BSidesSLC has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Track 1 [clear filter]
Friday, February 22

11:00am PST

The Magic of RSA Cryptosystems
You know that feeling right before you fall asleep and your mind wanders to wondering how is it that you use one key to encrypt and a completely different key to decrypt and yet it works out? What is this asymmetric voodoo?! I’m no mathematician but come do math with me anyway.

avatar for Shelby Peterson

Shelby Peterson

Shelby Peterson (aka Chubbs) is a BYU alumna who has spent the last couple years fighting crime as a Security Operations Center Analyst at Adobe.  She enjoys SOC work because she gets to sneak through mounds of data. She struggles to stay warm, and is often spotted wearing blankets... Read More →

Friday February 22, 2019 11:00am - 11:30am PST
Sego Lily A, B, C, D, E

11:30am PST

How Systems Engineering can help Cybersecurity
Will discuss how engineering process can help a company achieve better security. Businesses need to adapt to cybersecurity as a unit outside IT and build internal processes to fit against attacks. Small and large organizations will need to change how they deal with cybersecurity as technology gets more connected to the business.

avatar for Andrew Hall (RuShan)

Andrew Hall (RuShan)

Andrew (RuShan) is an Executive MBA student graduating May 2019 that has worked DoD Cybersecurity for over 8 years. Undergrad in Electrical Engineering and has a CISSP. Twitter: rushan_ee

Friday February 22, 2019 11:30am - 12:00pm PST
Sego Lily A, B, C, D, E

1:00pm PST

White Collars & Black Hats: Bitcoin, Dark Nets and Insider Trading
We know criminal hacking is big business, over the past decade, we have seen criminal syndicates get creative with ways of generating revenue, through markets selling stolen credit cards, selling of tools and services and more recently ransomware. With the rise of popularity in Bitcoin, there has been an increasing interest from those in the financial sector in the pseudo-anonymous currency as well as underground markets and sites sharing information via hidden services in the Tor network and other platforms. Financially savvy white collar criminals now have increased access to criminal hackers who can target, steal and share nonpublic data about companies, this paired with the anonymous nature of hidden services and Bitcoin reduces the risk of getting caught, but with large financial gains. In this talk we will review several cases where criminals have gained millions of dollars through compromising PR and legal firms and steps these organizations can take to protect this data.

avatar for Ken Westin

Ken Westin

Ken Westin is currently Senior Security Specialist at Splunk, helping organizations aggregate, analyze and operationalize disparate security data sources to identify and mitigate threats in various forms. In his past he has helped solve crimes with data, tracking stolen devices, breaking... Read More →

Friday February 22, 2019 1:00pm - 2:00pm PST
Sego Lily A, B, C, D, E

2:00pm PST

Tech Panel
avatar for Stephanie (@_sn0ww) Carruthers

Stephanie (@_sn0ww) Carruthers

Stephanie "Snow" Carruthers is a People Hacker for X-Force Red, an autonomous team of veteran hackers within IBM Security. At DEF CON 22 she won a black badge for the Social Engineering Capture the Flag (SECTF) and was on the winning team for SAINTCON'S Vault Physical Security challenge... Read More →
avatar for Mike Spicer (d4rkm4tter)

Mike Spicer (d4rkm4tter)

Mike is a mad scientist and hacker who likes to meddle with hardware and software. He is particularly obsessed with wireless. He has a degree in computer science which he has put to use building and breaking a wide array of systems. These include web application, wireless system monitoring... Read More →

Friday February 22, 2019 2:00pm - 3:00pm PST
Sego Lily A, B, C, D, E

3:00pm PST

I Find Your Lack of Serverless Disturbing! Leveraging the Cloud to Automate the Mundane
Serverless technologies are an offensive security professional's dream. With some basic scripting skills, and a little bit of AWS know-how, a security professional can automate and scale mundane tasks at a moment's notice. This talk is about leveraging the power of serverless technology to perform open source reconnaissance and target enumeration on a scale far larger than your laptop can handle (e.g. screenshotting web services, port scanning, running various vulnerability checks, etc...). Serverless technology is exploding and it's time you took advantage of it!


Michael Butler

Michael Butler is a vice president and security researcher at Stage 2 Security where he leads, hacks, and does some development in his spare time. Michael has worked in the offensive security field for nearly 10 years which includes time working for the US Army, NSA, Cyber Command... Read More →

Friday February 22, 2019 3:00pm - 4:00pm PST
Sego Lily A, B, C, D, E

4:00pm PST

Three dimensional security – a graph and search approach to security and compliance
Organizations can't get complete visibility into their digital environment because of the way the data is collected, stored and presented. That means vulnerabilities are rampant and you don't even know it. Learn how to apply a graph data model to your digital environment to create a more thorough and complete mapping of relationships that exist. This, in combination with search, makes spotting gaps and vulnerabilities easy. It also enables more intelligent, context driven alerts.

avatar for Erkang Zheng

Erkang Zheng

Erkang is currently the CISO at LifeOmic, the leading cloud precision health software company, where he also founded the JupiterOne security product.  He was previously the VP/Head of Software Security at Fidelity Personal Investing and Program Director at IBM Security Services before... Read More →

Friday February 22, 2019 4:00pm - 5:00pm PST
Sego Lily A, B, C, D, E