42:51 BG - Turning (Page) Tables - Bypassing Advanced Kernel Mitigations Using Page Tables Manipulations BSidesLV
33:48 CG - How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises - Chris Kubecka BSidesLV
24:42 PG - Bypassing Antivirus Engines using Open Sourced Malleable C2 Software, MSFVenom, Powershell and BSidesLV
29:37 HG - The Long Way Around – from Software Engineering to Cyber Security (How Choosing Wrong Turned ou BSidesLV
42:57 G1234! - The Effect of Constraints on the Number of Viable Permutations of Passwords - Randy Abrams BSidesLV
50:04 GT - Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification BSidesLV
55:35 IATC - Engaging Policymakers at the State Level - Maurice Turner, Joe Hall & David Forsey BSidesLV
32:15 HG - Community Career Panel or How to Get More than a T-Shirt Working at a Con - Cindy Jones BSidesLV
29:19 CG - Who Maed Dis; A Beginners Guide to Malware Provenance Based on Compiler Type - Lucien Brule BSidesLV
46:06 GT - Another One Bites the Dust: Failed Experiments in Infrastructure Security Analytics and Lessons BSidesLV
50:48 G1234! - Deploying WebAuthn at Dropbox Scale: Second Factor and Beyond - Brad Girardeau BSidesLV
23:36 PG - Incorporating Human Intelligence (HUMINT) into An Information Security Team - Aamil Karimi BSidesLV
50:58 IATC - Engaging the Media: Telling Your Story - Steve Ragan, Sean Gallagher & Paul Wagensell BSidesLV
28:40 IATC - Transforming Industries for Fun and Safety (Presentation) - Beau Woods & David Rogers BSidesLV
56:35 IATC - CVE CVSS NVD OMGWTFBBQ - Tom Millar, Katie Trimble, Art Manion, Seth Carmody & Josh Corman BSidesLV
55:04 IATC - A Good Day to Die? IoT End of Life - Jessica Wilkerson, Allan Friedman, Karl Grindal, Karim BSidesLV
21:38 GT - Looking For the Perfect Signature: An Automatic YARA Rules Generation Algorithm in the AI-Era BSidesLV
24:52 PG - Vulnerability Management 101: Practical Experience and Recommendations - Eric Bryan BSidesLV
52:50 GT - Hackademia: The 2018 Literature Review - Falcon Darkstar Momot & Brittany "Straithe" Postnikoff BSidesLV
52:55 IATC - Cyber Safety Disclosure - Nina Alli, Suzanne Schwartz, Jay Radcliffe & Joshua Corman BSidesLV
57:09 GT - Catch me, Yes we can! -Pwning Social Engineers using Natural Language Processing Techniques in BSidesLV
52:29 BG - Overlooked Tactics for Attacking Hardened Active Directory Environment - Hao Wang, Yothin Rodan BSidesLV
56:29 IATC - Engaging the Media: Know Your Target - Jen "Cat Herder" Ellis, Joseph Cox, Sean Gallagher, St BSidesLV
42:13 GF - Who Watches the Watchers?: Understanding the Internet's Background Noise - Curt Barnard BSidesLV
35:36 CG - Solving for Somebody Else's Problem: Hacking Devs for Better Security - Sarah Gibson BSidesLV
19:25 PG - Treble or Trouble: Where Android's Latest Security Enhancements Help And Where They Fail - Tami BSidesLV
59:52 CG - Who Wants to Be A Regulator: The IoT Security Game Show - Allan Friedman, Jen Ellis, Wendy Knox BSidesLV
51:03 GT - Arbitrary Albatross: Neutral Names for Vulnerabilities at Volume - Art Manion & Leigh Metcalf BSidesLV
51:38 IATC - Hacking the Public Policy API - Travis Moore, Maurice Turner & Jessica WIlkerson BSidesLV
23:34 BG - Tuning The Warp Drive with Laforge: New Tool for Building Security Competitions - Alex Levinson BSidesLV
29:45 IATC - Transforming Industries for Fun and Safety (Panel) - Pete Cooper, Matthew Vaughan & Jeff Troy BSidesLV
43:12 GT - Tracking Malicious Logon: Visualize and Analyze Active Directory Event Logs - Shusei Tomonaga BSidesLV
52:53 KEYNOTE - Something Wicked: Defensible Social Architecture in the context... - Allison Miller BSidesLV
47:25 CG - DefCon DarkNet Badge Hardware And Software: An Introduction To Custom Badge Building - Edward A BSidesLV
52:34 G1234! - Protecting Windows Credentials: An Excessive Guide for Security Professionals - Mark Burnet BSidesLV
26:49 HG - Recruiter Smack Down (Panel) - Jennifer Kyle, Steve Levy, Pete Radloff & Kris Rides BSidesLV
25:18 CG - Hacking the Law: A Call for Action – Bug Bounties Legal Terms as a Case Study - Amit Elazari BSidesLV
1:00:45 Ingress Egress: The emerging threats posed by augmented reality gaming - Andrew Brandt BSidesLV
23:42 PG - Applied OSINT: Enabling Better Social Engineering for Better Pen Tests - Joe Gray BSidesLV
40:01 CG - Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations - TBD BSidesLV