2018The Three Amigos\u2019 taught me about crisis communications when responding to a cyber incident: the Good, the Bad, and the Ugly.", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "Effective communication is vital in managing cyber incidents to ensure timely and appropriate responses. Taking insights from the misinterpreted telegram in the film \u201cThe Three Amigos,\u201d this presentation explores the negative impacts of miscommunication during cyber crises. The film provides a unique framework to illustrate how misunderstandings can lead to confusion, ineffective responses, resource misallocation, increased risk, loss of credibility, and financial and emotional costs in the context of incident response.\r\n \r\nThis presentation will:\r\n Analyze the misinterpreted telegram scenario in \u201cThe Three Amigos\u201d and its parallels to real-life cyber incident communication failures.\r\nDiscuss the key elements of effective cyber incident communication, including clarity, timeliness, audience awareness, simplicity, consistency, and common language.\r\nHighlight the critical need for precise and clear communication to avoid the pitfalls demonstrated in the film.\r\nIntroduce practical strategies for ensuring effective communication during cyber incidents, with a focus on preparation, training, and continuous improvement.\r\n \r\nAttendees will gain a deeper understanding of the importance of accurate communication in cyber incident response and learn actionable steps to improve their organization\u2019s readiness and response capabilities. This engaging and informative session is ideal for executives, communication professionals, and incident response teams seeking to enhance their communication strategies during cyber crises.\r\nBy using the entertaining, yet instructive, example of \u201cThe Three Amigos,\u201d this presentation offers a memorable and impactful way to emphasize the necessity of clear and effective communication in cyber incident response.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "ETCCPN", "name": "Matthew Dobbs", "avatar": "https://pretalx.com/media/avatars/ETCCPN_yR9KOb4.webp", "biography": "Matthew Dobbs is a seasoned cyber security professional and industry leader delivering cyber range programs. Matthew has played pivotal roles in leading various cybersecurity initiatives, including the delivery of physical cyber ranges, development security best practices for 5G use in manufacturing, and testing of autonomous systems. Matthew's expertise includes enterprise security architecture, automated testing systems, integrating security portfolios, and incident response optimization.  He has incorporated this experience into designing and implementing high impact cyber range and training solutions for enterprises, major financial institutions, universities, and critical infrastructure organizations worldwide. His contributions have earned him various recognitions, including the 2019 Edison Award and the 2019 InAVation Award for Control Room of the Year. Matthew is also an active speaker and blogs on cybersecurity topics.", "public_name": "Matthew Dobbs", "guid": "8e255d64-3c62-5dd7-bdb4-104d167afbe9", "url": "https://pretalx.com/bsidesatl-2024/speaker/ETCCPN/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/ATTXF9/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/ATTXF9/", "attachments": []}, {"guid": "b8f539b4-fc7a-5c95-b7f6-cae4d4144267", "code": "ZUCG77", "id": 54943, "logo": null, "date": "2024-09-14T16:00:00-04:00", "start": "16:00", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2024-54943-i-know-what-you-did-in-my-cloud-secure-your-cloud-from-third-party-risks", "url": "https://pretalx.com/bsidesatl-2024/talk/ZUCG77/", "title": "I Know What You Did In My Cloud: Secure Your Cloud from Third-Party Risks", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "As organizations transition to public cloud environments, they increasingly rely on third-party security and monitoring vendors to ensure the protection of these environments. These vendors offer diverse solutions, including CSPM, CNAPP, observability tools, and services such as MSSP and MDR. Most of these services are delivered via Software as a Service (SaaS), necessitating continuous access to customers' cloud environments for effective oversight.\r\n\r\nWhile third-party risk assessments typically focus on the security of the vendors' systems, any breach within a vendor's cloud infrastructure can directly affect customer security. Since 98% of organizations have at least one third-party vendor that has experienced a data breach, there is a growing need for enhanced visibility into vendor activities inside customers\u2019 cloud infrastructure. This includes monitoring their actions, the resources they access, and whether they possess excessive privileges.\r\n\r\nIn this presentation, we will analyze how third-party vendors gain access to customer cloud environments, explore methods for developing an automated system to monitor their activities and discuss how to establish alerts for deviations from expected behavior. Additionally, we will examine strategies to ensure vendor permissions consistently align with their actual activities to minimize unnecessary access over time.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "PJTHJW", "name": "Abhinav Srivastava", "avatar": "https://pretalx.com/media/avatars/PJTHJW_8E2YvhY.webp", "biography": "Abhinav Srivastava is the founder and CEO of Breez Security, bringing over 20 years of experience in cybersecurity. He most recently served as Chief Information Security Officer and VP of Infrastructure at Frame.io, which was acquired by Adobe for billions of dollars. Prior to his role at Frame.io/Adobe, Abhinav dedicated six years at AT&T Shannon Labs, focusing on systems, cloud, IoT, analytics, data center technologies, and network security R&D. He has published over 40 research papers in peer-reviewed conferences and journals and holds multiple patents. Abhinav earned his Ph.D. in Computer Science from Georgia Tech.", "public_name": "Abhinav Srivastava", "guid": "0f3bb95e-839b-5b4d-9381-07bc73ce3653", "url": "https://pretalx.com/bsidesatl-2024/speaker/PJTHJW/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/ZUCG77/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/ZUCG77/", "attachments": []}, {"guid": "ac7ad04c-d370-596b-a1ca-f5efed1ed6b7", "code": "KCRBRF", "id": 54896, "logo": null, "date": "2024-09-14T16:30:00-04:00", "start": "16:30", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2024-54896-how-to-fail-at-cyber-threat-intelligence", "url": "https://pretalx.com/bsidesatl-2024/talk/KCRBRF/", "title": "How to Fail at Cyber Threat Intelligence", "subtitle": "", "track": "Tactics", "type": "20 minute talk", "language": "en", "abstract": "Everyone has a Cyber Threat Intelligence Program. Therefore we need to have a Cyber Threat Intelligence Program. The boss says \"Go build it\".So what do you do now? Based on a couple of decades of experience and observation of programs, I walk through what happens when you try to start a Cyber Threat Intelligence Program, how to do it wrong, and by contrast, how to do it right?", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "MSWZC9", "name": "Tony Drake", "avatar": null, "biography": "Tony Drake has over 25 years of experience in information security and systems administration. He has worked in roles ranging from systems design and administration to incident response, tactical intelligence, and managing pen tests. He has worked for the last 20 years in various roles in financial firms including brokerage, banking, exchange and payments in roles ranging from jack-of-all-trades \"security guy\" to tactical intelligence and malware analysis. He has worked in all aspects of Pen Testing from scoping, and planning to managing results, to incident response. In his current role he serves as lead security researcher for the Intercontinental Exchange, solving tactical security problems with creative solutions.\r\nHe holds a CISSP as well as SANS certifications in Incident Response, Web Application Pen Testing, Network Pen Testing and Threat Intelligence, and OSINT.", "public_name": "Tony Drake", "guid": "70f8d21b-a533-5827-bd7e-5d9546c2f52c", "url": "https://pretalx.com/bsidesatl-2024/speaker/MSWZC9/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/KCRBRF/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/KCRBRF/", "attachments": []}], "Room 460": [{"guid": "acc66868-324b-5152-b0a8-5bbc81179e01", "code": "LXJTD7", "id": 55421, "logo": null, "date": "2024-09-14T09:30:00-04:00", "start": "09:30", "duration": "06:30", "room": "Room 460", "slug": "bsidesatl-2024-55421-lockpick-village", "url": "https://pretalx.com/bsidesatl-2024/talk/LXJTD7/", "title": "Lockpick Village", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "Come pick locks with the good people at Atlanta Locksport", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/LXJTD7/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/LXJTD7/", "attachments": []}], "Room 462": [{"guid": "c41b9993-6093-51bc-a5ca-0133a1f9b5a8", "code": "GLW7DB", "id": 55013, "logo": null, "date": "2024-09-14T09:00:00-04:00", "start": "09:00", "duration": "09:00", "room": "Room 462", "slug": "bsidesatl-2024-55013-osint-ctf", "url": "https://pretalx.com/bsidesatl-2024/talk/GLW7DB/", "title": "OSINT CTF", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "The CTF anyone with an internet connection and a dream can play. Find real information on real targets, earn points, and see how your recon skills stack up.\r\n\r\nSchedule:\r\n-Signups: 9-12\r\n-Welcome Session^: 9:30-10\r\n-Practice Round: 12-1\r\n-Contest: 1-3\r\n-Winner's Panel^^ (in Room 400): 4-5\r\n\r\n^ The OSINT CTF team will explain the rules of the game, answer questions, and share tips from previous winners!\r\n^^ You are invited to join a panel where the winners of the OSINT CTF will spill their secrets, letting you in on the action behind the scenes of the CTF. Plus, take advantage of the opportunity to ask a question in the live Q&A!\r\n\r\nWant a leg up on the competition? Read our recap of a previous OSINT CTF at BSides Atlanta, including interviews with the top teams about their winning strategies: https://www.cgsilvers.com/post/2018/05/08/on-the-road-osint-ctf-at-bsidesatl", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "9UV9JF", "name": "Hannah Silvers", "avatar": "https://pretalx.com/media/avatars/9UV9JF_BfxDDys.webp", "biography": "Hannah is the Chief Strategy Officer with CG Silvers Consulting, a boutique cybersecurity consulting firm based in Atlanta, Georgia.", "public_name": "Hannah Silvers", "guid": "486c595f-105c-505b-86dd-ca04b473172a", "url": "https://pretalx.com/bsidesatl-2024/speaker/9UV9JF/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/GLW7DB/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/GLW7DB/", "attachments": []}], "Room 464": [{"guid": "06770383-4330-5643-ae1c-3d3f5249addb", "code": "JLXKTW", "id": 55009, "logo": null, "date": "2024-09-14T09:00:00-04:00", "start": "09:00", "duration": "09:00", "room": "Room 464", "slug": "bsidesatl-2024-55009-netkoth-ctf", "url": "https://pretalx.com/bsidesatl-2024/talk/JLXKTW/", "title": "NetKOTH CTF", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "We will run a NetKOTH CTF with multiple different machines at varying difficulties.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "PB8BZK", "name": "Nick Kammerdiener", "avatar": "https://pretalx.com/media/avatars/PB8BZK_G8mKvbo.webp", "biography": "DevSecOps Nerd", "public_name": "Nick Kammerdiener", "guid": "9a7645ce-2a47-5fd4-8b39-7002a7ddbfee", "url": "https://pretalx.com/bsidesatl-2024/speaker/PB8BZK/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2024/talk/JLXKTW/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2024/talk/JLXKTW/", "attachments": []}]}}]}}}