{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2026.1.0.dev0"}, "schedule": {"url": "https://pretalx.com/bsidesatl-2025/schedule/", "version": "11092025", "base_url": "https://pretalx.com", "conference": {"acronym": "bsidesatl-2025", "title": "BSides Atlanta 2025", "start": "2025-11-15", "end": "2025-11-15", "daysCount": 1, "timeslot_duration": "00:05", "time_zone_name": "America/New_York", "colors": {"primary": "#3aa57c"}, "rooms": [{"name": "Atrium - Sponsors", "slug": "4839-atrium-sponsors", "guid": "6738c9f4-6ea9-5e14-ab71-d37ac74467f5", "description": null, "capacity": null}, {"name": "Atrium - Check in", "slug": "4840-atrium-check-in", "guid": "dd9c6af4-f755-5c76-aec7-e57fddd3252e", "description": null, "capacity": null}, {"name": "Room 204", "slug": "5098-room-204", "guid": "893325a0-8715-5ec3-b900-bfb303440dff", "description": null, "capacity": null}, {"name": "Room 300", "slug": "4841-room-300", "guid": "a040350a-5fbb-5333-9b46-3b29309c875c", "description": null, "capacity": null}, {"name": "Room 400", "slug": "4842-room-400", "guid": "22031999-98af-52eb-8404-371046b23899", "description": null, "capacity": null}, {"name": "Room 401", "slug": "4843-room-401", "guid": "24b7ebf0-e75b-5d90-9049-342fc390a2a0", "description": null, "capacity": null}, {"name": "Room 402", "slug": "4844-room-402", "guid": "1c71db1e-aaf8-53a4-b6d0-972aa9284928", "description": null, "capacity": null}, {"name": "Room 441", "slug": "4845-room-441", "guid": "82f23e72-bbd8-5496-a20b-6d1fe9995c0d", "description": null, "capacity": null}, {"name": "Room 460", "slug": "4846-room-460", "guid": "727b2d2a-6fe5-541b-b911-a8857ba47edb", "description": null, "capacity": null}, {"name": "Room 461", "slug": "4847-room-461", "guid": "0bda6767-d735-524a-acb2-8eeee84edf1e", "description": null, "capacity": null}, {"name": "Room 462", "slug": "4848-room-462", "guid": "d9afa3a8-bc46-5aca-92b6-9ec83f7b9a05", "description": null, "capacity": null}, {"name": "Room 464", "slug": "4849-room-464", "guid": "4dedce0a-c881-5612-8828-0d46bc23ba19", "description": null, "capacity": null}, {"name": "Room 182", "slug": "5007-room-182", "guid": "7b339629-aead-5f32-970d-653ee26d5c6e", "description": null, "capacity": null}], "tracks": [{"name": "Village", "slug": "6330-village", "color": "#C730BC"}, {"name": "Adversaries Evolve, So Do We", "slug": "6328-adversaries-evolve-so-do-we", "color": "#4826ed"}, {"name": "Shared Knowledge, Shared Defense", "slug": "6327-shared-knowledge-shared-defense", "color": "#f42121"}, {"name": "Building Bridges, Breaking Barriers", "slug": "6329-building-bridges-breaking-barriers", "color": "#3eac3b"}], "days": [{"index": 1, "date": "2025-11-15", "day_start": "2025-11-15T04:00:00-05:00", "day_end": "2025-11-16T03:59:00-05:00", "rooms": {"Atrium - Sponsors": [{"guid": "b5ae7901-3a78-5e99-9bf1-4ae0d10e538f", "code": "NJFHPU", "id": 81651, "logo": null, "date": "2025-11-15T09:00:00-05:00", "start": "09:00", "duration": "08:00", "room": "Atrium - Sponsors", "slug": "bsidesatl-2025-81651-sponsor-village", "url": "https://pretalx.com/bsidesatl-2025/talk/NJFHPU/", "title": "Sponsor Village", "subtitle": "", "track": null, "type": "Full-day Village", "language": "en", "abstract": "Visit our terrific sponsors!", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/NJFHPU/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/NJFHPU/", "attachments": []}], "Atrium - Check in": [{"guid": "090047a6-b96f-5224-b9e8-27677f808adb", "code": "QXFXJV", "id": 81648, "logo": null, "date": "2025-11-15T08:00:00-05:00", "start": "08:00", "duration": "07:30", "room": "Atrium - Check in", "slug": "bsidesatl-2025-81648-attendee-check-in", "url": "https://pretalx.com/bsidesatl-2025/talk/QXFXJV/", "title": "Attendee check-in", "subtitle": "", "track": null, "type": "Full-day Village", "language": "en", "abstract": "Attendee check-in", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/QXFXJV/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/QXFXJV/", "attachments": []}], "Room 204": [{"guid": "f6b5b18b-3e03-5e43-ac8f-6f463c77a299", "code": "RBCTWP", "id": 84336, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "07:30", "room": "Room 204", "slug": "bsidesatl-2025-84336-georgia-statewide-mesh-coalition", "url": "https://pretalx.com/bsidesatl-2025/talk/RBCTWP/", "title": "Georgia Statewide Mesh Coalition", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "Join the Georgia Meshtastic community in exploring decentralized, off-grid communication! Our village is a hands-on space where you can experience long-range, low-power mesh networking using LoRa radios. Whether you're new to Meshtastic or an experienced node operator, come discover how these resilient networks enable communication without internet or cellular infrastructure.\r\nWhat We'll Have:\r\n\r\n- Live demonstration network with multiple nodes showing real-time mesh topology\r\n- Build-your-own-node station with various hardware options (TTGO T-Beam, Heltec, WisBlock RAK)\r\n- Range testing activities around the venue\r\n- Solar power demonstrations for permanent node installations\r\n- Emergency communications scenarios and disaster preparedness discussions\r\n\r\nActivities & Workshops:\r\n\r\n- Getting Started with Meshtastic (beginner-friendly setup sessions)\r\n- Antenna building and optimization workshop\r\n- Mapping coverage areas and understanding network propagation\r\n- Integration with other services (MQTT, Home Assistant, APRS)\r\n- Georgia mesh network planning session - help us expand statewide coverage\r\n\r\nWho Should Visit:\r\nAmateur radio operators, preppers, hikers, privacy advocates, IoT enthusiasts, emergency responders, or anyone interested in community-owned communication infrastructure. No license required!\r\n\r\nBring your existing Meshtastic hardware to join our event mesh, or try out our loaner devices. Let's build resilient, community-driven networks together!", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "T89HYQ", "name": "Josh Cardwell", "avatar": "https://pretalx.com/media/avatars/T89HYQ_KQOI6HL.webp", "biography": "I organize chaos into reality, daily. I live to learn a little. I thrive on the imperfection of the mortal experience, I crave to understand the unexplained.", "public_name": "Josh Cardwell", "guid": "39385dd8-478a-57ed-9b03-dbbfe53223b5", "url": "https://pretalx.com/bsidesatl-2025/speaker/T89HYQ/"}, {"code": "B8FNJR", "name": "Pratik Patel", "avatar": null, "biography": null, "public_name": "Pratik Patel", "guid": "f3488b76-c615-5338-9c05-2454c423740b", "url": "https://pretalx.com/bsidesatl-2025/speaker/B8FNJR/"}, {"code": "NLPBKH", "name": "Steve Wilson", "avatar": null, "biography": null, "public_name": "Steve Wilson", "guid": "195506aa-1170-564f-b6f8-ffde67902349", "url": "https://pretalx.com/bsidesatl-2025/speaker/NLPBKH/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/RBCTWP/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/RBCTWP/", "attachments": []}], "Room 300": [{"guid": "e91f87e0-ee1e-557d-9d0a-1390a2ddf817", "code": "7EHCFJ", "id": 82315, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2025-82315-adaptive-defense-how-microsoft-defender-evolves-to-outsmart-modern-threats", "url": "https://pretalx.com/bsidesatl-2025/talk/7EHCFJ/", "title": "Adaptive Defense: How Microsoft Defender Evolves to Outsmart Modern Threats", "subtitle": "", "track": "Adversaries Evolve, So Do We", "type": "50 minute talk", "language": "en", "abstract": "In today\u2019s threat landscape, adversaries are faster, smarter, and more elusive than ever\u2014leveraging automation, AI, and cross-domain attack vectors to breach defenses. But defenders are not standing still. This session explores how Microsoft Defender is transforming security operations through adaptive, AI-powered capabilities that span endpoints, identities, cloud workloads, and data.\r\n\r\nJoin us as we unpack real-world scenarios where Microsoft Defender\u2019s Extended Detection and Response (XDR) and Security Copilot agents neutralize emerging threats like ClickFix and AI-obfuscated phishing campaigns. Learn how Defender\u2019s integration with Microsoft Sentinel, Entra ID, and Defender for Cloud Apps creates a unified shield against lateral movement, identity compromise, and cloud breaches.\r\n\r\nWe\u2019ll also dive into how Defender\u2019s proactive posture management, agentless scanning, and intelligent automation empower security teams to shift left, reduce alert fatigue, and stay ahead of adversaries\u2014no matter how fast they evolve.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "JZWWHR", "name": "Unique Glover", "avatar": "https://pretalx.com/media/avatars/JZWWHR_pirt2K7.webp", "biography": "Meet Unique Glover, a cybersecurity force with 23+ years in the game. Unique leads a security solution engineering sales team responsible for helping enterprise customers strengthen their security posture through Microsoft products and services. From NYC roots to ATL vibes, Unique blends tech expertise with people-first leadership and a \u201cfail fast, fail forward\u201d mindset\ud83e\udde0.\u000b\u000bArmed with technical degrees and a stack of certs (CISSP, CCSP, and more), Unique\u2019s career spans Microsoft, EY, NCR, and beyond.\u000b\u000bOff the clock? Unique\u2019s all about mentoring, family, travel, and giving back. Life motto: be present, lead with purpose, and always send the elevator back down\ud83c\udf81.", "public_name": "Unique Glover", "guid": "677e5834-773b-50fe-b96f-3154ad2eb4ee", "url": "https://pretalx.com/bsidesatl-2025/speaker/JZWWHR/"}, {"code": "LHKMEW", "name": "Emmanuel Taiwo", "avatar": "https://pretalx.com/media/avatars/LHKMEW_T78R8IR.webp", "biography": "Emmanuel Taiwo is a Senior Solution Engineer at Microsoft, passionate about leveraging AI to transform cybersecurity and empower organizations to thrive in a digital first world. He helps organizations enhance their security posture through AI driven threat detection, automated response, and machine learning integration. Emmanuel holds a Master of Science in Data Science, providing him with deep expertise in AI, machine learning, and big data security. His technical depth enables him to offer unique insights into the cutting-edge technologies shaping the future of cybersecurity.", "public_name": "Emmanuel Taiwo", "guid": "52bdf949-e2b9-50a7-a238-6ac956afde91", "url": "https://pretalx.com/bsidesatl-2025/speaker/LHKMEW/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/7EHCFJ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/7EHCFJ/", "attachments": []}, {"guid": "4b9ddb26-816e-5c95-b56e-64b22c392937", "code": "LNNQXX", "id": 81662, "logo": null, "date": "2025-11-15T10:30:00-05:00", "start": "10:30", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2025-81662-cloud-learn-like-a-systems-engineer-hack-like-a-script-kiddie", "url": "https://pretalx.com/bsidesatl-2025/talk/LNNQXX/", "title": "Cloud : Learn Like a Systems Engineer (Hack Like a Script Kiddie)", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "BLUF: Learn Cloud using systems engineering approach and hack cloud with LLM.\r\n\r\nAbstract\r\n\t\u2022\tChallenge: Cloud ecosystems are large and complex.\r\n\t\u2022\tApproach: Apply a systems engineering lifecycle: needs \u2192 requirements \u2192 architecture/design \u2192 implementation \u2192 integration \u2192 verification/operations.\r\n\t\u2022\tScope: Azure-focused examples with provider comparisons.\r\n\t\u2022\tUse Cases: From home-lab to small-business rollouts; examine cost, scalability, and security tradeoffs.\r\n\t\u2022\tHands-On: PwnedLabs lab for web-app/cloud attack paths, hardening, and validation under the shared responsibility model.\r\n\t\u2022\tLLM Integration: Use Codex-like assistants to accelerate recon, produce playbooks/tests, and summarize findings\r\n\t\u2022\tTakeaway: A practical, repeatable framework to understand cloud as a systems engineer and leverage LLMs to speed security testing and automation.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "YRVGSP", "name": "Robert Kwak", "avatar": null, "biography": "LifeTimeScriptKiddie.", "public_name": "Robert Kwak", "guid": "ab98442a-29c3-5ea9-a208-ef838665c56e", "url": "https://pretalx.com/bsidesatl-2025/speaker/YRVGSP/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/LNNQXX/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/LNNQXX/", "attachments": []}, {"guid": "030656fa-b403-5fba-a624-8039ad4173ad", "code": "FBP7MD", "id": 81771, "logo": null, "date": "2025-11-15T11:30:00-05:00", "start": "11:30", "duration": "00:20", "room": "Room 300", "slug": "bsidesatl-2025-81771-bridging-the-gap-between-grc-and-cybersecurity-strategies-for-effective-collaboration", "url": "https://pretalx.com/bsidesatl-2025/talk/FBP7MD/", "title": "Bridging the Gap Between GRC and Cybersecurity: Strategies for Effective Collaboration", "subtitle": "", "track": "Building Bridges, Breaking Barriers", "type": "20 minute talk", "language": "en", "abstract": "Governance, Risk, and Compliance (GRC) teams often operate in silos, disconnected from the hands-on efforts of cybersecurity teams such as red and blue teams. This disconnect can lead to misaligned priorities, overlooked risks, and inefficiencies in responding to threats. In this presentation, we\u2019ll explore strategies to bridge the gap between GRC and cybersecurity teams, emphasizing the importance of collaboration in building a unified, risk-aware culture. Attendees will learn actionable techniques to align compliance frameworks with security operations, foster communication between teams, and leverage shared tools and data for better outcomes. This talk will empower both GRC and cybersecurity professionals to break down silos and work together effectively.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GUZSFY", "name": "Kartik Khurana", "avatar": "https://pretalx.com/media/avatars/GUZSFY_lYN7Nq8.webp", "biography": "Kartik Khurana is a cybersecurity professional working at NVIDIA, where he leads initiatives in Customer Trust within the Governance, Risk, and Compliance (GRC) team. With expertise in cloud security, compliance frameworks, and risk management, Kartik plays a key role in strengthening customer confidence by ensuring robust security and compliance practices.\r\nPreviously, he gained hands-on experience through five internships spanning penetration testing, auditing, cloud security, and identity and access management. At Health Catalyst, he led projects enhancing cloud security metrics and conducting HiTrust and SOC 2 Type II audits, demonstrating his ability to manage complex compliance landscapes and improve security infrastructures.\r\nKartik holds a Master\u2019s in Cybersecurity (Analytics and Operations) from Pennsylvania State University, where he maintained a 4.00 GPA and actively engaged in workshops and industry seminars. His technical proficiency includes AWS, Crowdstrike, and Prisma Cloud, equipping him to address diverse cybersecurity challenges effectively.\r\nDedicated to advancing cybersecurity practices, Kartik combines strong communication, technical, and leadership skills to drive trust, resilience, and innovation in security programs. His long-term goal is to grow as a cybersecurity leader, making impactful contributions to protecting digital infrastructures and building customer confidence.", "public_name": "Kartik Khurana", "guid": "4be743cf-ef46-5d90-b8d3-dc8f28187236", "url": "https://pretalx.com/bsidesatl-2025/speaker/GUZSFY/"}, {"code": "CNTBUR", "name": "Pranay Singh Suri", "avatar": "https://pretalx.com/media/avatars/CNTBUR_bz604Bs.webp", "biography": "Pranay Singh Suri is a cybersecurity professional with over three years of experience in compliance, security assessments, and audit readiness across cloud and enterprise environments. He currently works as an Associate Security Engineer at Coalfire Systems, where he supports FedRAMP assessments, penetration testing, and threat intelligence validation.\r\n\r\nPreviously, Pranay served as a Senior Consultant at Grant Thornton and a Senior Analyst at Deloitte, specializing in SOC 1/2, SOX, and ITGC audits. His work has spanned access reviews, identity and access management, and control testing across industries such as banking, healthcare, and cloud services.\r\n\r\nPranay is a certified ISO 27001 Lead Auditor, CCSK, and Security+ professional, and he recently earned his eJPT certification. He holds a Master of Science in Cybersecurity Analytics and Operations from The Pennsylvania State University, and a Bachelor of Technology in Computer Science Engineering from the University of Petroleum and Energy Studies.\r\n\r\nWith hands-on expertise in AWS, Azure AD, and tools like Burp Suite, Tenable, and Wireshark, Pranay focuses on bridging compliance and technical security to strengthen organizational resilience. His interests include penetration testing, cloud security, and improving audit processes through automation and evidence readiness.", "public_name": "Pranay Singh Suri", "guid": "d4ff5e7c-95b1-59fa-a42a-73437531f818", "url": "https://pretalx.com/bsidesatl-2025/speaker/CNTBUR/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/FBP7MD/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/FBP7MD/", "attachments": []}, {"guid": "4efde238-5dc7-5f73-ba93-cf024c212aa1", "code": "QXM7UM", "id": 81987, "logo": null, "date": "2025-11-15T13:00:00-05:00", "start": "13:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2025-81987-from-vibes-to-vulnerabilities-how-ai-agents-turn-on-their-users", "url": "https://pretalx.com/bsidesatl-2025/talk/QXM7UM/", "title": "From Vibes to Vulnerabilities: How AI Agents Turn on Their Users", "subtitle": "", "track": "Adversaries Evolve, So Do We", "type": "50 minute talk", "language": "en", "abstract": "We were promised autocomplete on steroids. What we got was a new attack surface,\u00a0one that developers invite into their terminals, editors, CI pipelines, and even production systems.\r\n\r\nIn this talk, I walk through how AI coding agents, the ones we rely on to ship faster by offloading mental load, are quietly introducing a new class of threats. And these aren\u2019t theoretical. They\u2019re already being exploited in the wild.\r\n\r\nWe\u2019ll explore how natural gaps in agent understanding can become opportunities for adversaries, and how the tools built to boost productivity can be subverted into delivery mechanisms for exploitation.\r\n\r\nFrom subtle context manipulation to unexpected supply chain consequences, we\u2019ll trace how trust in your agent can become the thing that gets you pwned.\r\n\r\nThis isn\u2019t about prompt injection. It's about something much deeper. This is real-world exploitation.\u00a0Where the agent becomes the source of the next attack.\r\n\r\nWe\u2019ll walk through concrete examples, highlight the (surprisingly limited) tooling available today, and make the case that agent context and model provenance need to be treated with the same rigor we already apply to our dependencies and infrastructure.\r\n\r\nAI agents are immensely useful. But if we don\u2019t rethink how we trust and monitor them, they won\u2019t just make our jobs easier, they\u2019ll make attackers\u2019 jobs easier too.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "7LVXGU", "name": "Wes Widner", "avatar": "https://pretalx.com/media/avatars/7LVXGU_5BDTwjA.webp", "biography": "Wes Widner is a Senior Principal Engineer with a deep background in security-focused distributed systems. He started as a data engineer on McAfee\u2019s Global Threat Intelligence team. Back before \u201cdata engineering\u201d was a job title. Later became the founding manager of the multi-cloud team at CrowdStrike. He now leads strategic engineering initiatives at Cyberhaven, a data detection and response startup.\r\n\r\nWes specializes in uncovering the hidden risks in complex systems. Especially the quiet, high-trust assumptions we make when integrating AI agents into our workflows. He\u2019s been responsible for evaluating, securing, and operationalizing AI agents across production environments.\r\n\r\nLately he\u2019s been inventing new (and slightly scarier) attack surfaces by vibe\u2011coding kernel modules that talk to physical hardware. Testing the boundaries of what an over\u2011confident agent should ever be allowed to control. What could possibly go wrong?", "public_name": "Wes Widner", "guid": "2fc00c4f-af24-558a-bbcf-7f6ef726c48a", "url": "https://pretalx.com/bsidesatl-2025/speaker/7LVXGU/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/QXM7UM/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/QXM7UM/", "attachments": []}, {"guid": "3420250d-7129-5f06-9092-4643e124d01e", "code": "CTRNJY", "id": 81692, "logo": null, "date": "2025-11-15T14:00:00-05:00", "start": "14:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2025-81692-the-ceo-is-calling-a-hacker-s-guide-to-building-and-weaponizing-a-bec-demo-environment", "url": "https://pretalx.com/bsidesatl-2025/talk/CTRNJY/", "title": "The CEO is Calling: A Hacker's Guide to Building and Weaponizing a BEC Demo Environment", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "The barrier to entry for creating sophisticated, custom phishing infrastructure has officially collapsed. Gone are the days of clunky templates and easily detectable campaigns. In this talk, we'll demonstrate how attackers can now leverage Large Language Models (LLMs) to rapidly clone and deploy pixel-perfect, convincing replicas of any target website and login page in minutes, not hours.\r\n\r\nWe will bypass the false sense of security offered by traditional MFA portals, showing exactly how modern adversary-in-the-middle (AitM) techniques render them ineffective. We'll provide a minimalist's guide to the backend, covering the bare-minimum PHP requirements for implementing convincing routing and live credential capture. This session moves beyond theory, culminating in a live Business Email Compromise (BEC) demo built from scratch specifically for the BSides Atlanta audience. We'll explore why this hyper-accessible threat is more dangerous than ever and what it means for the future of our defensive strategies. Attendees will leave with a sobering understanding of how quickly bespoke offensive tooling can be created and deployed in the real world.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "7WZQSJ", "name": "Brett Jenson", "avatar": "https://pretalx.com/media/avatars/7WZQSJ_wsJFYhO.webp", "biography": "Brett is the Offensive Security Lead for Wellstar Health System in Marietta, GA, with more than a decade of experience in the security space. His areas of interest include security research, offensive security, programming, and, more recently, working in the LLM/AI Red Teaming space. He especially enjoys teaching and mentoring up-and-coming security students and professionals, having personally helped to expand internship opportunities at Wellstar for the Information Security program.", "public_name": "Brett Jenson", "guid": "06b3194f-5fd4-5804-b8f3-8fb306d84fdc", "url": "https://pretalx.com/bsidesatl-2025/speaker/7WZQSJ/"}, {"code": "WKPYKU", "name": "KMcGrath", "avatar": "https://pretalx.com/media/avatars/WKPYKU_MEmWNFc.webp", "biography": "Kasey McGrath is an IT security intern at Wellstar Health System and a cybersecurity student at Columbus State University. She enjoys digging into problems, finding patterns, and understanding how things work.", "public_name": "KMcGrath", "guid": "e4521f34-7c77-5858-bc9e-95404215c9b1", "url": "https://pretalx.com/bsidesatl-2025/speaker/WKPYKU/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/CTRNJY/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/CTRNJY/", "attachments": []}, {"guid": "c01839c3-ccdc-5b90-93a0-8749b1aadf2e", "code": "VQDMAU", "id": 82338, "logo": null, "date": "2025-11-15T15:00:00-05:00", "start": "15:00", "duration": "00:50", "room": "Room 300", "slug": "bsidesatl-2025-82338-where-did-the-threat-actor-go-they-ran-som-ware", "url": "https://pretalx.com/bsidesatl-2025/talk/VQDMAU/", "title": "Where did the Threat Actor go? - They RAN-SOM-WARE...", "subtitle": "", "track": "Adversaries Evolve, So Do We", "type": "50 minute talk", "language": "en", "abstract": "Where did the Threat Actor go? - They RAN-SOM-WARE...\r\nA journey into the heart of a ransomware gang; from the trade craft used to bypass defenses,\r\nto the anatomy of attack.\r\n\r\nOutline:\r\n- Intro\r\n- Who are threat actors?\r\n - The OG's\r\n \t- REvil\r\n \t- Conti\r\n\t- HIVE\r\n - The Top Dogs\r\n\t- LockBit\r\n\t- ALPHV/BlackCat\r\n\t- CL0P\r\n\t- Qilin\r\n\t- Akira\r\n\t- Hunters International\r\n \t- Medusa\r\n\t- Play\r\n\t- Ransomhouse\r\n\t- Rhysida\r\n- The rookies\r\n\t- Scattered Spider\r\n\t- Cactus\r\n\t- Everest\r\n\t- Silent\r\n\t- Stormous\r\n\t- Skira\r\n- What motivates the bad guys?\r\n - Money\r\n - Politics?\r\n- What is ransomware?\r\n - Cryptovirology\r\n- How does it all work?\r\n - F#ck you, Pay me.\r\n - Data brokers\r\n- Who pays these people???\r\n - Too many people\r\n- WHY!?\r\n - Make it stop!\r\n- How do we stop them?\r\n - \"Only you can prevent \"forest\" fires...\" ~ Smokey, the D.A.\r\n- Are they here to stay?\r\n - Organized crime is as old as time...\r\n- Outro\r\n - Are you ready for a ransomware attack?", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VHA8KU", "name": "M4x 5yn74x", "avatar": "https://pretalx.com/media/avatars/VHA8KU_tLWRkPh.webp", "biography": "\u0298\u1e68\u1e37\u04e4\u20ae, \u03b5\u03b7\u0441\u0280\u05e2\u0440\u04ad\u0457\u0473\u0272, \u01ff\u03d0\u0493\u1d7e\ua778\u1e09\u0467\u03ef\u0268\u04eb\u1d70, & \u0271\uab30\u019b\u03ce\u1f07\u044f\u0454.", "public_name": "M4x 5yn74x", "guid": "dd764388-05d7-5760-b520-afd5381c289f", "url": "https://pretalx.com/bsidesatl-2025/speaker/VHA8KU/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/VQDMAU/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/VQDMAU/", "attachments": []}, {"guid": "4b017885-5286-568f-a4e0-91e16ca33a42", "code": "LDSKUX", "id": 82354, "logo": null, "date": "2025-11-15T16:00:00-05:00", "start": "16:00", "duration": "00:20", "room": "Room 300", "slug": "bsidesatl-2025-82354-empowering-security-operations-with-ai-and-large-language-models-llms-from-noise-to-insight", "url": "https://pretalx.com/bsidesatl-2025/talk/LDSKUX/", "title": "Empowering Security Operations with AI and Large Language Models (LLMs): From Noise to Insight", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "20 minute talk", "language": "en", "abstract": "Security operations teams are inundated with alerts, logs, and repetitive workflows that limit their ability to focus on meaningful analysis and rapid response. Emerging AI technologies \u2014 particularly Large Language Models (LLMs) \u2014 offer an opportunity to bridge that gap by transforming unstructured data into actionable intelligence.\r\n\r\nThis session provides a high-level exploration of how LLMs and agent-based systems can be thoughtfully integrated into Security Operations Centers (SOCs). Rather than focusing on any specific platform, we\u2019ll discuss key decision points in designing these systems \u2014 including model selection, prompt design, context generation, agent creativity, token management, and workflow orchestration.\r\n\r\nThe presentation will conclude with a brief demo showing how these principles come together in a simple, agent-driven workflow to enrich and summarize security alerts in real time. Attendees will gain a practical understanding of how to evaluate and experiment with LLMs safely and effectively within their own security environments.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "KJBJ9K", "name": "Samson Adewale", "avatar": "https://pretalx.com/media/avatars/KJBJ9K_pA9wRyd.webp", "biography": "Samson Adewale is a Senior Security Engineer, specializing in threat response and automation. He has led initiatives building automated forensics labs and response frameworks in cloud environments. With a background spanning AWS, Azure, and DevSecOps, Samson is passionate about practical applications of AI to reduce operational overhead and enhance security resilience.", "public_name": "Samson Adewale", "guid": "b09f85fc-f7cb-5d24-8810-5e6c533aba2d", "url": "https://pretalx.com/bsidesatl-2025/speaker/KJBJ9K/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/LDSKUX/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/LDSKUX/", "attachments": []}], "Room 400": [{"guid": "3fa90ff2-6053-5d0d-b279-61f82ac56789", "code": "QGRQFZ", "id": 81649, "logo": null, "date": "2025-11-15T08:45:00-05:00", "start": "08:45", "duration": "00:15", "room": "Room 400", "slug": "bsidesatl-2025-81649-organizers-opening-remarks", "url": "https://pretalx.com/bsidesatl-2025/talk/QGRQFZ/", "title": "Organizers opening remarks", "subtitle": "", "track": null, "type": "Organizers remarks", "language": "en", "abstract": "Welcome to BSides Atlanta 2025!", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "NCRDAA", "name": "Dr. Andy Green", "avatar": "https://pretalx.com/media/avatars/NCRDAA_cYJvGYM.webp", "biography": "Andrew \u201cAndy\u201d Green, Ph.D., is a cybersecurity professor at Kennesaw State University and one of the organizers behind BSides Atlanta. green teaches, researches, builds hands-on labs, and occasionally breaks things on purpose so students learn how not to.\r\n\r\ngreen has spent nearly two decades bouncing between academia and the real world\u2014consulting for small and mid-sized businesses, wrangling healthcare IT, and now herding undergrads and their malware into something resembling employability. green runs the ISA undergraduate program and advises KSU\u2019s award-winning Offensive Security Research Club, which means lots of late nights, too much coffee, and the occasional \u201cwhoops, that was prod\u201d story\u2014purely hypothetically, of course.\r\n\r\ngreen\u2019s happy place is where policy, security, and practicality crash into each other at highway speeds. Expect opinions on coordinated disclosure, risk management that isn\u2019t just spreadsheet cosplay, and classrooms where students ship real work instead of memorizing acronyms. When green isn\u2019t grading or organizing BSides Atlanta, he\u2019s enjoying cigars, bourbon, and the open road on his motorcycle.  During the fall, you can almost certainly find him anywhere the University of Alabama football team is playing. Compliance is a floor, not a ceiling; patching is a love language; packet captures are therapy.\r\n\r\nBring questions, bring receipts, and bring your A-game\u2014green certainly does. And remember: there\u2019s never a wrong time to say \u201cRoll Tide.\u201d", "public_name": "Dr. Andy Green", "guid": "3928b93d-394b-54f3-96eb-31daa4c6806a", "url": "https://pretalx.com/bsidesatl-2025/speaker/NCRDAA/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/QGRQFZ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/QGRQFZ/", "attachments": []}, {"guid": "570402d9-4448-5770-8bab-0d416b49261b", "code": "ZAQKU8", "id": 83013, "logo": null, "date": "2025-11-15T09:00:00-05:00", "start": "09:00", "duration": "00:25", "room": "Room 400", "slug": "bsidesatl-2025-83013-the-endurance-of-defenders-lessons-from-ultrarunning-and-cyber-resilience", "url": "https://pretalx.com/bsidesatl-2025/talk/ZAQKU8/", "title": "The Endurance of Defenders: Lessons from Ultrarunning and Cyber Resilience", "subtitle": "", "track": null, "type": "Keynote", "language": "en", "abstract": "Every security professional knows the grind \u2014 long hours, unpredictable conditions, and the constant push to adapt when fatigue hits. In that way, cybersecurity and ultrarunning have a lot in common. Drawing on years of experience leading security transformations at Home Depot and Equifax and competing in 50-mile and 100-mile mountain races, Zach Tisher explores how endurance thinking, shared purpose, and community can transform how we approach modern defense.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "V9DHGT", "name": "Zach Tisher", "avatar": "https://pretalx.com/media/avatars/V9DHGT_BvMNfRX.webp", "biography": "Zach Tisher is the USIS CISO at Equifax, bringing extensive cybersecurity leadership experience from SunTrust, The Home Depot, and Equifax. Forged in post-breach environments, he excels in risk management and supply chain security, driving transformative initiatives and fostering strong security cultures. A lifelong endurance athlete and ultramarathon runner, Zach connects lessons from the trail and the boardroom to build resilient teams and sustainable security programs.", "public_name": "Zach Tisher", "guid": "c75143ca-723f-54f6-b717-7a39a8357b6a", "url": "https://pretalx.com/bsidesatl-2025/speaker/V9DHGT/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/ZAQKU8/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/ZAQKU8/", "attachments": []}, {"guid": "3d0a9a93-f196-5baf-8dba-eca6bf206d28", "code": "JWULY3", "id": 81650, "logo": null, "date": "2025-11-15T12:00:00-05:00", "start": "12:00", "duration": "01:00", "room": "Room 400", "slug": "bsidesatl-2025-81650-lunch", "url": "https://pretalx.com/bsidesatl-2025/talk/JWULY3/", "title": "Lunch", "subtitle": "", "track": null, "type": "50 minute talk", "language": "en", "abstract": "Time to eat lunch!", "description": null, "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/JWULY3/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/JWULY3/", "attachments": []}, {"guid": "bea49d7c-2936-5024-87a6-53fa0d51f2d3", "code": "MDV9YR", "id": 82174, "logo": null, "date": "2025-11-15T17:00:00-05:00", "start": "17:00", "duration": "00:30", "room": "Room 400", "slug": "bsidesatl-2025-82174-organizers-closing-remarks-and-giveaways", "url": "https://pretalx.com/bsidesatl-2025/talk/MDV9YR/", "title": "Organizers closing remarks and giveaways", "subtitle": "", "track": null, "type": "Organizers remarks", "language": "en", "abstract": "End of day remarks and giveaways", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "NCRDAA", "name": "Dr. Andy Green", "avatar": "https://pretalx.com/media/avatars/NCRDAA_cYJvGYM.webp", "biography": "Andrew \u201cAndy\u201d Green, Ph.D., is a cybersecurity professor at Kennesaw State University and one of the organizers behind BSides Atlanta. green teaches, researches, builds hands-on labs, and occasionally breaks things on purpose so students learn how not to.\r\n\r\ngreen has spent nearly two decades bouncing between academia and the real world\u2014consulting for small and mid-sized businesses, wrangling healthcare IT, and now herding undergrads and their malware into something resembling employability. green runs the ISA undergraduate program and advises KSU\u2019s award-winning Offensive Security Research Club, which means lots of late nights, too much coffee, and the occasional \u201cwhoops, that was prod\u201d story\u2014purely hypothetically, of course.\r\n\r\ngreen\u2019s happy place is where policy, security, and practicality crash into each other at highway speeds. Expect opinions on coordinated disclosure, risk management that isn\u2019t just spreadsheet cosplay, and classrooms where students ship real work instead of memorizing acronyms. When green isn\u2019t grading or organizing BSides Atlanta, he\u2019s enjoying cigars, bourbon, and the open road on his motorcycle.  During the fall, you can almost certainly find him anywhere the University of Alabama football team is playing. Compliance is a floor, not a ceiling; patching is a love language; packet captures are therapy.\r\n\r\nBring questions, bring receipts, and bring your A-game\u2014green certainly does. And remember: there\u2019s never a wrong time to say \u201cRoll Tide.\u201d", "public_name": "Dr. Andy Green", "guid": "3928b93d-394b-54f3-96eb-31daa4c6806a", "url": "https://pretalx.com/bsidesatl-2025/speaker/NCRDAA/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/MDV9YR/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/MDV9YR/", "attachments": []}], "Room 401": [{"guid": "9d76ccbb-ee7c-57b1-a031-1226aef1c071", "code": "7HCQNK", "id": 81655, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2025-81655-ai-governance-for-sentients", "url": "https://pretalx.com/bsidesatl-2025/talk/7HCQNK/", "title": "AI Governance for Sentients", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "\u201cAI to manage my inbox\u201d, \u201cAI to handle purchasing\u201d, \u201cAI to schedule CEO\u2019s flights\u201d, \u201cAI to \u2026.\u201d - FFS! Artificial Intelligence is being baked into all kinds of products. Companies are selling mediocre and often badly developed products with \u201cAI will solve\u201d taglines. Sometimes it feels like us in Security teams are using duct tape to patch Hoover dam. So, what do we do? \r\n\r\nThis talk is a culmination of notes I\u2019ve taken over past year trying to help govern AI onslaught at my day job and in non-profits I consult with. I will offer practical insights via storytelling. You will walk away with realistic view of AI\u2019s capabilities and risks and talking points needed to address its adoption in your organization. The goal of my talk isn\u2019t to help you stop AI adoption. I find AI to be extremely helpful when used to its fullest potential. My goal is to help prepare you for AI enablement in a mature secure manner.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "D7HR9R", "name": "Qasim", "avatar": "https://pretalx.com/media/avatars/D7HR9R_GakwxpA.webp", "biography": "Qasim is the Director of Cybersecurity at a leading healthcare organization, overseeing detection, incident response, vulnerability management, purple teaming, and cybersecurity engineering. With a strong background in offensive security and risk management, he has helped organizations strengthen their defenses against evolving threats. Passionate about bridging the gap between cybersecurity and business, Qasim specializes in offensive security and cybersecurity strategy. He is also a dedicated educator, mentoring professionals and sharing his expertise at conferences such as BSides and Black Hat. Committed to advancing cybersecurity in healthcare, he drives innovation in proactive defense and risk management.", "public_name": "Qasim", "guid": "18296c73-9c5c-5c8b-8bd8-57e1a7578997", "url": "https://pretalx.com/bsidesatl-2025/speaker/D7HR9R/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/7HCQNK/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/7HCQNK/", "attachments": []}, {"guid": "6e5d8487-afea-57f2-b3e1-db5a74fcf87a", "code": "S7DN3W", "id": 82220, "logo": null, "date": "2025-11-15T10:30:00-05:00", "start": "10:30", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2025-82220-ctrl-alt-career-rebooting-your-path-into-cybersecurity-for-the-ai-era", "url": "https://pretalx.com/bsidesatl-2025/talk/S7DN3W/", "title": "Ctrl+Alt+Career: Rebooting Your Path into Cybersecurity for the AI Era", "subtitle": "", "track": "Building Bridges, Breaking Barriers", "type": "50 minute talk", "language": "en", "abstract": "The traditional cybersecurity career ladder is broken. Entry-level positions demand years of experience and the advice that worked five to ten years ago leaves aspiring professionals spinning their wheels. AI has fundamentally transformed both the work we do and how we're expected to prove we can do it.\r\nThis talk examines why the old playbook no longer works and reveals what works now. You'll learn how to leverage AI tools to build demonstrable security skills, position yourself in emerging niches where AI creates opportunity rather than competition, and make yourself visible in ways that cut through the noise of traditional job markets.\r\n\r\nWe'll explore strategies for the AI era including building proof of work that stands out, developing skills that complement rather than compete with automation, and networking in ways that bypass gatekeepers. Learn how to navigate this new landscape and learn the common pitfalls that waste time and energy.\r\n\r\nWhether you're trying to break into cybersecurity for the first time, pivoting from another field, or stuck at a career plateau, this session provides a practical framework for rebooting your approach with actionable strategies you can implement immediately.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "K78PZS", "name": "Eric Logan", "avatar": "https://pretalx.com/media/avatars/K78PZS_1P15G42.webp", "biography": "Eric M. Logan brings over 26 years of dedicated experience in IT and cybersecurity across K-12 and higher education environments. Currently serving as Director of Information & Network Security for DeKalb County School District, Eric leads the district's cybersecurity transformation, having built their first dedicated security team and launched innovative programs like Cyber Champions, which empowers students to become peer leaders in digital safety.\r\n\r\nHis career spans institutions including Georgia Tech Research Institute, where he served as Cybersecurity Operations Manager and later as Governance, Risk & Compliance Manager, and Emory University, where he provided technical expertise to students and researchers while managing campus-wide technology systems. Eric's unique perspective combines hands-on technical expertise with strategic leadership and a genuine passion for education.", "public_name": "Eric Logan", "guid": "0e5e1f3c-e987-57b9-a5b1-287ee2b703ac", "url": "https://pretalx.com/bsidesatl-2025/speaker/K78PZS/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/S7DN3W/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/S7DN3W/", "attachments": []}, {"guid": "90e2841c-462e-5918-850b-dd69558dae71", "code": "QLB7HP", "id": 82216, "logo": null, "date": "2025-11-15T11:30:00-05:00", "start": "11:30", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2025-82216-building-a-dating-api-security-empathy-and-the-tradeoffs-of-full-stack-experimentation", "url": "https://pretalx.com/bsidesatl-2025/talk/QLB7HP/", "title": "Building a Dating API: Security, Empathy, and the Tradeoffs of Full-Stack Experimentation", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "20 minute talk", "language": "en", "abstract": "What happens when a security engineer builds something deeply personal, like a dating API? Suddenly, the tables turn: you\u2019re not just reviewing code, you\u2019re writing it. Every design choice becomes a tradeoff between speed, usability, and security.\r\n\r\nIn this talk, I share the lessons learned from creating my own dating API. Along the way, I had to navigate common security challenges like API key generation and storage, input validation, access controls, logging, and rate limiting etc., while also grappling with the frustrations and surprises of being \u201cthe developer.\u201d Some controls were easy to implement, others forced compromises that gave me new empathy for engineering teams under pressure.\r\n\r\nAttendees will leave with a practical checklist of API security considerations, insights into how design tradeoffs impact security decisions, and a reminder that building, even something unconventional, can sharpen both technical skills and cross-team understanding.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "QYN7JK", "name": "Udochi Nwobodo", "avatar": "https://pretalx.com/media/avatars/QYN7JK_JjJ83fZ.webp", "biography": "Udochi Nwobodo is a security engineer with extensive experience in infrastructure security, product security, and vulnerability management. She has worked across cloud and on-premises environments, leading initiatives that improve security posture through automation, secure design, and scalable processes.\r\n\r\nHer background includes deploying security solutions with infrastructure-as-code, managing enterprise vulnerability management programs, and implementing DevSecOps practices that align with business and compliance needs. She is particularly focused on building sustainable security programs that reduce risk while supporting engineering velocity.\r\n\r\nUdochi is committed to advancing the security community by sharing practical lessons and strategies through conference talks, mentorship, and collaborative projects.", "public_name": "Udochi Nwobodo", "guid": "538b440b-189e-5123-953b-51624ee19d33", "url": "https://pretalx.com/bsidesatl-2025/speaker/QYN7JK/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/QLB7HP/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/QLB7HP/", "attachments": []}, {"guid": "02d38921-8be4-545c-a212-95e6bd905e7e", "code": "GUBZ9Z", "id": 82296, "logo": "https://pretalx.com/media/bsidesatl-2025/submissions/GUBZ9Z/New_Locks_Old_Keys_U_VnTdlnv.webp", "date": "2025-11-15T13:00:00-05:00", "start": "13:00", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2025-82296-new-locks-old-keys-evaluating-microsoft-s-latest-controls-against-service-principal-abuse", "url": "https://pretalx.com/bsidesatl-2025/talk/GUBZ9Z/", "title": "New Locks, Old Keys: Evaluating Microsoft\u2019s Latest Controls Against Service Principal Abuse", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "Abuse of Service Principals in EntraID has been a longstanding favorite of APT groups. In recent years, that knowledge has trickled down to eCrime actors and is leveraged for ransomware and extortion. Microsoft has introduced two (and a half) new security controls to address this in 2025. Each has its pros and cons, but as with any security control an understanding of the risk it mitigates is crucial to balance the tradeoffs against potential business disruption.\r\n\r\nIn this talk, we'll go over three scenarios in which Service Principals are abused and which controls would be relevant to address this risk. We'll also explore how to perform your own testing to evaluate whether the controls you configure are functioning as expected.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "GSRR9B", "name": "James S", "avatar": null, "biography": null, "public_name": "James S", "guid": "d38485f7-2346-58a4-8e36-a024838f8132", "url": "https://pretalx.com/bsidesatl-2025/speaker/GSRR9B/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/GUBZ9Z/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/GUBZ9Z/", "attachments": []}, {"guid": "87d16ca8-0b13-5b7a-947d-b930cfb869a4", "code": "AY9PFT", "id": 81657, "logo": null, "date": "2025-11-15T14:00:00-05:00", "start": "14:00", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2025-81657-the-fediverse-embracing-the-hacker-ethos-for-a-decentralized-social-media-experience", "url": "https://pretalx.com/bsidesatl-2025/talk/AY9PFT/", "title": "The Fediverse: Embracing the Hacker Ethos for a Decentralized Social Media Experience", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "The fediverse represents a radical shift in how we engage with social media, aligning closely with the hacker ethos of openness, decentralization, and user empowerment. This talk will demystify the fediverse, explaining its structure and how it operates as a network of interconnected, decentralized platforms. Attendees will learn how to get started in the fediverse, including tips for creating accounts and navigating various platforms. We will also explore the wealth of security resources available within this ecosystem, highlighting communities and tools that promote a culture of security and privacy. By embracing the fediverse, we can reclaim our digital spaces and foster a more inclusive and secure online environment.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VSLX9U", "name": "Xavier Ashe", "avatar": "https://pretalx.com/media/avatars/VSLX9U_Qp4iDtf.webp", "biography": "Xavier Ashe has been hacking since the late 80s and been working in information security since the early 90s.  He is currently a Senior Vice President at Truist and a Georgia Institute of Technology alumnus.  Xavier has over 30 years of leadership experience in information security, working for various firms including IBM, Gartner, and Carbon Black.  Xavier was the first hire at the startup, Drawbridge Networks, where he was instrumental in bringing the first microsegmentation solution for servers and workstations to market.  Mr. Ashe has plenty of war stories, including the first DDOS attack ever, Target, Sony, Aramco, NotPetya, and others.  Xavier is an accomplished speaker and has presented at many security conferences including DefCon, BlackHat, RSA, BSides, Splunk .conf, SANS, and others.", "public_name": "Xavier Ashe", "guid": "e6456c5e-156f-5bc9-8f3e-1a2ee8e12da2", "url": "https://pretalx.com/bsidesatl-2025/speaker/VSLX9U/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/AY9PFT/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/AY9PFT/", "attachments": []}, {"guid": "46c5c250-c4f9-5876-9801-203f9829b57d", "code": "QKLXTP", "id": 82196, "logo": null, "date": "2025-11-15T15:00:00-05:00", "start": "15:00", "duration": "00:50", "room": "Room 401", "slug": "bsidesatl-2025-82196-toward-quantum-safe-standards-collaborative-adoption-of-pqc", "url": "https://pretalx.com/bsidesatl-2025/talk/QKLXTP/", "title": "Toward Quantum-Safe Standards: Collaborative Adoption of PQC", "subtitle": "", "track": "Building Bridges, Breaking Barriers", "type": "50 minute talk", "language": "en", "abstract": "Quantum computing is poised to upend modern cryptography by breaking widely used public-key algorithms like RSA in a matter of minutes. Cyber adversaries are already \u201charvesting\u201d encrypted data today with plans to decrypt it once quantum capabilities mature. This looming threat endangers everything from personal and financial data to military secrets and the digital signatures that underpin online trust. In response, academia and industry have joined forces with NIST to devise quantum-resistant algorithms and standards. NIST approved the first post-quantum cryptography (PQC) standards for encryption and digital signatures in 2024, marking a pivotal step toward protecting vulnerable crypto assets before large-scale quantum computers arrive.\r\n\r\nHowever, achieving post-quantum readiness is a complex, collaborative journey. Organizations must first identify which cryptographic assets and systems are at risk and prioritize them for migration. We present a technical framework for crypto agility and quantum-safe adoption, starting with a thorough cryptographic inventory to pinpoint vulnerable systems and to assess data at risk from \u201charvest-now, decrypt-later\u201d scenarios. Building on NIST\u2019s guidance, our approach emphasizes cross-sector collaboration in adopting PQC. We highlight applied research initiatives from global consortia to NIST\u2019s National Cybersecurity Center of Excellence projects that unite researchers, industry practitioners, and government to develop practical quantum-safe solutions. By aligning these efforts with NIST\u2019s PQC standards and guidelines, we provide forward-looking, hands-on strategies for academia and cybersecurity professionals to collaboratively safeguard assets and ensure a smooth transition to a quantum-safe future.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "RUBYCU", "name": "Khushi Gupta", "avatar": "https://pretalx.com/media/avatars/RUBYCU_zlJqf5n.webp", "biography": "Khushi Gupta is an assistant professor of cybersecurity at the University of North Georgia.", "public_name": "Khushi Gupta", "guid": "1002f896-30d8-548f-a963-695157fe8529", "url": "https://pretalx.com/bsidesatl-2025/speaker/RUBYCU/"}, {"code": "T8LSDE", "name": "Murthy Rallapalli", "avatar": "https://pretalx.com/media/avatars/T8LSDE_SAo9Qt2.webp", "biography": "Dr. Rallapalli is a United States Fulbright Scholar and an IBM Quantum Ambassador, recognized for his deep expertise in quantum computing, cloud security, and information privacy. With a career spanning over 25 years, he has held senior leadership and distinguished technical roles at IBM, Honeywell Corporation, and Ernst & Young, leading major initiatives in cybersecurity, enterprise architecture, and emerging technologies.\r\nAt present, Dr. Rallapalli serves as an advisor to Guidehouse, focusing on advanced and emerging technologies such as quantum computing and next-generation cybersecurity solutions. He also holds a faculty appointment as Professor of Practice in Cybersecurity at the University of North Georgia in Atlanta, GA.\r\nThrough the prestigious Fulbright Scholar Program, Dr. Rallapalli has contributed globally\u2014teaching and collaborating at Fulbright University Vietnam, and engaging in research initiatives in Iceland and Kosovo. \r\nHe holds a Ph.D. in Information Security and Privacy from Stevens Institute of Technology and a Quantum Computing certificate from MIT. A prolific contributor to the field, Dr. Rallapalli has authored numerous technical papers, published books, and holds multiple patents in data privacy and cybersecurity. His current research centers on quantum algorithms for optimization and the future of secure computing.\r\nOutside his professional life, he enjoys exploring historical landmarks across the globe and playing pickleball at local parks.", "public_name": "Murthy Rallapalli", "guid": "707ab2b7-3484-507f-8755-885a18158eb4", "url": "https://pretalx.com/bsidesatl-2025/speaker/T8LSDE/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/QKLXTP/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/QKLXTP/", "attachments": []}, {"guid": "1dbc7e2b-080e-561a-adc8-3b315ca6510d", "code": "PGJWEX", "id": 81672, "logo": "https://pretalx.com/media/bsidesatl-2025/submissions/PGJWEX/Screenshot_2025-08-01_KZbeo0A.png", "date": "2025-11-15T16:00:00-05:00", "start": "16:00", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2025-81672-engineering-wisdom-executive-results-the-evolution-of-ot-cybersecurity-assessments", "url": "https://pretalx.com/bsidesatl-2025/talk/PGJWEX/", "title": "Engineering Wisdom, Executive Results: The Evolution of OT Cybersecurity Assessments", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "20 minute talk", "language": "en", "abstract": "As cyber threats to Operational Technology (OT) increase, organizations are turning to assessments to gauge their security posture. Yet too often, these efforts result only in compliance checklists, missing the broader opportunity to build shared understanding and lasting resilience.\r\n\r\nThis talk explores how OT cybersecurity assessments can be transformed into vehicles for knowledge-sharing across the enterprise. More than identifying control gaps, effective assessments create a common language between engineers, operators, and security teams, ensuring that technical findings translate into actionable, operationally grounded improvements.\r\n\r\nWe will discuss how assessments can:\r\n\r\nIlluminate workflows and vulnerabilities that only frontline staff truly understand.\r\n\r\nBuild cross-team trust by engaging operations, security, and leadership in a shared process.\r\n\r\nTranslate frameworks like IEC 62443 and NIST 800-82 into tailored, context-specific practices.\r\n\r\nEmpower teams through readiness reviews, iterative baselines, and evolving metrics that reflect real-world maturity.\r\n\r\nBy treating assessments as collaborative exercises\u2014acts of both technical analysis and organizational diplomacy\u2014we can ensure they leave behind more than a report. They leave behind knowledge: clarity of purpose, visible progress, and the confidence to adapt security controls as threats and operations evolve.\r\n\r\nAttendees will gain insight into designing assessments that not only measure but also teach, bridging silos and embedding security knowledge where it matters most\u2014within the teams who operate and safeguard critical infrastructure every day.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "RLAQ9X", "name": "Kristen Wells", "avatar": "https://pretalx.com/media/avatars/RLAQ9X_J8zDFbz.webp", "biography": "Kristen Wells is a Senior Consultant at IBM specializing in Operational Technology (OT) cybersecurity, with experience leading transformation initiatives across critical infrastructure, energy, and manufacturing sectors. Her work bridges the gap between engineering and cybersecurity, helping organizations align frameworks such as IEC 62443, NIST SP 800-82, and the NIST Cybersecurity Framework with real-world industrial operations. Kristen has developed methodologies for OT security assessments that emphasize collaboration, measurable outcomes, and sustainable security practices. She is passionate about sharing knowledge across disciplines and equipping both engineers and cybersecurity professionals to build resilience together in complex operational environments.", "public_name": "Kristen Wells", "guid": "dd309225-e3b4-5b16-ad17-e0772137b546", "url": "https://pretalx.com/bsidesatl-2025/speaker/RLAQ9X/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/PGJWEX/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/PGJWEX/", "attachments": []}, {"guid": "fd57ad3a-5a69-5db9-92be-1592345d53ce", "code": "JLFGHY", "id": 81985, "logo": null, "date": "2025-11-15T16:30:00-05:00", "start": "16:30", "duration": "00:20", "room": "Room 401", "slug": "bsidesatl-2025-81985-the-deceptive-web-of-scam-compounds", "url": "https://pretalx.com/bsidesatl-2025/talk/JLFGHY/", "title": "The Deceptive Web of Scam Compounds", "subtitle": "", "track": "Building Bridges, Breaking Barriers", "type": "20 minute talk", "language": "en", "abstract": "This talk examines the rise of scam compounds and some of the rapidly changing features of these criminal operations, where fraudulent activities occur at scale. A report last year by the UN Office on Drugs and Crime found that cyber-enabled fraud has intensified, resulting in billions of dollars in losses, with many of these crimes led by groups in Southeast Asia. The UN has estimated that hundreds of thousands of people are being trafficked and forced to work in a combination of scam centers and online operations. At the same time that cyber crime syndicates are rapidly evolving their use of technologies, they have also become more mobile and can relocate a compound after completing a \u201clife cycle of operations.\u201d", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "FKUB98", "name": "Laura", "avatar": "https://pretalx.com/media/avatars/FKUB98_1gwmoTf.webp", "biography": "Laura Sang Hee Scherling, EdD, is a director and lecturer at Columbia University. She teaches in the Tech, Policy, and Innovation concentration. Scherling is the founder of the Cyber Care Institute and co-founder of Civic Art Lab. The Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe (Bloomsbury, 2025) is her fourth book. Her previous books include Ethics in Design and Communication (Bloomsbury) , Digital Transformation in Design (transcript), and Product Design, Technology, and Social Change (Intellect). She is a contributor to Tech Policy Press. Scherling is passionate about tech ethics, and cybersecurity awareness.", "public_name": "Laura", "guid": "e8e5059e-0843-556e-8cd2-b559fa73996d", "url": "https://pretalx.com/bsidesatl-2025/speaker/FKUB98/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/JLFGHY/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/JLFGHY/", "attachments": []}], "Room 402": [{"guid": "3055a3e6-bf07-5de8-8c1d-89f9c4723220", "code": "X7RXDF", "id": 81956, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2025-81956-building-a-standout-resume-for-information-security-new-recent-grads-and-early-career-pros", "url": "https://pretalx.com/bsidesatl-2025/talk/X7RXDF/", "title": "Building a Standout Resume for Information Security: New / Recent Grads and Early Career Pros", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "In this presentation, Jason Maddox, Director of IT and Chief Information Security Officer at a $40 billion private equity firm, shares strategies for crafting resumes that secure information security roles for senior college students, recent graduates (0-2 years of experience), and early-career professionals (3-5 years of experience). Drawing on years of experience hiring for high-stakes financial environments, where IT and cybersecurity are critical to protecting sensitive data, this talk delivers actionable advice tailored to early-stage career levels. Attendees will learn to create concise, ATS-friendly resumes that highlight relevant skills, certifications, and projects. The presentation will showcase examples of what to avoid in your resume, explain why, and demonstrate how to capture the hiring manager's attention. This session aims to assist soon-to-be grads / recent grads and early career professionals to craft compelling resumes that help open doors.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "JSUYAK", "name": "Jason Maddox", "avatar": null, "biography": null, "public_name": "Jason Maddox", "guid": "b0a1505c-916f-531d-8ca6-4b71f55d3bb4", "url": "https://pretalx.com/bsidesatl-2025/speaker/JSUYAK/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/X7RXDF/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/X7RXDF/", "attachments": []}, {"guid": "04c6ce3c-75f5-5d28-ba22-0d5534e20c2a", "code": "C9RBES", "id": 81936, "logo": null, "date": "2025-11-15T10:30:00-05:00", "start": "10:30", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2025-81936-a-pirate-err-hacker-looks-at-50", "url": "https://pretalx.com/bsidesatl-2025/talk/C9RBES/", "title": "A Pirate err Hacker Looks at 50", "subtitle": "", "track": "Building Bridges, Breaking Barriers", "type": "50 minute talk", "language": "en", "abstract": "This year, the calendar turned and I hit a milestone. I looked and realized that I had been doing this security stuff for over 20 years professionally, and it was time to take a look back and share some insight about how I earned this gray hair and these wrinkles and what I would do differently if I \"could do it all over again\". I think I have gained just a little bit of insight that many new to the field (or newer to the field) might just benefit from. So here goes, a nice little talk that is less tech, more human, and all of it real.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "X9CTQW", "name": "Tony Drake", "avatar": null, "biography": "Tony Drake has over 25 years of experience in information security and systems administration. He has worked in roles ranging from systems design and administration to incident response, tactical intelligence, and managing pen tests. He has worked for the last 20 years in various roles in financial firms including brokerage, banking, exchange and payments in roles ranging from jack-of-all-trades \"security guy\" to tactical intelligence and malware analysis. He has worked in all aspects of Pen Testing from scoping, and planning to managing results, to incident response. In his current role he serves as lead security researcher for the Intercontinental Exchange, solving tactical security problems with creative solutions.He holds a CISSP as well as SANS certifications in Incident Response, Web Application Pen Testing, Network Pen Testing and Threat Intelligence, and OSINT.", "public_name": "Tony Drake", "guid": "6fb797e5-99fc-56f7-8eef-c4abad6e1c86", "url": "https://pretalx.com/bsidesatl-2025/speaker/X9CTQW/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/C9RBES/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/C9RBES/", "attachments": []}, {"guid": "da25df91-6b7d-5ea4-a892-9e7c3f7a0043", "code": "XJKHCS", "id": 82035, "logo": null, "date": "2025-11-15T11:30:00-05:00", "start": "11:30", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2025-82035-caring-for-our-elders-cybersecurity-awareness-for-older-adults", "url": "https://pretalx.com/bsidesatl-2025/talk/XJKHCS/", "title": "Caring for our Elders: Cybersecurity Awareness for Older Adults", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "20 minute talk", "language": "en", "abstract": "This research examines emerging cybersecurity awareness resources for older adults who are increasingly victims of financial scams and social engineering. This presentation draws from interviews with the FINRA Investor Education Foundation and the Identity Theft Resource Center (ITRC). It also presents preliminary findings from the cybersecurity awareness initiative, the Cybercare Institute, recently introduced to four organizations in New York City. The workshop teaches older adults about basic definitions in cybersecurity, cyber hygiene, and how older adults can protect their identity through the ITRC. The workshop materials developed are \u201copen source\u201d with the aim for further adoption and improved support for older victims of cybercrime.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "FKUB98", "name": "Laura", "avatar": "https://pretalx.com/media/avatars/FKUB98_1gwmoTf.webp", "biography": "Laura Sang Hee Scherling, EdD, is a director and lecturer at Columbia University. She teaches in the Tech, Policy, and Innovation concentration. Scherling is the founder of the Cyber Care Institute and co-founder of Civic Art Lab. The Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe (Bloomsbury, 2025) is her fourth book. Her previous books include Ethics in Design and Communication (Bloomsbury) , Digital Transformation in Design (transcript), and Product Design, Technology, and Social Change (Intellect). She is a contributor to Tech Policy Press. Scherling is passionate about tech ethics, and cybersecurity awareness.", "public_name": "Laura", "guid": "e8e5059e-0843-556e-8cd2-b559fa73996d", "url": "https://pretalx.com/bsidesatl-2025/speaker/FKUB98/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/XJKHCS/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/XJKHCS/", "attachments": []}, {"guid": "0beda566-d5a1-5384-bc2b-d782d8a521d6", "code": "UBWD79", "id": 81666, "logo": null, "date": "2025-11-15T13:00:00-05:00", "start": "13:00", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2025-81666-play-capture-the-flag-to-im-prove-your-abilities", "url": "https://pretalx.com/bsidesatl-2025/talk/UBWD79/", "title": "Play Capture The Flag To (Im)Prove Your Abilities", "subtitle": "", "track": "Adversaries Evolve, So Do We", "type": "50 minute talk", "language": "en", "abstract": "This talk will be an introduction to capture the flag competitions. We will cover where to find CTFs, various free and inexpensive trainings to help players improve their skills, why play CTFs, types of CTF challenges, and how CTFs can be useful in your career", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "9CYTPA", "name": "Phil Brass", "avatar": "https://pretalx.com/media/avatars/9CYTPA_vu1bC9s.webp", "biography": "Phil Brass has worked in Information Security since 1998. He has been a software engineer, penetration tester, secure code reviewer, application security tester, manager, director and vice president of consulting services.", "public_name": "Phil Brass", "guid": "fc5bc4fb-9119-59ac-a28c-a95c3d375ed4", "url": "https://pretalx.com/bsidesatl-2025/speaker/9CYTPA/"}, {"code": "3TGNMF", "name": "Marty Sells", "avatar": null, "biography": "Marty has been playing with computers since the 1980s and moved to Atlanta in 1996 to join ISS as one of the first developers on System Scanner. Since then he has worked mostly on offensive security and performing adversarial reviews of systems and software.", "public_name": "Marty Sells", "guid": "9ca40a09-2286-5347-ac9e-8889c6c80e34", "url": "https://pretalx.com/bsidesatl-2025/speaker/3TGNMF/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/UBWD79/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/UBWD79/", "attachments": []}, {"guid": "8ffa529d-312a-548b-9cd3-7a6277c4bafd", "code": "DBLJEM", "id": 82378, "logo": null, "date": "2025-11-15T14:00:00-05:00", "start": "14:00", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2025-82378-the-virtual-crack-dealer-distributing-cracking-workloads-with-proxmox", "url": "https://pretalx.com/bsidesatl-2025/talk/DBLJEM/", "title": "The Virtual Crack Dealer: Distributing Cracking Workloads with Proxmox", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "The world of at home virtualization has become increasingly fast and affordable. This talk explores how to become your own crack dealer by distributing password-cracking workloads across Proxmox with GPU passthrough. We\u2019ll explore how to set up and scale crack distribution pipelines across a virtual setup for both offensive cracking and research. Expect to dive into virtualization, hardware passthrough, cracking theory, and some automation.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "DYMC3U", "name": "Steven Peterson", "avatar": "https://pretalx.com/media/avatars/DYMC3U_rKkGCcM.webp", "biography": "Steven is a seasoned veteran of the network security space with over 20 years of experience in both offensive and defensive roles. He is a KSU alumni with a degree in Information Security and Assurance.", "public_name": "Steven Peterson", "guid": "9b4c955b-afa0-5df9-bd3a-1b4a8373cccb", "url": "https://pretalx.com/bsidesatl-2025/speaker/DYMC3U/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/DBLJEM/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/DBLJEM/", "attachments": []}, {"guid": "f55fcc13-dd3f-5355-ad07-3b352336684a", "code": "PPDA79", "id": 81934, "logo": null, "date": "2025-11-15T15:00:00-05:00", "start": "15:00", "duration": "00:50", "room": "Room 402", "slug": "bsidesatl-2025-81934-a-friendly-ai-intervention", "url": "https://pretalx.com/bsidesatl-2025/talk/PPDA79/", "title": "A Friendly AI Intervention", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "50 minute talk", "language": "en", "abstract": "LLMs and AI have taken the world by storm. Everyone wants to use AI (or at least have people thinking they are). Everyone thinks it is going to change the world.  Some say it is going to destroy humanity. Red Team talks show us how to manipulate responses for fun and profit. But what about the rest of us who just want to use it, not hack it? It is time to deflate the balloon of the hype machine and be realistic. Let's take a candid and somewhat humorous walk through what AI is, what it isn't and what the reality of this new technology is for all the rest of us..", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "X9CTQW", "name": "Tony Drake", "avatar": null, "biography": "Tony Drake has over 25 years of experience in information security and systems administration. He has worked in roles ranging from systems design and administration to incident response, tactical intelligence, and managing pen tests. He has worked for the last 20 years in various roles in financial firms including brokerage, banking, exchange and payments in roles ranging from jack-of-all-trades \"security guy\" to tactical intelligence and malware analysis. He has worked in all aspects of Pen Testing from scoping, and planning to managing results, to incident response. In his current role he serves as lead security researcher for the Intercontinental Exchange, solving tactical security problems with creative solutions.He holds a CISSP as well as SANS certifications in Incident Response, Web Application Pen Testing, Network Pen Testing and Threat Intelligence, and OSINT.", "public_name": "Tony Drake", "guid": "6fb797e5-99fc-56f7-8eef-c4abad6e1c86", "url": "https://pretalx.com/bsidesatl-2025/speaker/X9CTQW/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/PPDA79/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/PPDA79/", "attachments": []}, {"guid": "4b90e581-78df-554a-bb8c-8e234fb5c4f2", "code": "MTXEJK", "id": 81842, "logo": null, "date": "2025-11-15T16:00:00-05:00", "start": "16:00", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2025-81842-my-security-champions-are-doing-too-much-and-other-good-problems-to-have", "url": "https://pretalx.com/bsidesatl-2025/talk/MTXEJK/", "title": "My Security Champions are doing too much (and other good problems to have!)", "subtitle": "", "track": "Shared Knowledge, Shared Defense", "type": "20 minute talk", "language": "en", "abstract": "Have you ever wondered what it would really be like if your developers were also security experts? Would you be around to find out? I worked for a company that makes a SAST tool, and we had the unique arrangement where developers were responsible for SDL security practices, under the guise of calling it \"dogfooding\". I discovered that there were indeed several key areas that the security team was still needed for... but it wasn't the areas I expected. We created a Security Champions program and found that knowledge was the key to breaking down barriers between these silos. And I learned that trying to engineer myself out of a job was harder than it seemed! :D", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "NS8ZUG", "name": "Marisa Fagan", "avatar": "https://pretalx.com/media/avatars/NS8ZUG_ueQEHP2.webp", "biography": "Marisa Fagan is Head of Product at a \u201csecurity champions as a service\u201d startup called Katilyst. She works on building security into the SDLC and empowering developers to own secure code. Previously, she has worked as a security culture expert at places like Atlassian, Synopsys. Salesforce, Bugcrowd, and Facebook. Since 2024, she has been a contributor to the OWASP Security Champions Guide Project and Track Lead for the OWASP AppSecGlobal Conferences. She lives in San Francisco, CA, USA.", "public_name": "Marisa Fagan", "guid": "c6369944-e275-5006-baa6-a50f9c7de81c", "url": "https://pretalx.com/bsidesatl-2025/speaker/NS8ZUG/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/MTXEJK/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/MTXEJK/", "attachments": []}, {"guid": "c7619de7-f278-52ca-8006-a238e84e82f3", "code": "7CNSRL", "id": 82368, "logo": null, "date": "2025-11-15T16:30:00-05:00", "start": "16:30", "duration": "00:20", "room": "Room 402", "slug": "bsidesatl-2025-82368-tin-can-ai-vs-cli-catching-ai-threats-with-simple-network-forensics", "url": "https://pretalx.com/bsidesatl-2025/talk/7CNSRL/", "title": "Tin Can AI vs CLI: Catching AI Threats with Simple Network Forensics", "subtitle": "", "track": "Adversaries Evolve, So Do We", "type": "20 minute talk", "language": "en", "abstract": "Like the uncanny valley tin can voice in so many AI generated commercials and ads right now, it\u2019s the weirdness of how the AI threat lives on LAN that betrays it. It looks almost like a user; almost like a service account. Almost.\r\nWe\u2019re in a new cyber-era, the age of AI threats. In catching my first malicious AI Agent, arguably a bleeding edge threat, the simplest logs I know of\u2014ARP tables, Switch CAM tables, and packet forensics\u2014revealed the shape of the threat when tools leveraging cber intelligence failed. As Agentic AI threats become the Worm 2.0, analysis of network appliances and packets give security pros the tools to understand the shape of the threat, highlighting the weirdness that betrays AI threats.\r\nWe live in a world of IPS, EDR, NDR, Next-Gen Firewalls, even many wireless access points have signature matching and check packets against threat intelligence. That's great for known threats. But the AI threat is inherently zero-day. It\u2019s \u201cpolymorphic.\u201d The attack evolves as the AI agent explores possible threat vectors. HR doesn\u2019t do that. Accounting doesn\u2019t do that. IT staff kind of do that a little bit, but we can plan for that. The point is we know the profile, the shape of human network activity. \r\nEvolving doesn\u2019t always mean shiny and new. Don\u2019t neglect the basics. I\u2019ll demonstrate how to detect AI threat activity with the simple network switch, and similar devices.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "AMGH7N", "name": "SteveInIT", "avatar": "https://pretalx.com/media/avatars/AMGH7N_FBMd4MD.webp", "biography": "Dad, Native Plants Enthusiast, and IT Architect specialized in Network Forensics\r\n\r\nSchool:\r\n3 years studying biology. 1 year giving up to study Cisco certs and pivot.\r\n\r\nWork:\r\n5 years in the enterprise space in network engineering, 6 years in the vendor space working with Network Detection and Response technology.\r\n\r\nCerts:\r\nSome CCNAs, Part of a CCNP\r\nCompTIA A+, Net+, Sec+, CySA+\r\nAWS CCP, AWS-SAA\r\n\r\nAnd sometimes I talk about IT-Sec stuff on YouTube Channel SteveInIT", "public_name": "SteveInIT", "guid": "39c817e3-493a-5cd8-8af9-66cdea0568ca", "url": "https://pretalx.com/bsidesatl-2025/speaker/AMGH7N/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/7CNSRL/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/7CNSRL/", "attachments": []}], "Room 460": [{"guid": "49b2a878-8d81-5d19-8f63-53a1fb6c34f7", "code": "ZZF3TQ", "id": 82369, "logo": "https://pretalx.com/media/bsidesatl-2025/submissions/ZZF3TQ/Logo-11-19-2019_eBEUhQU.jpg", "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "07:30", "room": "Room 460", "slug": "bsidesatl-2025-82369-lockpicking-village", "url": "https://pretalx.com/bsidesatl-2025/talk/ZZF3TQ/", "title": "Lockpicking village", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "Atlanta LockSport would like to run a lockpicking village for BSides.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "MFEYW7", "name": "Keith Watson", "avatar": "https://pretalx.com/media/avatars/MFEYW7_GOxcIKn.webp", "biography": "Christopher Atkinson and Keith Watson founded Atlanta Locksport on October 14th, 2019. Atlanta LockSport hosts the mini lockpicking village at dc404 meetings and we have monthly club meetings.\r\n\r\nAtlanta LockSport is a collection of lockpicking enthusiasts from the Atlanta area. Lockpicking is a fun hobby, and the fundamental knowledge of locks, their operation, and selection for physical security is an essential skill for cybersecurity professionals.", "public_name": "Keith Watson", "guid": "b7805afc-02da-540b-8535-b87de2c7baaa", "url": "https://pretalx.com/bsidesatl-2025/speaker/MFEYW7/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/ZZF3TQ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/ZZF3TQ/", "attachments": []}], "Room 461": [{"guid": "e1a54201-f323-55fa-8483-3ea21f8ee4a6", "code": "8ZYCYY", "id": 81659, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "02:30", "room": "Room 461", "slug": "bsidesatl-2025-81659-empowering-digital-privacy-hands-on-workshop-for-everyone", "url": "https://pretalx.com/bsidesatl-2025/talk/8ZYCYY/", "title": "Empowering Digital Privacy: Hands-On Workshop for Everyone", "subtitle": "", "track": "Village", "type": "Half-day village", "language": "en", "abstract": "In an age where digital privacy is increasingly under threat, understanding how to protect personal information is essential for everyone, regardless of technical expertise. This interactive workshop will provide participants with a unique opportunity to engage in hands-on learning at multiple stations, each dedicated to a specific aspect of digital privacy. Attendees will receive guidance from privacy experts as they navigate the installation and use of essential tools, including privacy-focused browsers, password managers, secure messaging apps like Signal, and operating systems such as Tails and TOR.\r\n\r\nThe workshop is designed to cater to a diverse audience, from beginners to seasoned tech enthusiasts. Each station will offer step-by-step instructions and personalized support, ensuring that participants leave with practical skills and a deeper understanding of digital privacy. By fostering a collaborative environment, we aim to empower individuals to take control of their online presence and enhance their security in an increasingly interconnected world. Join us to learn, share, and build a community committed to safeguarding digital privacy for all.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "VSLX9U", "name": "Xavier Ashe", "avatar": "https://pretalx.com/media/avatars/VSLX9U_Qp4iDtf.webp", "biography": "Xavier Ashe has been hacking since the late 80s and been working in information security since the early 90s.  He is currently a Senior Vice President at Truist and a Georgia Institute of Technology alumnus.  Xavier has over 30 years of leadership experience in information security, working for various firms including IBM, Gartner, and Carbon Black.  Xavier was the first hire at the startup, Drawbridge Networks, where he was instrumental in bringing the first microsegmentation solution for servers and workstations to market.  Mr. Ashe has plenty of war stories, including the first DDOS attack ever, Target, Sony, Aramco, NotPetya, and others.  Xavier is an accomplished speaker and has presented at many security conferences including DefCon, BlackHat, RSA, BSides, Splunk .conf, SANS, and others.", "public_name": "Xavier Ashe", "guid": "e6456c5e-156f-5bc9-8f3e-1a2ee8e12da2", "url": "https://pretalx.com/bsidesatl-2025/speaker/VSLX9U/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/8ZYCYY/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/8ZYCYY/", "attachments": []}, {"guid": "f2df59d3-48f4-5c8c-84b0-f6966ca75d4a", "code": "3CTJPM", "id": 81957, "logo": null, "date": "2025-11-15T13:00:00-05:00", "start": "13:00", "duration": "04:00", "room": "Room 461", "slug": "bsidesatl-2025-81957-resume-workshop-for-aspiring-it-and-is-professionals", "url": "https://pretalx.com/bsidesatl-2025/talk/3CTJPM/", "title": "Resume Workshop for Aspiring IT and IS Professionals", "subtitle": "", "track": "Village", "type": "Half-day village", "language": "en", "abstract": "Join Jason Maddox, Director of IT and Chief Information Security Officer, for an interactive afternoon workshop designed to help senior college students, recent graduates (0-2 years of experience), and early-career professionals (3-5 years of experience) build standout resumes for information technology and information security roles. This hands-on session focuses on your resume. He will help you highlight technical skills, certifications, and relevant projects. Participants will receive personalized feedback to refine their resumes and learn how to communicate their talents on paper. Attendees are required to bring their own printed resumes. A printer will not be provided.", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "JSUYAK", "name": "Jason Maddox", "avatar": null, "biography": null, "public_name": "Jason Maddox", "guid": "b0a1505c-916f-531d-8ca6-4b71f55d3bb4", "url": "https://pretalx.com/bsidesatl-2025/speaker/JSUYAK/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/3CTJPM/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/3CTJPM/", "attachments": []}], "Room 462": [{"guid": "3c1f45a8-bbc1-5966-a14a-0d8a85b4c158", "code": "EAD7MQ", "id": 82251, "logo": "https://pretalx.com/media/bsidesatl-2025/submissions/EAD7MQ/BsidesGreenvilleScore_72Rub4a.png", "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "07:30", "room": "Room 462", "slug": "bsidesatl-2025-82251-dc864-ctf", "url": "https://pretalx.com/bsidesatl-2025/talk/EAD7MQ/", "title": "DC864 - CTF", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "The DC864 group created a CTF for Bsides Greenville for a third year and this year with over 60 challenges with a maximum of 600+ points. The CTF challenges vary from lock picking, jeopardy style questions, system challenge chains with multiple exploits/challenges, docker challenges, and webapp/api challenges. We would like to bring this CTF to another Bsides. \r\n\r\nCTF website: https://ctf.dc864.org/", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "EWC8SV", "name": "Nick", "avatar": null, "biography": "Lead penetration tester part of the DC864 CTF team. There would be several of us supporting the CTF.", "public_name": "Nick", "guid": "f2a62681-cfa0-5ea4-a9d8-0e1dde480700", "url": "https://pretalx.com/bsidesatl-2025/speaker/EWC8SV/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/EAD7MQ/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/EAD7MQ/", "attachments": []}], "Room 464": [{"guid": "e7ff691c-0051-5a0e-818a-32b3448b36b9", "code": "MGNZYM", "id": 81660, "logo": null, "date": "2025-11-15T09:30:00-05:00", "start": "09:30", "duration": "07:30", "room": "Room 464", "slug": "bsidesatl-2025-81660-network-king-of-the-hill-ctf", "url": "https://pretalx.com/bsidesatl-2025/talk/MGNZYM/", "title": "Network King of the Hill CTF", "subtitle": "", "track": "Village", "type": "Full-day Village", "language": "en", "abstract": "NetKotH CTF", "description": null, "recording_license": "", "do_not_record": false, "persons": [{"code": "PB8BZK", "name": "Nick Kammerdiener", "avatar": "https://pretalx.com/media/avatars/PB8BZK_G8mKvbo.webp", "biography": null, "public_name": "Nick Kammerdiener", "guid": "9a7645ce-2a47-5fd4-8b39-7002a7ddbfee", "url": "https://pretalx.com/bsidesatl-2025/speaker/PB8BZK/"}], "links": [], "feedback_url": "https://pretalx.com/bsidesatl-2025/talk/MGNZYM/feedback/", "origin_url": "https://pretalx.com/bsidesatl-2025/talk/MGNZYM/", "attachments": []}]}}]}}}