Presentations
Presentation and speaker details for BSidesSATX 2019 speaking tracks. See here for a visual schedule.
in the weeds (UC Conference Room A)
09:00 - Convergence: An Analytical Deep Dive into Foreign Intelligence Activity in US Based Critical Infrastructure - David Evenden
Abstract:
A technical overview of foreign intelligence activity in US Based Critical Infrastructure using DHS ECS/E3A threat intelligence and MITRE’s ATT&CK framework.
Speaker Bio:
David Evenden is an experienced offensive security operator/analyst with 12 years of active work experience inside the Intelligence Community (IC). During his time inside the IC, he learned Persian Farsi, worked at NSA Red Team and was a member of an elite international team operating in conjunction with coalition forces to aid in the ongoing efforts in the Middle East.
He currently works with an ISP and DHS to aid in the efforts to enhance the bidirectional sharing relationship between the US Government and Commercial entities, as well as track foreign intelligence activity in US Based Critical Infrastructure.
10:00 - Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention - Jordan Wright
Abstract:
As organizations shift to cloud-storage platforms such as Elasticsearch and MongoDB to store data, we've also seen a rise in massive data leaks as a result of these databases being mistakenly misconfigured and exposed publicly.
If you've ever wondered how researchers discover and report these databases, this talk is for you! In this talk, we'll live-code a system that searches data sources like Shodan to discover public databases, triage them, and report them to their owners. Finally we'll talk about how to set up and configure these databases to prevent data leaks and protect your organization.
Speaker Bio:
Jordan Wright is a lead research engineer on the Duo Labs team at Duo Security. He has experience on both the offensive and defensive side of infosec, and enjoys contributing to open-source software as well as performing security research.
11:00 - When Refrigerators attack! Defending yourself against rogue appliances - Kat Fitzgerald
Abstract:
IoT is in the press almost daily. This talk presents 3 abstracts with live examples of weaponizing, defending and securing IoT devices. Relive my encounters of: "When Refrigerators Attack" or "How I beat back the Deadly Dishwasher". And of course, the all time favorite, "Killer Webcams from Outer Space!"
Seriously, why do we treat IoT any differently than a rogue Windows XP host or an unknown new virus on a laptop brought in by an employee? If a missile is pointed at my castle, and the enemy changes to having 500 smaller missiles, shouldn’t my defenses be able to handle these attacks? I will show various devices that have been weaponized and how to detect and defend (and in the process show possible ways they might have become weaponized).
And before you ask, yes, some dishwashers were harmed in the researching of this talk.
Speaker Bio:
My background goes back 30+ years, mostly under the radar, but let’s just say I am a “Purple” Kat. I took my parents stereo apart at the age of 7 to find out where the music came from. I am based in Pittsburgh and a natural creature of winter, you can typically find me sipping Gran Mayan Anejo whilst simultaneously defending my systems using OSS, magic spells and Dancing Flamingos against a barrage of attackers, and I have honeypots all over the world.
13:00 - The Hunter Games: How to find the adversary with EQL - Ross Wolf
Abstract:
How do you find malicious activity? We often resort to the cliche, “you know it when you see it”, but how do you even “see it”, without drowning in data? MITRE’s ATT&CK organizes adversary behavior and orients our approach to telemetry. With the Event Query Language (EQL), a security analyst can naturally express queries for IOC search, hunting, and behavioral detections, while remaining platform and data source agnostic.
In this talk, I will demonstrate the iterative process of establishing situational awareness, creating targeted detections, and hunting for the adversary in your environment with real data, queries, and results.
Speaker Bio:
Ross Wolf is a researcher at Endgame where he creates solutions to simplify detecting adversarial behavior in endpoint data. Prior to Endgame, Ross was an engineer at MITRE where he led projects that automated blue team processes by creating graphs of process activity and grouping related alerts. He was recently co-granted a patent for CALDERA, a project which automated post-compromise adversary emulation. Ross also contributed to ATT&CK and the Cyber Analytics Repository.
14:00 - There's no place like 169.254.169.254 - Ab(using) cloud metadata URLs - Brennon Thomas
Abstract:
Most Information Technology professionals are familiar with the IP addresses 127.0.0.1, but what about 169.254.169.254? Cloud computing providers like Amazon Web Services and Microsoft Azure provide the URL of http://169.254.169.254 to query for instance metadata. This talk first explores how the metadata URLs are supposed to be used and the type of data they contain. It then explores how they can be abused by misconfigured servers to expose sensitive data. Research and data about a specific attack vector is presented for the major cloud providers. Mitigation strategies are provided to protect assets and systems in these cloud environments.
Speaker Bio:
Brennon works as a Vulnerability Analyst and Penetration Tester for Rackspace identifying and reducing risks and threats to Rackspace's computer networks. Prior to Rackspace, Brennon worked for the Air Force, in both active duty and civilian roles, and for the private sector.
He is the author of the "The Cyber Plumber's Handbook", the definitive guide to SSH tunneling, which is free for students. He dabbles in bug bounties as part of the Synack Red Team and is developing a phishing prevention platform called PhishBarrel.
15:00 - GAN & Gone, manipulation of the masses for political and social gains - Logan Hicks
Abstract:
Usage of automations, big data, data analytics, social engineering, PsyOps, strife, and aggressive debate tactics to shift political and social views in a desired direction.
Speaker Bio:
Systems, Security, Cloud, Storage, Compliance Architect. Full stack developer. Instructor. Engineer. Pirate. Ninja. Non-Profiteer. Mad scientist with crazy awesome projects.
Professional Bear Poker.
16:00 - Breaking and Entering with SDR: Hacking Physical Access Control Systems and Garage Door Openers, or How I Beat Up Wiegand Over VHF/UHF - Tim Shelton
Abstract:
Opening building doors and garages, cloning key fobs and speaking the PPM/Wiegand language
Speaker Bio:
(alias redsand) Infosec researcher and big data nut. Level 2 Grave Cleric.
Abstract:
A technical overview of foreign intelligence activity in US Based Critical Infrastructure using DHS ECS/E3A threat intelligence and MITRE’s ATT&CK framework.
Speaker Bio:
David Evenden is an experienced offensive security operator/analyst with 12 years of active work experience inside the Intelligence Community (IC). During his time inside the IC, he learned Persian Farsi, worked at NSA Red Team and was a member of an elite international team operating in conjunction with coalition forces to aid in the ongoing efforts in the Middle East.
He currently works with an ISP and DHS to aid in the efforts to enhance the bidirectional sharing relationship between the US Government and Commercial entities, as well as track foreign intelligence activity in US Based Critical Infrastructure.
10:00 - Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention - Jordan Wright
Abstract:
As organizations shift to cloud-storage platforms such as Elasticsearch and MongoDB to store data, we've also seen a rise in massive data leaks as a result of these databases being mistakenly misconfigured and exposed publicly.
If you've ever wondered how researchers discover and report these databases, this talk is for you! In this talk, we'll live-code a system that searches data sources like Shodan to discover public databases, triage them, and report them to their owners. Finally we'll talk about how to set up and configure these databases to prevent data leaks and protect your organization.
Speaker Bio:
Jordan Wright is a lead research engineer on the Duo Labs team at Duo Security. He has experience on both the offensive and defensive side of infosec, and enjoys contributing to open-source software as well as performing security research.
11:00 - When Refrigerators attack! Defending yourself against rogue appliances - Kat Fitzgerald
Abstract:
IoT is in the press almost daily. This talk presents 3 abstracts with live examples of weaponizing, defending and securing IoT devices. Relive my encounters of: "When Refrigerators Attack" or "How I beat back the Deadly Dishwasher". And of course, the all time favorite, "Killer Webcams from Outer Space!"
Seriously, why do we treat IoT any differently than a rogue Windows XP host or an unknown new virus on a laptop brought in by an employee? If a missile is pointed at my castle, and the enemy changes to having 500 smaller missiles, shouldn’t my defenses be able to handle these attacks? I will show various devices that have been weaponized and how to detect and defend (and in the process show possible ways they might have become weaponized).
And before you ask, yes, some dishwashers were harmed in the researching of this talk.
Speaker Bio:
My background goes back 30+ years, mostly under the radar, but let’s just say I am a “Purple” Kat. I took my parents stereo apart at the age of 7 to find out where the music came from. I am based in Pittsburgh and a natural creature of winter, you can typically find me sipping Gran Mayan Anejo whilst simultaneously defending my systems using OSS, magic spells and Dancing Flamingos against a barrage of attackers, and I have honeypots all over the world.
13:00 - The Hunter Games: How to find the adversary with EQL - Ross Wolf
Abstract:
How do you find malicious activity? We often resort to the cliche, “you know it when you see it”, but how do you even “see it”, without drowning in data? MITRE’s ATT&CK organizes adversary behavior and orients our approach to telemetry. With the Event Query Language (EQL), a security analyst can naturally express queries for IOC search, hunting, and behavioral detections, while remaining platform and data source agnostic.
In this talk, I will demonstrate the iterative process of establishing situational awareness, creating targeted detections, and hunting for the adversary in your environment with real data, queries, and results.
Speaker Bio:
Ross Wolf is a researcher at Endgame where he creates solutions to simplify detecting adversarial behavior in endpoint data. Prior to Endgame, Ross was an engineer at MITRE where he led projects that automated blue team processes by creating graphs of process activity and grouping related alerts. He was recently co-granted a patent for CALDERA, a project which automated post-compromise adversary emulation. Ross also contributed to ATT&CK and the Cyber Analytics Repository.
14:00 - There's no place like 169.254.169.254 - Ab(using) cloud metadata URLs - Brennon Thomas
Abstract:
Most Information Technology professionals are familiar with the IP addresses 127.0.0.1, but what about 169.254.169.254? Cloud computing providers like Amazon Web Services and Microsoft Azure provide the URL of http://169.254.169.254 to query for instance metadata. This talk first explores how the metadata URLs are supposed to be used and the type of data they contain. It then explores how they can be abused by misconfigured servers to expose sensitive data. Research and data about a specific attack vector is presented for the major cloud providers. Mitigation strategies are provided to protect assets and systems in these cloud environments.
Speaker Bio:
Brennon works as a Vulnerability Analyst and Penetration Tester for Rackspace identifying and reducing risks and threats to Rackspace's computer networks. Prior to Rackspace, Brennon worked for the Air Force, in both active duty and civilian roles, and for the private sector.
He is the author of the "The Cyber Plumber's Handbook", the definitive guide to SSH tunneling, which is free for students. He dabbles in bug bounties as part of the Synack Red Team and is developing a phishing prevention platform called PhishBarrel.
15:00 - GAN & Gone, manipulation of the masses for political and social gains - Logan Hicks
Abstract:
Usage of automations, big data, data analytics, social engineering, PsyOps, strife, and aggressive debate tactics to shift political and social views in a desired direction.
Speaker Bio:
Systems, Security, Cloud, Storage, Compliance Architect. Full stack developer. Instructor. Engineer. Pirate. Ninja. Non-Profiteer. Mad scientist with crazy awesome projects.
Professional Bear Poker.
16:00 - Breaking and Entering with SDR: Hacking Physical Access Control Systems and Garage Door Openers, or How I Beat Up Wiegand Over VHF/UHF - Tim Shelton
Abstract:
Opening building doors and garages, cloning key fobs and speaking the PPM/Wiegand language
Speaker Bio:
(alias redsand) Infosec researcher and big data nut. Level 2 Grave Cleric.
in the beginning (Moody 102)
09:00 - Booting a PDP-11/70 from Virtual Papertape - Paul Guido
Abstract:
An investigation into the history of obsolete computer technology can educate everyone on how we use computers today.
Speaker Bio:
In 1979, my older cousin let me play Super Star Trek on a computer terminal. I was mesmerized, not by the game, by the technology that made the game work. So I started looking into computers and the exploration continues to this day.
09:30 - Creating an off the shelf implantable computer - doug "c00p3r" copeland
Abstract:
Fast prototyping an implantable computer from off the shelf parts, there are two phases to this project phase 1 is making a fast prototype from off the shelf parts, and implanting it into a host, this is meant to be a proof of concept for the implantable computer which is able to sniff wifi, bluetooth, and nfc from within the human body... allow the hacker to remote into the computer/host and gather information from a possible distributed array of people involved in the test. phase 2 is to take what is learned and create a custom pcb with all that has been learned from the original design and to create a smaller more compact form factor for the design... currently me and my team are in 5th official revision of phase 1 of this project... unofficially more like the 20th revision. The purpose of the talk is to do more then get up and say i built this thing and it does this, but instead to have a conversation about the process of fast proto-typing and to encourage others that may or may not have an idea to try building something themselves, and create their own DIY evolution!
Speaker Bio:
c00p3r has a background in varied tech support and security roles which have provided him experience in Linux, Mac and Windows environments. His own entry to the ‘cyborg’ Biohacker culture has been by augmenting his body with both NFC and RFID chips through ‘Dangerous Things’ products which were available at the BdyHaxCon in Austin, TX. His curiosity about the technology has led him to found the Dangerous Minds Podcast which has become a vehicle to dig deeper into the subjects of biohacking, grinding, implantable technology, locksport, and network security by interviewing leaders in these fields and learning from their experience, for more information about this go to www.dangerousminds.io . Since DMP’s founding c00p3r has gone on to partner with dangerous things and vivokey to help promote the technology and assist people in acquiring new upgrades for their own grind.
10:00 - How To Train Your Customers: Changing the Course of Support - Brandon Bruce & Ell Marquez
Abstract:
Every support team has their horror stories, but what if there was a way to engage your base more effectively? What if you could teach them how to collect data for you, raise informed concerns and boast about your team’s efforts? Come learn about methods for converting customers into true believers.
Speaker Bio:
Brandon Bruce is the Customer Support Manager for Linux Academy. Starting as a Linux System Administrator, he has also been a part of the Rackspace Private Cloud team, constructing OpenStack environments.
Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to an OpenStack technical trainer at Rackspace. Recently, she took the leap to join Linux Academy/ Jupiter Broadcasting to help them grow and mentor their communities.
10:30 - Audit Compliance != Secure - Victoria St John
Abstract:
Talking about breaches that have occurred for companies that passed compliance. Offering key points when improving security before a 3rd party certifies company compliance.
Speaker Bio:
UTSA Master's program student with a passion for privacy law and compliance. Actively working on HackTheBox and Raspberry Pi projects
11:00 - Intro to Reverse Engineering with Ghidra: Taming the Dragon - Christopher Doege
Abstract:
The advent of Ghidra has lowered the bar in terms of price and skill gap for getting involved in software reverse engineering. In this talk I’d like to discuss the features and extensibility of ghidra and how it can be used to solve challenges in the real world as well as for competitions.
Speaker Bio:
Avid CTF goer and software engineer focused on cyber security.
13:00 - Game Theory For Hackers - Lindsay Von Tish
Abstract:
In this presentation we will discuss game theory and its applications to cyber security. Game theory is the study of choices and strategy made by rational actors in competitive situations. Game theory has been used to model war, biology, and even football. In this talk I will demonstrate game theory concepts and show how game theory can be used to model and predict conflict in cyber security through a variety of examples.
We will start with demonstrations of basic game theory concepts using willing (or unwilling if necessary) participants from the audience. Volunteers will play common game theory games, such as prisoner’s dilemma, and I will explain the math behind the choices made. From there, we will build on those concepts by applying them to real world examples from the technical side such as network monitoring and threat hunting as well as use of resources and deterrence from the policy side. With this talk I hope to engage the audience and demonstrate the basics of game theory in a novel and exciting way while proving that game theory can be applied to many aspects of cybersecurity.
Speaker Bio:
Lindsay Von Tish is a recent college graduate from Anchorage, Alaska. While in college she studied computer science and economics and got her start in hacking by competing in CTFs. In her time in the industry she has gained experience in red teaming, risk management, and digital forensics. Since moving to Dallas, Lindsay has become an active member of the Dallas Hacker’s Association. When she is not programming or hacking, Lindsay spends her free time breathing fire and playing violin.
14:00 - #1LinuxThingADay: Everyday Linux Use Cases - Roxy Dee
Abstract:
Have you ever wondered what exactly you would do with Linux? After discovering that she doesn't enjoy writing in a journal daily, Roxy decided to take 2 weeks to write about what she loves: Linux. The result was 16 examples of specific commands and their use cases all on the command line. Watch live demos covering topics such as user management, manipulating files, and fun ways to accomplish common system administration tasks.
Speaker Bio:
Roxy works as a Vulnerability Management Service Architect for the Cleveland-based, Splunk-focused MSSP Hurricane Labs. Her position at Hurricane allows her to further explore, expand, and share perspectives about one of her favorite topics — vulnerability management.
Her background also includes experiences as a network security analyst, a security infrastructure engineer, and detecting online banking fraud. Some of her favorite things are Linux, penguins, RFCs, and discussing anything infosec.
15:00 - Real-world attacks against Rackspace - Rodney Beede
Abstract:
A review of real-world attacks we see every week at Rackspace against us or our customers. Examples include phishing, DDoS amplification, credential brute force attacks, fraud for crypto-mining or spam campaigning.
Also some of the vulnerability testing we perform on ourselves (red teaming missions).
Speaker Bio:
Rodney Beede is a Cyber Vulnerability Analyst & Penetration Tester for Rackspace Global Enterprise Security.
M.S. in Computer Science
− University of Colorado at Boulder
− "A Framework for Benevolent Computer Worms" 2012
Security Work
- CVE-2019-8346 - XSS in ManageEngine ADSelfService Plus param adscsrf
- CVE-2019-5615 - Rapid7 insightVM (nexpose) also exposes clear-text password for backups and keystore (chased vendor to add clear-text disclosure, original work for admin-hashes by another)
- Slack vulnerability (#496095) where any third party add-on can post to annoucements-only channel
- OSCP - March 2019
- "Unattended, Unlocked, Unprotected Terminals - User Security Training with USB Rubber Ducky" - https://developer.rackspace.com/blog/unattended-unlocked-unprotected-terminals-user-security-training/; August 21, 2018
- "Making App Password Changes Easier" - https://developer.rackspace.com/blog/making-app-password-changes-easier/; August 6, 2018
- BSides San Antonio 2018 - CTF winning team
- "Cloud API Service Accounts and Managing a Jungle of Credentials" - InnoTech Oklahoma; October 5, 2017
− "Single Sign-On Watering Hole" vuln. presentation at BSidesOK 2017
− "Shadow IT In The Cloud" - Oklahoma Retailers InfoSec Forum, 2016
− "Case Study: Seagate's Amazon AWS Cloud Security" – InnoTech & IWS9, 2016
− Discovered CVE-2015-8503 XSS in Tenable SecurityCenter; 2016
− Discovered data disclosure vuln in Google Spreadsheets; 2015
− "Case Study: Seagate's OpenStack Swift Security" – InnoTech 2015; CSA&IAPP 2014
− Authored chapter "Object Storage" in the OpenStack Security Guide
− Discovered CVE-2013-3627: McAfee Agent v4.6 Denial of Service
− AppSec USA (OWASP) - CTF winning team – 2012 & 2013
16:00 - Confessions of a Recovering Linux Admin - Ell Marquez & Allie Barnes
Abstract:
Many of us in the technical community have heard the saying RTFM (Read The [Friendly] Manual) as advice given to someone learning Linux. In Confessions of a Sysadmin, Ell Marquez will share a practical approach to learning to navigate the command line along with some of the secrets she has learned along the way.
Speaker Bio:
Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to an OpenStack technical trainer at Rackspace. Recently, she took the leap to join Jupiter Broadcasting & Linux Academy as a Community Architect.
Allie Barnes has been in the Linux community since 2011, jump-starting her IT career as a Linux Administrator at Rackspace and utilizing mentorships and community knowledge to eventually navigate into the OpenStack world, working on Red Hat’s OpenStack Product. Allie is learning to take the leap into the community by participating in more talks and community events in hopes of spreading knowledge and love of Linux and Open Source in general!
Abstract:
An investigation into the history of obsolete computer technology can educate everyone on how we use computers today.
Speaker Bio:
In 1979, my older cousin let me play Super Star Trek on a computer terminal. I was mesmerized, not by the game, by the technology that made the game work. So I started looking into computers and the exploration continues to this day.
09:30 - Creating an off the shelf implantable computer - doug "c00p3r" copeland
Abstract:
Fast prototyping an implantable computer from off the shelf parts, there are two phases to this project phase 1 is making a fast prototype from off the shelf parts, and implanting it into a host, this is meant to be a proof of concept for the implantable computer which is able to sniff wifi, bluetooth, and nfc from within the human body... allow the hacker to remote into the computer/host and gather information from a possible distributed array of people involved in the test. phase 2 is to take what is learned and create a custom pcb with all that has been learned from the original design and to create a smaller more compact form factor for the design... currently me and my team are in 5th official revision of phase 1 of this project... unofficially more like the 20th revision. The purpose of the talk is to do more then get up and say i built this thing and it does this, but instead to have a conversation about the process of fast proto-typing and to encourage others that may or may not have an idea to try building something themselves, and create their own DIY evolution!
Speaker Bio:
c00p3r has a background in varied tech support and security roles which have provided him experience in Linux, Mac and Windows environments. His own entry to the ‘cyborg’ Biohacker culture has been by augmenting his body with both NFC and RFID chips through ‘Dangerous Things’ products which were available at the BdyHaxCon in Austin, TX. His curiosity about the technology has led him to found the Dangerous Minds Podcast which has become a vehicle to dig deeper into the subjects of biohacking, grinding, implantable technology, locksport, and network security by interviewing leaders in these fields and learning from their experience, for more information about this go to www.dangerousminds.io . Since DMP’s founding c00p3r has gone on to partner with dangerous things and vivokey to help promote the technology and assist people in acquiring new upgrades for their own grind.
10:00 - How To Train Your Customers: Changing the Course of Support - Brandon Bruce & Ell Marquez
Abstract:
Every support team has their horror stories, but what if there was a way to engage your base more effectively? What if you could teach them how to collect data for you, raise informed concerns and boast about your team’s efforts? Come learn about methods for converting customers into true believers.
Speaker Bio:
Brandon Bruce is the Customer Support Manager for Linux Academy. Starting as a Linux System Administrator, he has also been a part of the Rackspace Private Cloud team, constructing OpenStack environments.
Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to an OpenStack technical trainer at Rackspace. Recently, she took the leap to join Linux Academy/ Jupiter Broadcasting to help them grow and mentor their communities.
10:30 - Audit Compliance != Secure - Victoria St John
Abstract:
Talking about breaches that have occurred for companies that passed compliance. Offering key points when improving security before a 3rd party certifies company compliance.
Speaker Bio:
UTSA Master's program student with a passion for privacy law and compliance. Actively working on HackTheBox and Raspberry Pi projects
11:00 - Intro to Reverse Engineering with Ghidra: Taming the Dragon - Christopher Doege
Abstract:
The advent of Ghidra has lowered the bar in terms of price and skill gap for getting involved in software reverse engineering. In this talk I’d like to discuss the features and extensibility of ghidra and how it can be used to solve challenges in the real world as well as for competitions.
Speaker Bio:
Avid CTF goer and software engineer focused on cyber security.
13:00 - Game Theory For Hackers - Lindsay Von Tish
Abstract:
In this presentation we will discuss game theory and its applications to cyber security. Game theory is the study of choices and strategy made by rational actors in competitive situations. Game theory has been used to model war, biology, and even football. In this talk I will demonstrate game theory concepts and show how game theory can be used to model and predict conflict in cyber security through a variety of examples.
We will start with demonstrations of basic game theory concepts using willing (or unwilling if necessary) participants from the audience. Volunteers will play common game theory games, such as prisoner’s dilemma, and I will explain the math behind the choices made. From there, we will build on those concepts by applying them to real world examples from the technical side such as network monitoring and threat hunting as well as use of resources and deterrence from the policy side. With this talk I hope to engage the audience and demonstrate the basics of game theory in a novel and exciting way while proving that game theory can be applied to many aspects of cybersecurity.
Speaker Bio:
Lindsay Von Tish is a recent college graduate from Anchorage, Alaska. While in college she studied computer science and economics and got her start in hacking by competing in CTFs. In her time in the industry she has gained experience in red teaming, risk management, and digital forensics. Since moving to Dallas, Lindsay has become an active member of the Dallas Hacker’s Association. When she is not programming or hacking, Lindsay spends her free time breathing fire and playing violin.
14:00 - #1LinuxThingADay: Everyday Linux Use Cases - Roxy Dee
Abstract:
Have you ever wondered what exactly you would do with Linux? After discovering that she doesn't enjoy writing in a journal daily, Roxy decided to take 2 weeks to write about what she loves: Linux. The result was 16 examples of specific commands and their use cases all on the command line. Watch live demos covering topics such as user management, manipulating files, and fun ways to accomplish common system administration tasks.
Speaker Bio:
Roxy works as a Vulnerability Management Service Architect for the Cleveland-based, Splunk-focused MSSP Hurricane Labs. Her position at Hurricane allows her to further explore, expand, and share perspectives about one of her favorite topics — vulnerability management.
Her background also includes experiences as a network security analyst, a security infrastructure engineer, and detecting online banking fraud. Some of her favorite things are Linux, penguins, RFCs, and discussing anything infosec.
15:00 - Real-world attacks against Rackspace - Rodney Beede
Abstract:
A review of real-world attacks we see every week at Rackspace against us or our customers. Examples include phishing, DDoS amplification, credential brute force attacks, fraud for crypto-mining or spam campaigning.
Also some of the vulnerability testing we perform on ourselves (red teaming missions).
Speaker Bio:
Rodney Beede is a Cyber Vulnerability Analyst & Penetration Tester for Rackspace Global Enterprise Security.
M.S. in Computer Science
− University of Colorado at Boulder
− "A Framework for Benevolent Computer Worms" 2012
Security Work
- CVE-2019-8346 - XSS in ManageEngine ADSelfService Plus param adscsrf
- CVE-2019-5615 - Rapid7 insightVM (nexpose) also exposes clear-text password for backups and keystore (chased vendor to add clear-text disclosure, original work for admin-hashes by another)
- Slack vulnerability (#496095) where any third party add-on can post to annoucements-only channel
- OSCP - March 2019
- "Unattended, Unlocked, Unprotected Terminals - User Security Training with USB Rubber Ducky" - https://developer.rackspace.com/blog/unattended-unlocked-unprotected-terminals-user-security-training/; August 21, 2018
- "Making App Password Changes Easier" - https://developer.rackspace.com/blog/making-app-password-changes-easier/; August 6, 2018
- BSides San Antonio 2018 - CTF winning team
- "Cloud API Service Accounts and Managing a Jungle of Credentials" - InnoTech Oklahoma; October 5, 2017
− "Single Sign-On Watering Hole" vuln. presentation at BSidesOK 2017
− "Shadow IT In The Cloud" - Oklahoma Retailers InfoSec Forum, 2016
− "Case Study: Seagate's Amazon AWS Cloud Security" – InnoTech & IWS9, 2016
− Discovered CVE-2015-8503 XSS in Tenable SecurityCenter; 2016
− Discovered data disclosure vuln in Google Spreadsheets; 2015
− "Case Study: Seagate's OpenStack Swift Security" – InnoTech 2015; CSA&IAPP 2014
− Authored chapter "Object Storage" in the OpenStack Security Guide
− Discovered CVE-2013-3627: McAfee Agent v4.6 Denial of Service
− AppSec USA (OWASP) - CTF winning team – 2012 & 2013
16:00 - Confessions of a Recovering Linux Admin - Ell Marquez & Allie Barnes
Abstract:
Many of us in the technical community have heard the saying RTFM (Read The [Friendly] Manual) as advice given to someone learning Linux. In Confessions of a Sysadmin, Ell Marquez will share a practical approach to learning to navigate the command line along with some of the secrets she has learned along the way.
Speaker Bio:
Ell Marquez has been part of the open-source family for a few years now. In this time, she has found the support needed from her mentorship relationships to grow from a Linux Administrator to an OpenStack technical trainer at Rackspace. Recently, she took the leap to join Jupiter Broadcasting & Linux Academy as a Community Architect.
Allie Barnes has been in the Linux community since 2011, jump-starting her IT career as a Linux Administrator at Rackspace and utilizing mentorships and community knowledge to eventually navigate into the OpenStack world, working on Red Hat’s OpenStack Product. Allie is learning to take the leap into the community by participating in more talks and community events in hopes of spreading knowledge and love of Linux and Open Source in general!
in the clouds (Moody 101)
10:00 - Creating an Effective Security Posture - Dominique Pizzie
Abstract:
I want to focus on knowing what to focus on. Stepping back, getting a lay of the land, and talk about solutions to problems everyone deals with. This is not necessarily a tools talk, but more of a mindset shift. Tools and strategy will be discussed.
Speaker Bio:
Dominique Pizzie has worked in a wide variety of security verticals. His most recent work involves developing a framework for Threat Hunting capabilities at his current place of employment. He is a strong advocate for "Automate all the things" and has a very strong opinion for documenting everything.
11:00 - A 'Radiography' of the [In]Security of PACS & DICOM Systems - Carlos Avila
Abstract:
At this point, no one is surprised when you visit a doctor and complete your medical history on a computer or on a mobile device, but perhaps not so many of us wonder where and how this information is stored; as well as what impact it would have if other people obtain that information. In this talk I try to analyze and answer these questions from the vulnerabilities found in different medical applications evaluated in web and mobile applications, such as PACS systems, DICOM viewers, ERM / HRM / RIS systems, which has connectivity connectivity commonly with DICOM protocols / HL7.
During the time that I have been investigating this type of systems I have found failures at the level of code mainly of type injection, errors of implementation of servers, credentials “hardcoded” in applications, disclosure of information; and each of these would allow at risk sensitive data of patients and doctors, as well as put at risk a complete health infrastructure.
The talk will show the level of exposure of these systems based on analysis I have made, found and reported failures; where I also include a demonstration against one of these systems. Hospitals, clinics, patients, doctors and monitoring systems / devices could be affected by these vulnerabilities.
The talk will show the level of exposure of these systems based on analysis I have made, found and reported failures; where I also include a demonstration against one of these systems. Hospitals, clinics, patients, doctors and monitoring systems / devices could be affected by these vulnerabilities.
Speaker Bio:
Carlos Avila is Chief Security Ambassador at ElevenPaths and also works as an independent consultant in the Information Security industry, fulfilling several mainly technical roles. Carlos is a founding member of ISSA Capitulo Ecuador and is a guest speaker at conferences and events on computer security. He’s an instructor of security related topics such as: Pentesting, Code Review, Defense Techniques and Hardening of Platforms.
13:00 - The Gogol Project; Lessons Learned Building My First CTF - Robert Wilson
Abstract:
I tend to learn best when I have a definite goal and an opportunity to teach as a learn. Turning my new knowledge into a lesson or an exercise for someone else helps me to sort things out in my own head, and keeps me accountable. This presentation is a detailed overview of a CTF I built and the lessons it taught me. By presenting it, I hope to share some of the things I learn and to pick up suggestions from people who’ve been doing this longer than I have.
Speaker Bio:
I grew up the oldest of six and graduated from Belmont Abbey College in North Carolina with degrees in mathematics and theology. Since then I bounced through jobs in construction, retail, and elementary school teaching, until I wound up working in information security for the US government.
14:00 - Virtualization Automation with Ansible - Alexander Klepal
Abstract:
Are you an ESXi pro? You’ll learn some new tricks! Never launched a VM before? We got you covered! This talk gives an overview into cyber ranges, virtualization, and Ansible’s VMware toolkit. Whether you want to build a pentesting range or deploy a classroom lab, this talk will make your range building a breeze. Sit back, relax, and let automation do the heavy lifting for you. Please, DO try this at home!
Speaker Bio:
This talk will be given by Alexander Klepal, a recent graduate of The University of Texas at San Antonio, (BBA in Cybersecurity) currently working as a cybersecurity researcher and developer as a federal contractor. As a formally nationally ranked “Penetration Tester” (2nd in CIAS Cyber Panoply Fall 2016), regionally ranked CCDC Competitor (2nd at SWCCDC Spring 2017), his hobbies include study of cybersecurity, leisurely playing video games, and puns. Lots of puns. “It’s my mission in life to take the technology we all use every day and make them safer and more accessible to everyone, even if I have to pop a few boxes to do it!”
15:00 - The 5 Laws of Librarianship in your Intel Operation - Tim Gallo
Abstract:
Building an intelligence repository often
Speaker Bio:
Tim Gallo is a Solutions Architect with FireEye, who has over 20 years’ experience in information security. Tim’s expertise is in Intelligence Guided Cyber Network Defense (IGCND). Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective processes and leveraging technologies to build their cyber defense centers and security operations practices. As part of his current role, Tim provides thought leadership in the areas of security strategy, intelligence initiatives, and threat and vulnerability management as well. In Tim’s previous roles, he helped develop intelligence solutions, led the security practice for a leading industrial manufacturer, and delivered Security Operations and Compliance consulting services. Tim is a member of the Board of @BSidesBDX and has spoken a numerous events around the world. He and his co-author's book "Ransomware: Defending Against Digital Extortion" has been used by many IT professional to aid in their programmatic response to the rise Ransomware in CyberCrimnial circles.
16:00 - 5G: Security Pitfalls and Considerations - Swapnil Deshmukh
Abstract:
5G networks leverages modern technological paradigm such as software define networking (SDN) and network functions virtualization (NFV) to meet the requirements of broadband access everywhere. SDN and NFV leverages the advances in cloud computing such as mobile edge computing to meet ease of integration requirements. However, securely using these technologies and providing user privacy in future wireless networks are common concerns that are not talked about. Therefore, this talk provides an overview of the security challenges in clouds, software defined networking, and network functions virtualization, and the challenges of user privacy and provide solutions to these challenges and build roadmap for secure 5G systems.
Speaker Bio:
Swapnil Deshmukh is CTO & co-founder of Certus Cybersecurity Solutions LLC. Swapnil has more than a decade of experience in enterprise cybersecurity and leads technical delivery. Swapnil is a subject matter expert in the application, cloud and emerging technologies security domains. He is co-author of Hacking Exposed Series, a best practice security handbook, and a frequent contributor at conferences, roundtables and publications. Prior to Certus Cybersecurity, Swapnil served as a Senior Director on Visa Inc.’s cybersecurity team. Swapnil is a graduate of George Mason University and the University of Mumbai where he studied telecommunications and computer/network engineering, respectively.
Abstract:
I want to focus on knowing what to focus on. Stepping back, getting a lay of the land, and talk about solutions to problems everyone deals with. This is not necessarily a tools talk, but more of a mindset shift. Tools and strategy will be discussed.
Speaker Bio:
Dominique Pizzie has worked in a wide variety of security verticals. His most recent work involves developing a framework for Threat Hunting capabilities at his current place of employment. He is a strong advocate for "Automate all the things" and has a very strong opinion for documenting everything.
11:00 - A 'Radiography' of the [In]Security of PACS & DICOM Systems - Carlos Avila
Abstract:
At this point, no one is surprised when you visit a doctor and complete your medical history on a computer or on a mobile device, but perhaps not so many of us wonder where and how this information is stored; as well as what impact it would have if other people obtain that information. In this talk I try to analyze and answer these questions from the vulnerabilities found in different medical applications evaluated in web and mobile applications, such as PACS systems, DICOM viewers, ERM / HRM / RIS systems, which has connectivity connectivity commonly with DICOM protocols / HL7.
During the time that I have been investigating this type of systems I have found failures at the level of code mainly of type injection, errors of implementation of servers, credentials “hardcoded” in applications, disclosure of information; and each of these would allow at risk sensitive data of patients and doctors, as well as put at risk a complete health infrastructure.
The talk will show the level of exposure of these systems based on analysis I have made, found and reported failures; where I also include a demonstration against one of these systems. Hospitals, clinics, patients, doctors and monitoring systems / devices could be affected by these vulnerabilities.
The talk will show the level of exposure of these systems based on analysis I have made, found and reported failures; where I also include a demonstration against one of these systems. Hospitals, clinics, patients, doctors and monitoring systems / devices could be affected by these vulnerabilities.
Speaker Bio:
Carlos Avila is Chief Security Ambassador at ElevenPaths and also works as an independent consultant in the Information Security industry, fulfilling several mainly technical roles. Carlos is a founding member of ISSA Capitulo Ecuador and is a guest speaker at conferences and events on computer security. He’s an instructor of security related topics such as: Pentesting, Code Review, Defense Techniques and Hardening of Platforms.
13:00 - The Gogol Project; Lessons Learned Building My First CTF - Robert Wilson
Abstract:
I tend to learn best when I have a definite goal and an opportunity to teach as a learn. Turning my new knowledge into a lesson or an exercise for someone else helps me to sort things out in my own head, and keeps me accountable. This presentation is a detailed overview of a CTF I built and the lessons it taught me. By presenting it, I hope to share some of the things I learn and to pick up suggestions from people who’ve been doing this longer than I have.
Speaker Bio:
I grew up the oldest of six and graduated from Belmont Abbey College in North Carolina with degrees in mathematics and theology. Since then I bounced through jobs in construction, retail, and elementary school teaching, until I wound up working in information security for the US government.
14:00 - Virtualization Automation with Ansible - Alexander Klepal
Abstract:
Are you an ESXi pro? You’ll learn some new tricks! Never launched a VM before? We got you covered! This talk gives an overview into cyber ranges, virtualization, and Ansible’s VMware toolkit. Whether you want to build a pentesting range or deploy a classroom lab, this talk will make your range building a breeze. Sit back, relax, and let automation do the heavy lifting for you. Please, DO try this at home!
Speaker Bio:
This talk will be given by Alexander Klepal, a recent graduate of The University of Texas at San Antonio, (BBA in Cybersecurity) currently working as a cybersecurity researcher and developer as a federal contractor. As a formally nationally ranked “Penetration Tester” (2nd in CIAS Cyber Panoply Fall 2016), regionally ranked CCDC Competitor (2nd at SWCCDC Spring 2017), his hobbies include study of cybersecurity, leisurely playing video games, and puns. Lots of puns. “It’s my mission in life to take the technology we all use every day and make them safer and more accessible to everyone, even if I have to pop a few boxes to do it!”
15:00 - The 5 Laws of Librarianship in your Intel Operation - Tim Gallo
Abstract:
Building an intelligence repository often
Speaker Bio:
Tim Gallo is a Solutions Architect with FireEye, who has over 20 years’ experience in information security. Tim’s expertise is in Intelligence Guided Cyber Network Defense (IGCND). Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective processes and leveraging technologies to build their cyber defense centers and security operations practices. As part of his current role, Tim provides thought leadership in the areas of security strategy, intelligence initiatives, and threat and vulnerability management as well. In Tim’s previous roles, he helped develop intelligence solutions, led the security practice for a leading industrial manufacturer, and delivered Security Operations and Compliance consulting services. Tim is a member of the Board of @BSidesBDX and has spoken a numerous events around the world. He and his co-author's book "Ransomware: Defending Against Digital Extortion" has been used by many IT professional to aid in their programmatic response to the rise Ransomware in CyberCrimnial circles.
16:00 - 5G: Security Pitfalls and Considerations - Swapnil Deshmukh
Abstract:
5G networks leverages modern technological paradigm such as software define networking (SDN) and network functions virtualization (NFV) to meet the requirements of broadband access everywhere. SDN and NFV leverages the advances in cloud computing such as mobile edge computing to meet ease of integration requirements. However, securely using these technologies and providing user privacy in future wireless networks are common concerns that are not talked about. Therefore, this talk provides an overview of the security challenges in clouds, software defined networking, and network functions virtualization, and the challenges of user privacy and provide solutions to these challenges and build roadmap for secure 5G systems.
Speaker Bio:
Swapnil Deshmukh is CTO & co-founder of Certus Cybersecurity Solutions LLC. Swapnil has more than a decade of experience in enterprise cybersecurity and leads technical delivery. Swapnil is a subject matter expert in the application, cloud and emerging technologies security domains. He is co-author of Hacking Exposed Series, a best practice security handbook, and a frequent contributor at conferences, roundtables and publications. Prior to Certus Cybersecurity, Swapnil served as a Senior Director on Visa Inc.’s cybersecurity team. Swapnil is a graduate of George Mason University and the University of Mumbai where he studied telecommunications and computer/network engineering, respectively.
in the thick of it (UC Conference Room B)
09:00 - Challenged by Your Job Search? So Are We All! Learn Key Job Search Tips - Kathleen Smith
Abstract:
In a recent survey, more that 45% of the community said that they did not know how to find a job. Most said they just asked friends. While referrals are an important part of job search, do you know some of the other key tips. Learn what the community is doing and how you can do better in your job search.
Speaker Bio:
Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations’ many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV’s 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.
10:00 - Recruiter Panel: Everything You Wanted to Know About a Recruiter, But Were Afraid to Ask
Abstract:
It is a full-time job finding your next job, but we all don’t have that time to spare in our lives. According to the Department of Labor, most professionals will have at least 15 jobs in their lifetime, and in our community, that number is almost double. You may think you have a handle on finding your next job but what really goes on in recruiting and hiring may surprise you. What are tools and strategies to always have on hand so that you can succeed rather than fail. Hear from a panel of recruiters on what they recommend job seekers do to stay in the game.
** ClearedJobs.Net will be having Resume Reviewing by Bill Branstetter, 6 Second Resumes, from 11:00am to 3:00pm **
Speaker Bio:
Darrell Crumling, Elbit Systems, Senior Recruiter - Subject Matter Expert in sourcing top talent, to provide innovative solutions for a vast cross section of industries. Army veteran.
Bill Branstetter, ASG, Recruiting Manager - Recruits and hires cleared technology professionals, runs the HR department, manages company programs, and works on proposal bids. Army veteran.
Michael Fowler, DTSI, Technology Recruiter – Recruiting for positions that require security clearances, to support DoD contracts. Army veteran.
Gregory Rivas, Defense Point Security, MDR Lead – SOC lead. Air Force veteran.
11:00 - Starting A Cybersecurity Career: Which role should you pursue? - Roxy Dee
Abstract:
Are you considering a career as a Cybersecurity professional? Let’s explore the different branches of Cybersecurity and see which one is a fit for you. You might be surprised to discover you already have skills and qualities that will help you get started.
Speaker Bio:
Roxy works as a Vulnerability Management Service Architect for the Cleveland-based, Splunk-focused MSSP Hurricane Labs. Her position at Hurricane allows her to further explore, expand, and share perspectives about one of her favorite topics -- vulnerability management.
Her background also includes experiences as a network security analyst, a security infrastructure engineer, and detecting online banking fraud. Along her career path, Roxy has become very involved in the infosec community, especially as she has immersed herself in the local Dallas area. She very much enjoys encouraging those new to infosec to become more involved in the industry.
Some of her favorite things are Linux, penguins, RFCs, and discussing anything infosec.
13:00 - How Neurodiversity can be Leveraged for an Excellent ROI - Megan Roddie
Abstract:
While the cybersecurity industry talks about a skills shortage and the struggle to fill the ever-growing number of job openings, there is an untapped talent pool being overlooked. Neurodiverse individuals are often passed over for jobs due to difficulty interviewing, social stigmas surrounding mental health disorders, or other situations that make them seem less qualified than other applicants. Those neurodiverse individuals that do end up finding jobs in cybersecurity often struggle to hold those jobs. However, if companies choose to work with neurodiverse individuals to ensure that their unique needs are met, the return on investment will be huge. In this talk, the experiences of autistic, bipolar, and ADHD cybersecurity employees will be presented. Each of these mental health disorders come with struggles, but given the right environment to thrive in, individuals facing these disorders can also be an employer’s most valuable asset.
Speaker Bio:
Megan Roddie is currently working as a Cyber Threat Analyst. She recently graduated with her Master's in Digital Forensics and also holds her GCIH and GCFA. As a 22-year old with Asperger's Syndrome (High Functioning Autism), Megan offers a unique perspective in any topic she discusses. Megan can articulate her struggles and how small modifications in daily life have made her successful.
14:00 - Get More Than a Tshirt from Your Community Volunteering - Kathleen Smith
Abstract:
Community volunteering provides career development opportunities, and offers substantial benefits spanning personal fulfillment and career advancement. This notion is supported in the findings I will share from a recent survey among industry professionals, which examines how individuals volunteer in the community, what skills they learn, how employers support them, and how they face stress.
Speaker Bio:
Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations’ many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV’s 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.
15:00 - Hacker MBA: Soft Skills for Hackers - Qasim Ijaz
Abstract:
The Hacker MBA is drilled down version of the what I've learned through my MBA classes and numerous penetration test engagements I've lead. My objective for this presentation is to provide the professional penetration testers with soft skills that make a good cybersecurity consultant. The presentation will make use of discussions and case studies to provide an interactive learning environment. The Hacker MBA attendees will practice teamwork, leadership, ethical decision making, communication, and time & task management.
Speaker Bio:
Qasim "Q" Ijaz is Director, Labs at Coalfire Systems who specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with focus on networks and web applications testing. His areas of interest include healthcare security, cybersecurity policy, Windows penetration testing, Python, and the "dry" business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after hours. He has delivered training at conferences as well as in college classrooms.
16:00 - Talking to lawyers (without catching a case), or, "Counsel advises..." - Bill Weiss, Suchi Pahi & Jonathan Nichols
Abstract:
Getting involved in a legal investigation can be an interesting experience or a nightmare mattering on how you've prepared. If your company has privacy concerns, these investigations are a certainty, not a question. Some preparation, which we'll walk you through, makes the difference between being the lawyer's friend and being the one they talk about at the bar with their friends.
Speaker Bio:
A blue teamer, a privacy and cybersecurity lawyer, and a hacker walk into a conference in San Antonio...
Seriously though, we'll come up with a full bio for you if the talk is interesting enough to be accepted. Bill is a pointy-haired boss who came up mostly in blue teams, Suchi is a cybersecurity and privacy lawyer doing a stint as inside counsel, and Jon is a former Bad Man who will give us the hacker's perspective.
Abstract:
In a recent survey, more that 45% of the community said that they did not know how to find a job. Most said they just asked friends. While referrals are an important part of job search, do you know some of the other key tips. Learn what the community is doing and how you can do better in your job search.
Speaker Bio:
Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations’ many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV’s 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.
10:00 - Recruiter Panel: Everything You Wanted to Know About a Recruiter, But Were Afraid to Ask
Abstract:
It is a full-time job finding your next job, but we all don’t have that time to spare in our lives. According to the Department of Labor, most professionals will have at least 15 jobs in their lifetime, and in our community, that number is almost double. You may think you have a handle on finding your next job but what really goes on in recruiting and hiring may surprise you. What are tools and strategies to always have on hand so that you can succeed rather than fail. Hear from a panel of recruiters on what they recommend job seekers do to stay in the game.
** ClearedJobs.Net will be having Resume Reviewing by Bill Branstetter, 6 Second Resumes, from 11:00am to 3:00pm **
Speaker Bio:
Darrell Crumling, Elbit Systems, Senior Recruiter - Subject Matter Expert in sourcing top talent, to provide innovative solutions for a vast cross section of industries. Army veteran.
Bill Branstetter, ASG, Recruiting Manager - Recruits and hires cleared technology professionals, runs the HR department, manages company programs, and works on proposal bids. Army veteran.
Michael Fowler, DTSI, Technology Recruiter – Recruiting for positions that require security clearances, to support DoD contracts. Army veteran.
Gregory Rivas, Defense Point Security, MDR Lead – SOC lead. Air Force veteran.
11:00 - Starting A Cybersecurity Career: Which role should you pursue? - Roxy Dee
Abstract:
Are you considering a career as a Cybersecurity professional? Let’s explore the different branches of Cybersecurity and see which one is a fit for you. You might be surprised to discover you already have skills and qualities that will help you get started.
Speaker Bio:
Roxy works as a Vulnerability Management Service Architect for the Cleveland-based, Splunk-focused MSSP Hurricane Labs. Her position at Hurricane allows her to further explore, expand, and share perspectives about one of her favorite topics -- vulnerability management.
Her background also includes experiences as a network security analyst, a security infrastructure engineer, and detecting online banking fraud. Along her career path, Roxy has become very involved in the infosec community, especially as she has immersed herself in the local Dallas area. She very much enjoys encouraging those new to infosec to become more involved in the industry.
Some of her favorite things are Linux, penguins, RFCs, and discussing anything infosec.
13:00 - How Neurodiversity can be Leveraged for an Excellent ROI - Megan Roddie
Abstract:
While the cybersecurity industry talks about a skills shortage and the struggle to fill the ever-growing number of job openings, there is an untapped talent pool being overlooked. Neurodiverse individuals are often passed over for jobs due to difficulty interviewing, social stigmas surrounding mental health disorders, or other situations that make them seem less qualified than other applicants. Those neurodiverse individuals that do end up finding jobs in cybersecurity often struggle to hold those jobs. However, if companies choose to work with neurodiverse individuals to ensure that their unique needs are met, the return on investment will be huge. In this talk, the experiences of autistic, bipolar, and ADHD cybersecurity employees will be presented. Each of these mental health disorders come with struggles, but given the right environment to thrive in, individuals facing these disorders can also be an employer’s most valuable asset.
Speaker Bio:
Megan Roddie is currently working as a Cyber Threat Analyst. She recently graduated with her Master's in Digital Forensics and also holds her GCIH and GCFA. As a 22-year old with Asperger's Syndrome (High Functioning Autism), Megan offers a unique perspective in any topic she discusses. Megan can articulate her struggles and how small modifications in daily life have made her successful.
14:00 - Get More Than a Tshirt from Your Community Volunteering - Kathleen Smith
Abstract:
Community volunteering provides career development opportunities, and offers substantial benefits spanning personal fulfillment and career advancement. This notion is supported in the findings I will share from a recent survey among industry professionals, which examines how individuals volunteer in the community, what skills they learn, how employers support them, and how they face stress.
Speaker Bio:
Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com, both veteran owned companies, she spearheads the community-building, and communications outreach initiatives catering to the both organizations’ many audiences including security cleared job seekers, cybersecurity candidates and military personnel. Kathleen has presented at several security conferences on recruiting and job search within the cyber security world to include BSidesLV, BSidesTampa, BSidesDE, FedCyber. Kathleen volunteers in the cybersecurity community; she is the Director, HireGround, BSidesLV’s 2 day career track. Kathleen is well respected within the recruiting community, is the co-founder and current President of recruitDC, the largest community of recruiters in the Washington DC area.
15:00 - Hacker MBA: Soft Skills for Hackers - Qasim Ijaz
Abstract:
The Hacker MBA is drilled down version of the what I've learned through my MBA classes and numerous penetration test engagements I've lead. My objective for this presentation is to provide the professional penetration testers with soft skills that make a good cybersecurity consultant. The presentation will make use of discussions and case studies to provide an interactive learning environment. The Hacker MBA attendees will practice teamwork, leadership, ethical decision making, communication, and time & task management.
Speaker Bio:
Qasim "Q" Ijaz is Director, Labs at Coalfire Systems who specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with focus on networks and web applications testing. His areas of interest include healthcare security, cybersecurity policy, Windows penetration testing, Python, and the "dry" business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after hours. He has delivered training at conferences as well as in college classrooms.
16:00 - Talking to lawyers (without catching a case), or, "Counsel advises..." - Bill Weiss, Suchi Pahi & Jonathan Nichols
Abstract:
Getting involved in a legal investigation can be an interesting experience or a nightmare mattering on how you've prepared. If your company has privacy concerns, these investigations are a certainty, not a question. Some preparation, which we'll walk you through, makes the difference between being the lawyer's friend and being the one they talk about at the bar with their friends.
Speaker Bio:
A blue teamer, a privacy and cybersecurity lawyer, and a hacker walk into a conference in San Antonio...
Seriously though, we'll come up with a full bio for you if the talk is interesting enough to be accepted. Bill is a pointy-haired boss who came up mostly in blue teams, Suchi is a cybersecurity and privacy lawyer doing a stint as inside counsel, and Jon is a former Bad Man who will give us the hacker's perspective.
Speaker Mentors
Thank you to those who volunteered as mentors for our speaker mentorship program!
Will Bengtson
Ell Marquez
Alex Juarez
Douglas Brush
Rob Dodson
Kashish Mittal
Will Bengtson
Ell Marquez
Alex Juarez
Douglas Brush
Rob Dodson
Kashish Mittal