Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring GitHub
296
talks mention this tool across
76
BSides chapters.
Talks featuring GitHub
22:47
Passive-ish Recon Techniques
Tom Hudson
BSides Leeds
· 2018
Technical
Web AppSec
Intermediary
Red
Talk
Open →
2018-02
33:53
The Power of Recon
Orwa Atyat
BSides Ahmedabad
Technical
OSINT
Vulnerability Research
Web AppSec
Red
Talk
Open →
2024-05
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
30:17
Lyft Cartography: Automating Security Visibility and Democratization
Sacha Faust
BSidesSF
· 2019
Technical
Talk
Open →
2019-03
24:59
What's Up Argon2? The Password Hashing Winner A Year Later - JP Aumasson
BSides Las Vegas
Open →
2016-09
56:13
Jak zdobyć flagę?
Mateusz Szymaniec
Jarosław Jedynak
BSides Warsaw
· 2016
Open →
2016-10
41:28
Googling Like A Boss: Expanding the Powers of OSINT
Ethan Dodge
BSides SLC
· 2016
Technical
Demo
Open →
2016-05
53:15
Practical Cyborgism: Getting Started with Machine Learning for Incident Detection
David Bianco
Chris McCubbin
BSides DC
· 2016
Technical
Talk
Open →
2016-11
39:30
Pwning Cloud Contexts: From GitHub Token to Compromising an Entire GCP Organization
Ayoub Fathi
BSides Ahmedabad
· 2024
Technical
Cloud IAM
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
40:17
A Threat Analysis of 0ktapus SMS Phishing Campaigns
Will Thomas
BSides Cheltenham
· 2023
Technical
War Stories
Malware Analysis
Social Engineering
Threat Intel
Talk
Open →
2023-06
27:37
Overwatch: A serverless approach to orchestrating your security automation
Sanchay Jaipuriyar
BSidesSF
· 2023
Technical
DevSecOps
Talk
Open →
2023-05
43:10
DYODE: Do Your Own DiodE for Industrial Control Systems - AryKokos, Arnaud Soullie
BSides Las Vegas
Open →
2016-08
38:31
Logging Made Easy - Shane M and Adam B
BSides Bristol
Open →
2019-07
20:17
Aluma Lavi Shaari - Golang Malware: Using the attackers force against them
Aluma Lavi Shaari
BSides TLV
· 2021
Technical
Talk
Open →
2021-08
43:42
Disinformation As A Service
Andy Gill
BSides London
· 2022
Talk
Open →
2022-02
42:09
Tokens & Takeovers: Cloud-Powered Supply Chain Attacks
Nitesh Surana
BSides Ahmedabad
· 2025
Technical
Supply Chain Security
Talk
Open →
2025-03
37:51
Building an Effective Intrusion Detection Program
Jason Craig
BSidesSF
· 2017
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2017-03
49:45
The Cyber-Pirate's Guide to C2 Development
Gerhard Botha
BSides Cape Town
· 2023
Technical
Malware Analysis
Tooling
Red
Talk
Open →
2023-12
17:08
Gamify security best practices to scalably improve engineering culture
David Trejo
BSidesSF
· 2023
Technical
Talk
Open →
2023-05
8:45:06
Pipeline Pandemonium
Blake Hudson
BSides Las Vegas
· 2024
Technical
Red
Talk
Open →
2024-08
7:08:41
BSidesPDX 2025 - Saturday, Track 1
BSides PDX
· 2025
Open →
2025-10
23:20
Bye-Bye False Positives: Using AI to Improve Detection
Ivan Novikov
BSidesSF
· 2019
Technical
Web AppSec
Blue
Talk
Open →
2019-03
27:03
From Zero To SSRF To RCE And Back Again by Tom Cope
Tom Cope
BSides Basingstoke
· 2022
Technical
Web AppSec
Talk
Open →
2022-07
43:58
Attacking & Defending Supply Chains: How we got Admin in your Cloud, Again
Mike Ruth
BSidesSF
· 2024
Technical
Cloud IAM
Supply Chain Security
Talk
Open →
2024-07
28:47
Learning from AWS Customer Security Breaches
Rami McCarthy
Bsides CT
· 2020
Technical
Cloud IAM
DFIR
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2020-11
27:32
Access Control with Concierge: One Tool to Rule Them All
Karthik Rangarajan
BSidesSF
· 2017
Technical
Active Directory
Cloud IAM
Talk
Open →
2017-03
39:07
BSides Glasgow 2018 - Paul Ritchie - Hacking with Git
BSides Scotland
Open →
2018-05
26:05
CoinMiner Are Evasive - Omri Segev Moyal & Thomas Roccia
Omri Segev Moyal
Thomas Roccia
BSides TLV
· 2018
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-07
30:48
A Two-part Saga: Continuing the Journey of Hacking Malware C2s
Vangelis Stykas
BSides Prague
· 2024
Technical
Malware Analysis
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
27:38
BSidesPDX 101: Conference Organization, Capture the Flag, Contests & Events
BSides PDX
· 2019
Community
CTF
Panel
Open →
2019-11
35:19
GitOops! All Paths Lead To Clouds
Alex Kaskasoli
BSides London
· 2022
Technical
Talk
Open →
2022-01
2:55:11
BSides Amman 2021 2nd Edition - Talks Day
Aladdin Almubayed
Mazin Ahmed
Mohammad Al-Shami
BSides Amman
· 2021
Technical
Talk
Open →
2021-07
1:07:54
January Presentation Security Data Analysis for the masses
BSides Peru
Open →
2017-01
23:35
Breaking Into Infosec or, How I hacked my way out of poverty - BSides Portland 2022
BSides PDX
Open →
2022-10
50:48
BSidesSF 2023 - Securing the Pipeline: Protecting Self-Hosted GitHub Runners (Adnan Khan)
Adnan Khan
BSidesSF
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-05
41:29
The Art of Compromising C2 Servers
Vangelis Stykas
BSides Berlin
· 2023
Technical
Malware Analysis
Reverse Engineering
Web AppSec
Advanced
Red
Talk
Open →
2024-01
27:48
Team Threat Hunting with AI and Automation
Kenneth Peeples
BSides Charleston
· 2024
Technical
AI Security
Container Security
Detection Engineering
Threat Intel
Talk
Open →
2024-11
26:00
Exposed Secrets — How Public Git Repositories and Docker Images Expose Millions of Secrets
Mackenzie Jackson
BSidesSF
· 2022
Research
DFIR
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
44:08
The attacker's guide to exploiting credentials & secrets
Mackenzie Jackson
BSides Tallinn
· 2023
Technical
Red
Demo
Talk
Open →
2023-10
21:19
10 Steps to Build & Lead a Competitive Cybersecurity/CTF Team
John Hammond
Bsides CT
· 2018
Career
Community
CTF
Career & Soft Skills
Intro
Talk
Open →
2018-11
8:23:41
Security BSides Delaware 2020 - Day 1
BSides Delaware
· 2020
Open →
2020-11
46:08
How to take over a production system in the cloud - Paul Schwarzenberger
BSides London
Open →
2018-06
43:50
Incident Response Triage with Open Source Tools
Markus Einarsson
BSides Tallinn
· 2025
Technical
Blue
Talk
Open →
2025-10
52:09
Speedrun Cybersecurity with AI – Hack Faster
Mike Spicer
BSides SLC
· 2025
Technical
AI Security
Vulnerability Research
Red
Demo
Talk
Open →
2025-06
52:15
The Rise and Rise of Advanced eCrime Threat — Incident Response Edition
Anurag Khanna
BSides Canberra
Technical
Talk
Open →
2024-11
44:08
From Soup To Nuts: Building A Detection-as-Code Pipeline - David French
David French
BSides Dublin
· 2024
Technical
Detection Engineering
Intermediary
Blue
Talk
Open →
2024-06
30:26
Snow Nor Rain Nor Dependency Confusion: How to Deliver the Right Package
Jessica Smith
Justin Engler
BSidesSF
· 2024
Technical
Supply Chain Security
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-07
33:10
Fuzzing Ruby and C Extensions
Claudio Contin
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
42:58
Breaking Build: Red Teaming CI/CD Pipelines and GitHub Actions [BSidesPDX 2024]
Craig Wright
BSides PDX
· 2024
Technical
DevSecOps
Red
Talk
Open →
2024-11
53:45
Signing your code the easy way
Oren Novotny
BSides DC
· 2019
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2019-11
26:50
Digital Transformation of the Illicit Economy and Outsourced Crime Providers
Bex Nitert
BSides Perth
· 2021
Research
War Stories
Case Studies and Incidents Analysis
Talk
Open →
2021-09
49:39
To Normalized Logs, and Beyond - Building a Threat Detection Platform from Scratch
David Levitsky
Brian Maloney
BSidesSF
· 2023
Technical
DevSecOps
Blue
Talk
Open →
2023-05
27:20
Panda Mirror: How the Chinese CCP Manipulates NPM to Hoard Malware
Paul McCarty
BSides Canberra
· 2025
Research
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
26:10
LoL-Bins Behaving Badly - Andrew Costis
BSides Liverpool
Open →
2019-07
35:28
Hacking Mobile Apps with Frida
David Coursey
BSides Charleston
· 2018
Technical
Talk
Open →
2018-11
29:57
BG - Writing Malware Without Writing Code - Gal Bitensky
BSides Las Vegas
Open →
2017-08
1:00:18
Scaling the Security Researcher to Eliminate OSS Vulnerabilities
Jonathan Leitschuh
Bsides CT
· 2023
Research
Technical
Supply Chain Security
Tooling
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Keynote
Open →
2023-10
13:17
Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
BSides Las Vegas
Open →
2016-08
24:38
Automating Event Log Production & Testing for SIEM Detection
Alek Rollyson
BSides Augusta
· 2017
Technical
Detection Engineering
Tooling
Blue
Talk
Open →
2017-09
28:33
Hack the system: exploring libpam with uprobes and eBPF
Peter McConnell
BSides Belfast
· 2025
Technical
Detection Engineering
Reverse Engineering
Advanced
Demo
Talk
Open →
2025-02
24:41
Got popcorn? What's on the Vuln Channel tonight?
Rob Jerdonek
Lily Chau
BSidesSF
· 2022
Technical
Talk
Open →
2022-07
39:39
Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks
Chester Wisniewski
BSides London
Technical
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
16:55
365Inspect
Raquel Eisman
BSides Charleston
· 2022
Talk
Open →
2023-01
47:23
Andrew Krug - Hacking Serverless Runtimes
Andrew Krug
BSides PDX
· 2018
Technical
Cloud IAM
Vulnerability Research
Red
Talk
Open →
2018-04
24:16
Your Secrets are Showing! How to Find if Your Developers are Leaking Secrets?
Ian Lee
BSidesSF
· 2018
Technical
Red
Talk
Open →
2018-04
44:16
Eric Goldstrom - Interactive Threat Defense: Incident Response, Threat Intel, and Red Team (oh my!)
Eric Goldstrom
BSides PDX
Technical
Talk
Open →
2019-11
21:45
Making It Rain: Cryptojacking Attacks In The Cloud
Chris Doman
BSides Bristol
· 2019
Technical
Talk
Open →
2019-07
32:14
BSidesSLC 2016 -- Don't be stupid with Github - Even more Github fun -- Metacortex
BSides SLC
Open →
2016-05
42:08
The Adversary Mindset: Practical examples from the field
Yossi Sassi
BSides Budabest
· 2024
Technical
Talk
Open →
2024-09
53:21
in ur scm, bein a ninja
Hank Leininger
BSides DC
· 2014
Technical
Supply Chain Security
Talk
Open →
2014-10
47:23
Open Source GitOps for Detection Engineering
Zach Wasserman
BSides Las Vegas
· 2023
Technical
Detection Engineering
DevSecOps
Blue
Demo
Talk
Open →
2023-10
23:52
Cyber Cat & Mouse: Law Enforcement vs The Dark Web
Jordan Powell
BSides Newcastle
· 2025
Technical
War Stories
Case Studies and Incidents Analysis
Talk
Open →
2025-12
58:26
Tim Tomes - Recon-ng and Beyond
Tim Tomes
BSides Augusta
· 2015
Technical
OSINT
Web AppSec
Red
Talk
Open →
2015-09
40:07
Doctor Docker: Building Your Infrastructure's Immune System
Mike McCabe
Patrick Cooley
BSides DC
· 2014
Technical
Container Security
DevSecOps
Supply Chain Security
Demo
Talk
Open →
2014-10
42:06
Attacking Pipelines: Large Scale Exploitation of Workflow Files - David, Rohan & Andrei
BSides Cape Town
Open →
2025-04
43:49
SplunkGPT: Fine-tuning GPT-3 for Detection Engineering
Jake Coyne
Andrew Gomez
BSides Augusta
· 2023
Technical
AI Security
Detection Engineering
Tooling
Talk
Open →
2023-10
11:48
Find and fix Vulnerabilities within open source projects - Callian
BSides Cape Town
Open →
2025-03
47:02
XZ made EZ by Joey DeVilla
Joey deVilla
BSides Tampa
Technical
Supply Chain Security
Intro
Talk
Open →
2024-05
50:06
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
Jonathan Leitschuh
Patrick Way
BSides Las Vegas
· 2022
Research
Technical
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-09
29:44
You Might Still Need Patches for Denim
Maya Kaczorowski
Dan Lorenc
BSidesSF
· 2019
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2019-03
22:38
Hacking OSS
Rotem Bar
BSides TLV
· 2021
Technical
Red
Talk
Open →
2021-08
22:10
Code C.A.I.N – Keeping Your Source Code Under Control
Rotem Reiss
BSides TLV
· 2022
Technical
Detection Engineering
OSINT
Supply Chain Security
Talk
Open →
2022-07
36:55
Detection-as-Code: Scaling SOC Operations
Aaron Wilkinson
BSides Belfast
Technical
Blue
Talk
Open →
2025-02
1:01:30
OWASP Security Knowledge Framework: Making the Web Secure by Design
Glenn ten Cate
BSides Manchester
· 2015
Technical
Talk
Open →
2015-10
44:43
BSidesSF 2024 - Temporary Access to the Cloud: A Case Study (Tomas Rabczak)
Tomas Rabczak
BSidesSF
· 2024
Technical
Cloud IAM
Case Studies and Incidents Analysis
Talk
Open →
2024-07
15:45
From Packets to Intel: Building your own Network Threat Feed
Jared Naude
BSides Joburg
· 2025
Technical
Cloud IAM
Network Security
Threat Intel
Blue
Talk
Open →
2025-08
35:56
Repo Jacking: How GitHub Exposes Over 70,000 Projects to Remote Code Injection
Indiana Moreau
BSides Las Vegas
· 2021
Research
Technical
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-08
20:56
10 Steps to Build & Lead a Cybersecurity/CTF Team
John Hammond
BSides Delaware
· 2018
Career
Community
CTF
Career & Soft Skills
Talk
Open →
2018-11
41:21
Digital Intel Gathering: OSINT for Blue/Red Teams
Ethan Dodge
Brian Warehime
BSidesSF
· 2016
Technical
OSINT
Social Engineering
Blue
Red
Demo
Talk
Open →
2016-04
25:57
Cloud-Squatting: The Never-Ending Misery Of Deleted And Forgotten Cloud Assets
Abdullah Al-Sultani
BSides Belfast
Technical
Cloud IAM
Talk
Open →
2024-03
50:01
Grapl — A Graph Platform for Detection and Response
Colin O'Brien
BSides Las Vegas
· 2019
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
41:37
Incident Response in Cases of Supply Chain Incidents
Lucas Ferreira
BSides Lisbon
· 2023
Technical
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
43:19
Ofir Shaty & Sarit Yerushalmi - CrimeOps of the KashmirBlack Botnet
Ofir Shaty
Sarit Yerushalmi
BSides TLV
· 2021
Technical
Malware Analysis
Threat Intel
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-08
47:31
Fighting the Impossible: Supply Chain Attacks
Bojan Ždrnja
BSides Zagreb
Research
Technical
Malware Analysis
Supply Chain Security
Vulnerability Research
Talk
Open →
2025-03
49:49
Closing the Visibility Gap: Threat Hunting with Hawk in the Microsoft Cloud
Jonathan Butler
Lorenzo
Paul Navarro
BSides Charm
· 2025
Technical
Tooling
Cloud IAM
DFIR
Detection Engineering
Blue
Demo
Talk
Open →
2025-05
44:04
Pwned Cloud Society
Bryce Kunz
BSides SLC
· 2017
Technical
Cloud IAM
Red
Talk
Open →
2017-06
13:47
Cloudy With A Chance Of Security
Sascha Bharath
BSides London
Talk
Open →
2024-02
28:42
BSidesSF 2024 - Please Don't Discard - Security Data (Rishabh Gupta, Hrushikesh Paralikar)
Rishabh Gupta
Hrushikesh Paralikar
BSidesSF
· 2024
Technical
Talk
Open →
2024-07
28:39
bscrypt — A Cache-Hard Password Hash
Steve Thomas
BSides Las Vegas
· 2022
Technical
Cryptography
Advanced
Talk
Open →
2022-09
47:20
GCP BigQuery as Security Detection Platform
Diana Kramer
Norberto García Marín
BSides Las Vegas
· 2021
Technical
Cloud IAM
Detection Engineering
Talk
Open →
2021-08
42:47
Playing Peekaboo With Runtime In CI/CD Pipelines
Patricia R
BSides London
· 2025
Technical
DevSecOps
Supply Chain Security
Intermediary
Talk
Open →
2026-03
38:08
Shattering Trust: Live Deepfakes and the Fall of Legacy Verification
Paul Vann
BSides Charleston
· 2024
Technical
AI Security
Deepfakes and Synthetic Media
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2024-11
24:58
What's Inside The Open Directory From 96 Different Threat Actors?
Alana Witten
BSides London
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2025-02
31:20
Getting Better with Data - Steph Locke
Steph Locke
BSides London
· 2016
Technical
Talk
Open →
2016-07
41:35
BSides Rochester 2016: Jared Stroud & Bryan Harmat: RedOps: Scaling & Automating Your Pwnage
BSidesROC
Open →
2016-05
45:26
Stealing Browser Cookies: Bypassing Chrome's Latest Security Measures
Rafael Felix
BSides Las Vegas
· 2025
Technical
Cryptography
Reverse Engineering
Web AppSec
Advanced
Red
Demo
Talk
Open →
2025-12
36:27
GenAI attacks – 2025 Year In Review
Tillson Galloway
BSides Charleston
· 2025
Research
Technical
AI Security
GenAI Security
Malware Analysis
Social Engineering
Threat Intel
Intermediary
+3
Open →
2025-11
51:17
Uncloaking Cloak Ransomware
Jeff White
BSides Tampa
Research
Case Studies and Incidents Analysis
Talk
Open →
2025-07
39:24
YAYA (Yet Another YARA Allocution)
John Laycock
Monty St John
BSides DC
· 2016
Technical
Intro
Talk
Open →
2016-11
23:51
Securing the open-source supply chain
Morten Linderud
BSides Oslo
· 2021
Technical
Cryptography
Supply Chain Security
Intermediary
Talk
Open →
2022-02
46:03
Creating a Secure Web Server from 2 Vulnerable Web Servers
Parker Garrison
BSides Charleston
· 2024
Technical
Web AppSec
Demo
Open →
2024-11
23:32
G1234! - Guardians of GitHub - Joshua Danielson & Dileep Gurazada
BSides Las Vegas
Open →
2018-09
46:04
Broken links — Behind the scenes of Supply Chain breaches
François Proulx
BSides NYC
· 2023
Technical
Supply Chain Security
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-06
41:12
Threat Modelling as Code: Building Security into Your Git Workflow
Christian Frichot
BSides Perth
· 2025
Technical
Talk
Open →
2025-10
28:23
State of API Security 2024: Insights from Analyzing 1 Million Domains
Tristan Kalos
Antoine Carossio
BSides Seattle
· 2024
Research
Empirical Research
Talk
Open →
2024-10
26:28
How Segment Proactively Protects Customer's API Keys
Sal Olivares
BSidesSF
· 2023
Technical
Talk
Open →
2023-05
33:23
2024 Security BSides // Steve Salinas
Steve Salinas
BSides Cayman Islands
· 2024
Open →
2025-01
25:20
Evil Neighbour Attacks On SaaS Platforms Cloudflare, Bitbucket, Etc by Yash Kadakia
Yash Kadakia
BSides London
· 2023
Technical
Talk
Open →
2023-05
41:37
BSides Berlin 2023: Mackenzie Jackson - The attackers guide to exploiting secrets in the wild
BSides Berlin
Open →
2024-01
53:43
Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK Evaluations
Cat Self
Kate Esprit
BSides Las Vegas
· 2023
Research
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2023-10
28:33
One-Click Code Fix: Securing Code Using AI
Chandrani Mukherjee
Joseph Seasly
BSidesSF
· 2024
Technical
DevSecOps
Demo
Talk
Open →
2024-07
14:21
Sealing the Leaks: Incident Response Stories about Breaches Caused by Leaked Code
Shaked Klein Orbach
Arik Nachmias
BSides TLV
· 2023
War Stories
Talk
Open →
2023-07
22:47
Behind the Scenes of a Tailor-Made Massive Phishing Campaign
Sarit Yerushalmi
Yohann Sillam
BSides TLV
· 2024
Technical
Malware Analysis
OSINT
Reverse Engineering
Social Engineering
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-08
37:23
Serverless Security Testing: Challenges and Solutions
Tal Melamed
Meir Benayoun
BSides TLV
· 2022
Technical
Cloud IAM
DevSecOps
Vulnerability Research
Technical Deep-dives
Talk
Open →
2022-07
12:30
Tales from the DevSecOps world: SIEM completely as Code
George Tsigourakos
Kyriaki Solomidou
John Torakis
BSides Athens
· 2022
Technical
DevSecOps
Talk
Open →
2022-06
28:35
01 - How We Hacked YC Spring 2025 Batch’s AI Agents
BSides Toronto
Open →
2025-10
30:40
Brandon Helms - Make the Dev Do Your Dirty Work
Brandon Helms
BSides Augusta
Talk
Open →
2019-10
20:11
Entering the Cybersecurity Field as a 17 Year Old
Sully Vickers
BSides Charm
· 2023
Career
CTF
Career & Soft Skills
Intro
Talk
Open →
2023-05
45:29
Service Mesh Security: Shifting Focus to the Application Layer
Daniel Popescu
BSidesSF
· 2025
Technical
Talk
Open →
2025-06
28:19
The Evolution of Auth – From Passwords to AI Agents
Maya Kaczorowski
BSides SLC
· 2025
Technical
AI Security
Cloud IAM
Cryptography
Talk
Open →
2025-06
15:02
Oops!!... Did I Reveal Something? Detecting Leaked Secrets in Azure Deployment Templates
Javan Mnjama
BSides Cape Town
· 2023
Technical
Cloud IAM
DevSecOps
Blue
Red
Talk
Open →
2023-12
18:40
Everyday AI: Leveraging LLMs for Simple, Effective Security Automation
Matthew Sullivan
Dominic Zanardi
BSidesSF
· 2025
Technical
AI Security
Cloud IAM
Detection Engineering
Talk
Open →
2025-10
42:16
The Fellowship of the Ring0: Driver Risk Scoring for Vulnerability Detection
Dana Behling
BSides Charm
· 2024
Research
Technical
Detection Engineering
Malware Analysis
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-06
54:44
G1234! - The Chrome Crusader - Lily Chalupowski
BSides Las Vegas
Open →
2018-09
35:25
Between You and Me and the Network Security Boundary
Patrick Fussell
BSides DC
· 2017
Technical
Red
Talk
Open →
2017-10
28:23
Our Journey of Building a Security Program at a Small Startup - DeFronzo and Erxleben
BSides Boston
Open →
2017-05
20:47
Making Sense of Unstructured Threat Data
Zainab Danish
Nicolas Kseib
BSidesSF
· 2019
Research
Open →
2019-03
6:27:25
Managing Misfits: Lessons Learned from a Decade of Leading Penetration Testing Teams
Chrissy Safi
Nick Britton
BSides Dallas/Fort Worth
· 2020
Career
Career & Soft Skills
Red
Talk
Open →
2020-11
24:24
CrimeOps of the KashmirBlack Botnet: Sarit Yerushalmi and Ofir Shaty
Sarit Yerushalmi
Ofir Shaty
BSides Munich
· 2021
Technical
Advanced
Case Studies and Incidents Analysis
Talk
Open →
2021-06
39:47
Github Actions Security Landscape by Alex Ilgayev
Alex Ilgayev
BSides Dublin
· 2023
Technical
DevSecOps
Talk
Open →
2023-07
49:19
Who Goes There? Actively Detecting Intruders With Cyber Deception Tools
Dwayne Mcdaniel
BSides Boulder
· 2024
Technical
Talk
Open →
2024-09
44:07
Build Yourself an Elastic Threat Hunting and Monitoring SIEM
Ronnie Watson
BSides Huntsville
· 2021
Technical
Talk
Open →
2021-02
9:24
Technical Tactics: Embedded Linux Software BOM
Daniel Beard
BSides Las Vegas
· 2017
Technical
IoT
Supply Chain Security
Vulnerability Research
Talk
Open →
2017-09
46:04
Whose Pipeline Is It Anyway?: Attacks and Defenses in the World of CI/CD
Matt Bosack
Zach Satterly
BSides Philly
· 2023
Technical
DevSecOps
Supply Chain Security
Blue
Red
Talk
Open →
2024-01
49:05
The Hackers Guide To Software Supply Chain Attacks
Mackenzie Jackson
BSides Cheltenham
Technical
Supply Chain Security
Talk
Open →
2024-07
23:09
Infrastructure as Code: Managing Environments with Terraform and Ansible
Charles Bain
BSides Leeds
· 2023
Technical
Cloud IAM
DevSecOps
Talk
Open →
2023-07
22:57
Actions Have Consequences: The Overlooked Security Risks in 3rd Party GitHub Actions
Yaron Avital
BSides Las Vegas
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-10
39:21
Malicious Intent in the Open Source Supply Chain - Ryan Voloch
BSides Peru
Open →
2021-10
15:42
Vulnswatch: Managing Known Vulnerabilities In A Product
Zaur Molotnikov
BSides Munich
· 2018
Technical
Talk
Open →
2018-04
19:03
Lessons learned in automating the incident Life Cycle
Alexander Sinno
Walter Stinkens
BSides Athens
· 2022
Technical
Demo
Talk
Open →
2022-06
22:39
The Antisocial Engineer's Guide to Community Building: Deploying a neighborhood Honeypot
John Ford
BSides Seattle
· 2026
Community
Intro
Talk
Open →
2026-04
22:37
Pay $2 Shipping to Receive Your Free iPhone! — Subdomain Takeover, Malicious JavaScript, and the Art of Deobfuscation
Andy Vermeulen
BSides Sydney
Technical
Malware Analysis
OSINT
Reverse Engineering
Web AppSec
Talk
Open →
2023-08
14:40
Making Big Datasets Searchable by Calum Boal
Calum Boal
BSides London
Technical
OSINT
Threat Intel
Demo
Talk
Open →
2022-01
28:03
Threats Lurking Beneath the Subsurface: Understanding and Analyzing Threats to Windows Subsystem for Linux
Danny Adamitis
BSides Charm
· 2022
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2022-07
49:43
Whodunnit - git repository mysteries
Natalie Somersall
BSides Boulder
· 2024
Technical
DFIR
Supply Chain Security
Technical Deep-dives
Talk
Open →
2024-09
31:00
Secrets Management and the Software Supply Chain: A Maturity Model for Secure Development
Mackenzie
BSides Sydney
· 2023
Technical
DevSecOps
Supply Chain Security
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
+1
Open →
2023-08
29:48
Domain Takeovers For Fun And Profit
Daniel Oates-Lee
BSides Lancashire
· 2023
Technical
DNS Security
DevSecOps
Web AppSec
Intermediary
Red
Demo
Talk
Open →
2023-04
1:26:30
BSides Bucharest Spring Meetup March 2023
BSides Bucharest
· 2023
AI Security
Malware Analysis
Threat Intel
Talk
Open →
2023-03
49:23
Not my server C2: Using trusted sources for C2
Brandon Helms
BSides SATX
· 2020
Technical
Red
Talk
Open →
2020-08
29:04
BSidesSF 2018 - The SecDevOpronomicon (Clint Gibler)
Clint Gibler
BSidesSF
· 2018
Technical
DevSecOps
Talk
Open →
2018-04
43:08
From Prompts to Agents: Building Agentic CVE Analysis Systems
Andrey Lukashenkov
BSides Lisbon
· 2025
Technical
AI Security
Threat Intel
Vulnerability Research
Demo
Talk
Open →
2025-12
37:42
Duck Safari: Hunting CVEs in the Shadows with ShinyLive and DuckDB-WASM
Luis de Sousa
BSides Joburg
Technical
Demo
Open →
2025-09
33:43
The Secure Software Supply Chain Function S3C
Alexandar Andonov
BSides Sofia
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-03
45:08
Unmasking Data Leaks: A Guide to Finding, Fixing, and Prevention
Jordan Wright
BSides SATX
· 2019
Technical
Cloud IAM
Demo
Talk
Open →
2019-09
21:52
BSidesSF 2018 - PostgreSQL Threats and Attacks in the Wild (AJ Bahnken • Forrest Fleming)
AJ Bahnken
Forrest Fleming
BSidesSF
· 2018
Technical
Talk
Open →
2018-04
46:46
What the Function: A Deep Dive into Azure Function App Security
Karl Fosaaen
BSides PDX
· 2024
Technical
Cloud IAM
Talk
Open →
2024-11
29:36
BSides Munich Keynote - InfoSec's Dirty Little Secrets: Jennifer Janesko
BSides Munich
Open →
2021-06
41:19
CrimeOps of the KashmirBlack Botnet
Ofir Shaty
Sarit Yerushalmi
BSides SATX
· 2021
Technical
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-06
24:28
Compromising GitHub repositories through the actions dependency tree
Asi Greenholts
BSides TLV
· 2024
Technical
Supply Chain Security
Red
Demo
Talk
Open →
2024-08
55:26
Broken Arrow 2022: Detangling Digital Domestic Situations
Will Baggett
BSides Augusta
· 2022
Community
Talk
Open →
2022-10
33:07
A Career In Security
Gabriel Mathenge
BSides Nairobi
· 2022
Career
Career & Soft Skills
Intro
Talk
Open →
2022-12
36:04
BSidesSF 2025 - Using AI to Discover Silently Patched Vulnerabilities in Open... (Mackenzie Jackson)
Mackenzie Jackson
BSidesSF
· 2025
Research
Supply Chain Security
Talk
Open →
2025-06
28:39
A New XZ Every Day – The Collapse of OSS Supply Chain Security
Paul Novarese
BSides SLC
· 2025
Technical
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2025-06
42:52
Where Did I Put My Keys? Preventing Data Leaks at Scale with Automation
Joshua Padman
BSides Canberra
· 2025
Technical
Talk
Open →
2025-12
49:26
Sysmon or it Didn't Happen
Gerard Johansen
BSides Charm
· 2024
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2024-06
49:48
Nicholas Roy - OSINT and the Hermit Kingdom
BSides Knoxville
Open →
2021-05
26:49
First Contact with Container Security
Ell Marquez
BSides RDU
· 2021
Technical
Supply Chain Security
Talk
Open →
2021-10
28:27
DevSecOps Culture - Ali Yazdani
Ali Yazdani
BSides Munich
· 2023
DevSecOps
Talk
Open →
2023-10
46:18
Home Alone isn’t scary, it’s inspiration - Dev Dua, Tyron Kemp, Denver Abrey
BSides Cape Town
Open →
2023-09
56:15
Dominating the DBIR Data
Anastasia Atanasoff
Gabriel Bassett
BSides Las Vegas
· 2016
Research
Empirical Research
Methodology
Talk
Open →
2016-08
37:36
Breaking The Cloud: A Tale Of 3 Breaches
Ashish Rajan
BSides London
Technical
Talk
Open →
2024-02
43:45
BSides Rochester 2017: int0x80: Anti Forensics AF
BSidesROC
Open →
2018-01
23:00
Accidental Honeypot: How I Ended Up Receiving Thousands of Emails Meant for No One
Cory Solovewicz
BSides PDX 2025
War Stories
OSINT
Privacy
Intro
Talk
Open →
2025-12
16:40
SaaSquatch Hunters: Threat Detection In The Wild Of SaaS
Julie Agnes Sparks
BSides Dublin
· 2026
Technical
Cloud IAM
Detection Engineering
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-10
30:13
Dissecting Carbanak
Hristo Asenov
BSides Delaware
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-11
35:10
The Protocol Behind the Curtain: What MCP Really Exposes
Srajan Gupta
Vinay Kumar
BSides Las Vegas
· 2025
Research
Technical
AI Security
Vulnerability Research
Web AppSec
Red
Talk
Open →
2025-12
15:48
Most Vulnerable Product: Easy to implement security solutions and strategies for the modern web application stack
Jason Portnoy
Bsides CT
· 2019
Technical
DevSecOps
Web AppSec
Talk
Open →
2019-11
20:54
Nintendon't Look at my GitHub: DMCA Dodging and Other Shenanigans
James Martindale
BSides PDX 2025
Technical
Talk
Open →
2025-12
37:04
Terraform Security: Attacking and Defending Infrastructure as Code
Michael McCabe
BSides Philly
· 2023
Technical
Cloud IAM
DevSecOps
Vulnerability Research
Technical Deep-dives
Talk
Open →
2024-01
4:56:08
Cinema
BSides RDU
· 2019
Open →
2019-10
49:48
CG - All Your Cloud Are Belong To Us - Hunting Compromise in Azure - Nate Warfield
BSides Las Vegas
Open →
2018-09
20:02
PwnSpoof by Daniel Oates-Lee
Daniel Oates-Lee
BSides Dublin
· 2022
Open →
2022-05
28:40
A Practical Guide to Securing OpenShift
Phillip Kramp
Chris Grimm
BSides Charleston
· 2019
Technical
Talk
Open →
2019-11
43:54
Você sabe de onde veio sua IA?
Larissa Fabião da Fonseca
BSides São Paulo
· 2025
Technical
AI Security
Supply Chain Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-06
29:10
The Way From App To Brain: Attack Surfaces Of Smart Medical Infrastructure - Denis Makrushin
Denis Makrushin
BSides Munich
· 2019
Technical
Talk
Open →
2019-03
50:26
DevOps Methods for Patching an Open Source Operating System
Sidney Faber
BSides Peru
· 2021
Technical
Talk
Open →
2021-10
29:07
Logging and Detection for SaaS Applications: GitHub and Snowflake
BSides Denver 2024
Technical
DFIR
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-09
26:32
When authn breaks: real world failures
Maya Kaczorowski
BSides Seattle
· 2025
Technical
Case Studies and Incidents Analysis
Talk
Open →
2025-08
55:15
2024 Security BSides // John Hammond
John Hammond
BSides Cayman Islands
· 2024
Open →
2025-01
45:11
Attacking Modern SaaS Companies
Sean Cassidy
BSidesROC
· 2017
Technical
Talk
Open →
2018-01
41:59
PW - Zero downtime credential rotation
BSides Las Vegas
Open →
2024-09
1:12:01
BSides Knoxville 2018 (Second Track, KEC, afternoon sessions)
BSides Knoxville
· 2018
Technical
OSINT
Intermediary
Red
Talk
Open →
2018-05
27:26
Shift Left With DevSecOps: Scanning Every Single Code Change
Avinash Jain
BSides Charlotte
· 2020
Technical
DevSecOps
Talk
Open →
2020-10
33:14
BSidesMCR 2019: Do I Need To Change The OSS In My Product? Making Informed Decisions. - Alex Burrage
BSides Manchester
Open →
2019-09
40:36
The 2025 BSides Knoxville Badge: Tips, Tricks, and Tribulations
Morgan Rogers
BSides Knoxville
· 2025
Technical
Talk
Open →
2025-07
34:18
Your SOC is doomed to Fail - collapse it and automate
Garry Coldwells
BSides Cayman Islands
· 2022
Technical
Talk
Open →
2022-07
51:57
Samurai WTF Web Testing Framework Reboot
Jason Gillam
Mic Whitehorn-Gillam
Alex Rodriguez
BSides Asheville
· 2018
Technical
Tooling
Web AppSec
Intermediary
Demo
Talk
Open →
2019-03
43:39
A Log4Shell Practice Exploitation Range in the Cloud
Karl Sickendick
BSides SATX
· 2022
Technical
Vulnerability Research
Red
Demo
Open →
2023-03
14:20
From Pipelines To Problems: My Early DevOps Lessons In Security Culture
Prevail Uzodinma
BSides London
· 2025
Technical
Cloud IAM
DevSecOps
Intro
Talk
Open →
2026-03
34:07
The Cloud is for Launching Cyber Attacks
Raymond Cazanese
BSides Philly
· 2020
Technical
Cloud IAM
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2020-12
26:19
Penetration Testing Methodology & Hardware Testing
Chris Dale
BSides Kristiansand
· 2026
Technical
Hardware Hacking
Vulnerability Research
Talk
Open →
2026-02
30:07
The Growing Crisis in CVE Data Quality
Jerry Gamblin
BSidesSF
· 2025
Research
Threat Intel
Vulnerability Research
Case Studies and Incidents Analysis
Policy Analysis
Talk
Open →
2025-10
23:26
Vulnerability Intelligence for All: Say Goodbye to Data Gatekeeping
Jerry Gamblin
BSides Las Vegas
· 2023
Technical
Threat Intel
Vulnerability Research
Talk
Open →
2023-10
23:34
Linux Monitoring with Elastic Security
Mikey McDonald
BSides Augusta
· 2022
Technical
Talk
Open →
2022-10
26:35
Developers, the weakest link in the supply chain?
David Leadbeater
BSides Canberra
· 2025
Technical
Supply Chain Security
Vulnerability Research
Technical Deep-dives
Talk
Open →
2025-12
20:40
Don't Panic! A Guide to Proactive Security for Small Businesses
Ryan St. Germain
Clarissa Bury
BSides Charm
· 2023
Technical
GRC
Threat Intel
Tooling
Blue
Talk
Open →
2023-05
24:30
Bodger and Badger: Making an Interactive RPG Badge
Paul Williams
BSides Newcastle
· 2025
Technical
Hardware Hacking
Talk
Open →
2025-02
36:27
Every Breath You Take: A CTI Review of Stalkerware
Xena Olsen
BSides Porto
· 2020
Research
Technical
Malware Analysis
Mobile Security
Threat Intel
Talk
Open →
2020-11
59:54
Comparing Malicious Files
Robert Simmons
BSides Delaware
· 2018
Talk
Open →
2018-11
19:12
Raiders of the Lost Artifacts: Racing for Hidden Treasures in Public GitHub Repositories
Yaron Avital
BSides Las Vegas
· 2024
Technical
DevSecOps
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2024-09
17:28
The QR Code Conundrum: Navigating Convenience And Cyber Security In The Post-COVID Era
Jack Wise
BSides Bristol
· 2025
Talk
Open →
2025-01
56:30
Threat Hunting and the Surfacing of Mexican Threat Actor Greedy Sponge
Laura Stratton
Jacob Ferris
BSides CDMX
· 2025
Research
Technical
Malware Analysis
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-07
48:14
Home Labbing for Fun and Profit
Trevor Steen
BSides Boulder
· 2024
Career
Talk
Open →
2024-09
50:22
Securing your Open Source Project
Jose Palafox
BSides PDX
· 2023
Technical
Supply Chain Security
Talk
Open →
2023-10
10:49
Shift Left without Losing Your Mind - Practical DevSecOps for Busy Teams - Callian Berends
Callian Berends
BSides Joburg
· 2025
Technical
DevSecOps
Intro
Talk
Open →
2025-09
19:57
What’s The Big Secret? - Graeme Simpson
Graeme Simpson
BSides Cheltenham
Open →
2024-07
53:37
Kubernetes Software Supply (Kill) Chains
Mark Manning
BSides Buffalo
· 2022
Technical
Supply Chain Security
Demo
Talk
Open →
2022-06
41:40
The Joule Thief: A Look Into The Activity Of 'The Cryptominer Champion' Rocke
Joakim Kennedy
BSides Belfast
· 2020
Technical
Talk
Open →
2020-01
27:00
Open Source Vulnerability Intelligence: A Key To Proactive Defense - Jerry Gamblin
BSides Newcastle
Open →
2024-01
26:20
From CISA to Starting Up: Shifting Secure by Design at Scale
Jack Cable
BSides NYC
· 2025
Policy
Technical
AI Security
Supply Chain Security
Vulnerability Research
Talk
Open →
2025-12
50:47
RAG Against the Machine: Using Retrieval-Augmented Generation & MCP to Fortify Cybersecurity Defense
Brennan Lodge
BSides Las Vegas
· 2025
Technical
AI Security
Detection Engineering
GRC
Talk
Open →
2025-12
46:03
Defending Beyond Defense
Dr. Catherine J. Ullman
BSides 312
· 2025
Career
Technical
Detection Engineering
Malware Analysis
Threat Intel
Talk
Open →
2025-11
35:10
Extended threat: how your browser betrays you - John Tuckner
John Tuckner
BSides KC
· 2025
Technical
Threat Intel
Web AppSec
Talk
Open →
2025-06
20:36
Essential Logs Pyramid SIEM
Eric Goldstrom
BSides PDX
· 2023
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-10
24:13
The Dark Playground of CI/CD: Attack Delivery by GitHub Actions
Yusuke Kubo
Kiyohito Yamamoto
BSides Las Vegas
· 2023
Research
DevSecOps
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2023-10
20:10
Building the BSides DC Registration System
Jim Gilsinn
BSides DC 2016
Technical
Tooling
Talk
Open →
2016-11
34:36
What exactly is Supply-chain Levels for Software Artifacts (SLSA)?
Nicole Schwartz
BSides Edmonton
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-10
24:55
Embarking on Your INFOSEC Journey in Military City USA
Alex Kaden Higgins
BSides SATX
· 2024
Career
Career & Soft Skills
Intro
Talk
Open →
2024-06
43:49
2018 BSides Toronto: Joshua Grunzweig
BSides Toronto
Open →
2018-11
52:29
Security and Ops in Startups
Daniel Jeffrey
BSides SLC
· 2017
Technical
DevSecOps
Talk
Open →
2017-06
16:56
Sajeeb Lohani - Efficient Defence Turbocharging Security Workflows
Sajeeb Lohani
BSides Perth
· 2025
Talk
Open →
2025-10
49:29
Are the Bad Guys Already in Your Software Supply Chain? (Spoiler Alert: Yes)
Paul Novarese
BSides Seattle
Technical
Supply Chain Security
Talk
Open →
2025-06
35:41
Paul Ihme - Building a sustainable detector development lifecycle
Paul Ihme
BSides Cayman Islands
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-05
25:53
Prompt Hardener – Automatically Evaluating and Securing LLM System Prompts
Yoshiki Kitamura
Junki Yuasa
Krity Kharbanda
BSides Las Vegas
· 2025
Technical
Tooling
AI Security
Web AppSec
Technical Deep-dives
Demo
Talk
Open →
2025-12
53:55
Misconfiguration Driven Cloud Attacks
Filipi Pires
BSides 312
· 2025
Technical
Cloud IAM
Talk
Open →
2025-07
59:08
Alexander Andersson - Demystifying Cloud Infrastructure Attacks (BSidesFrankfurt 2024)
BSides Frankfurt
Open →
2025-04
26:00
The Triad Nexus Pig Butchering & Money Laundering Network: A Deep Dive - Kasey Best and Zach Edwards
Kasey Best
Zach Edwards
BSides Dublin
· 2025
Talk
Open →
2025-10
29:28
Signed Twice, Broken Never: The Rise of Hybrid PKI
Ganesh Mallaya
BSides Seattle
· 2026
Technical
Cryptography
Technical Deep-dives
Talk
Open →
2026-03
37:04
Building A Data Driven AppSec Programme With Kiln
Dan Murphy
BSides Leeds
· 2020
Technical
Talk
Open →
2020-07
26:39
Gitdigger: Creating Useful Wordlists From Public GitHub Repositories
WiK
Mubix
BSides Las Vegas
· 2013
Technical
Tooling
OSINT
Vulnerability Research
Talk
Open →
2017-01
37:38
Data, Agents And OSINT: You Don't Know What You Don't Know - Ryan Reeves & Zara Perumal
Ryan Reeves
Zara Perumal
BSides Bristol
· 2025
Talk
Open →
2025-01
25:45
Building a sustainable detector development lifecycle
Paul Ihme
BSides Charleston
· 2022
Talk
Open →
2023-01
42:07
SSH Authentication Using User and Machine Identities
Morten Linderud
BSides Oslo
· 2025
Technical
Talk
Open →
2026-03
49:54
Social Forensication: A Multidisciplinary Approach to Successful SE
Joe Gray
BSides KC
· 2019
Technical
Red
Talk
Open →
2019-06
23:46
Adam Jon Foster evildaemond Hunting in the Safari Zone
Adam Jon Foster
BSides Perth
· 2025
Open →
2025-10
57:16
Trust Unearned? Evaluating Certificate Authority Trustworthiness
David J. Bianco
BSides Augusta
· 2023
Research
Cryptography
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-10
21:16
Self-healing K8s: Lessons Learned in Automation of Incident Response
Ross Clarke
BSides Charleston
· 2025
Research
Technical
AI Security
Container Security
Detection Engineering
DevSecOps
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-11
38:09
Sneaky Extensions: The MV3 Escape Artists
Jeswin Mathai
Albin Antony
BSides Sydney
· 2025
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Talk
Open →
2025-02
25:13
The Security Hitchhiker's Guide to API Security
Timothy De Block
BSides Augusta
· 2023
Technical
Web AppSec
Talk
Open →
2023-10
57:09
Signing your code the easy way
Oren Novotny
BSides DC
· 2019
Technical
DevSecOps
Talk
Open →
2019-10
26:26
GitReview: All Git Commits are Reviewed
Jon Debonis
BSidesSF
· 2015
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-12
22:46
Subdomain Hijacking: Why DevOps Is Making Us More Vulnerable by Daniel Oates-Lee & Simon Gurney
Daniel Oates-Lee
Simon Gurney
BSides Dublin
· 2023
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-07
23:50
Tag, You're Leaked: Surviving the tj-actions Supply Chain Attack
Mark Esler
Ashish Kurmi
BSides PDX 2025
Technical
DevSecOps
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2025-12
16:42
Who Makes the Rules?
Meghna Vikram
BSides SLC
· 2024
Research
Technical
AI Security
Vulnerability Research
Web AppSec
Methodology
Technical Deep-dives
Talk
Open →
2024-09
18:26
Threats Against Cloud Application Identities And What You Should Do About Them
Yochana Henderson
BSides Cheltenham
· 2022
Technical
Cloud IAM
Talk
Open →
2022-07
17:06
PG - Can I Code Against an API to Learn a Product? - Adrienne Merrick-Tagore
BSides Las Vegas
Open →
2016-12
13:37
TikTok Under Attack
Guy Nachshon
BSidesROC
· 2023
Technical
Malware Analysis
Social Engineering
Supply Chain Security
Case Studies and Incidents Analysis
Talk
Open →
2024-09
53:47
ZERO-RULES Alert Contextualizer & Correlator
Ezz Tahoun
BSides Las Vegas
· 2024
Technical
AI Security
Detection Engineering
Threat Intel
Blue
Talk
Open →
2024-09
54:53
Augmenting osquery Visibility on Windows Through Reverse Engineering
Guillaume Ross
Marcos Oviedo
BSides Austin
Technical
Talk
Open →
2024-02
39:42
Stop Committing Your Secrets: Git Hooks To The Rescue!
BSides Tampa
Technical
Supply Chain Security
Talk
Open →
2023-03
21:50
Container Confidential: Secrets Management For Modern Applications
Adam Matthews
BSides Leeds
Technical
Talk
Open →
2025-08
27:23
PG - Fun With WebSockets Using Socket Puppet - Mister Glass
BSides Las Vegas
Open →
2017-01
36:55
PW - Harvesting Passwords from Source Code Repositories - Philippe Paquet
BSides Las Vegas
Open →
2016-12
31:50
End-to-end Supply Chain Integrity – Stian Kristoffersen
Stian Kristoffersen
BSides Oslo
· 2025
Technical
Supply Chain Security
Talk
Open →
2026-03
43:09
Stephen Hilt - From Guardian to Threat: The Double Life of Security Tools
BSides Knoxville
Open →
2025-07
23:14
Stop Committing Your Secrets: Git Hooks To The Rescue!
Dwayne Mcdaniel
BSides SLC
· 2022
Technical
DevSecOps
Supply Chain Security
Talk
Open →
2023-01
22:55
From Prompt to Payload: Breaking GenAI with Real World MCP Exploits
Dolev Attiya
BSides TLV 2026
Technical
AI Security
Web AppSec
Red
Talk
Open →
2026-03
35:19
Is API the Next Top Cyber Threat to Your Organization?
Alex Argeris
BSides St. John's
Technical
Vulnerability Research
Web AppSec
Talk
Open →
2025-05
32:38
Mithören: Device for Wireless Peripheral Testing
Michael Wolf
BSides Cincinnati
· 2017
Technical
Wireless Security
Talk
Open →
2017-05
52:00
Pentesting ChatOps
Melanie Rieback
BSides Barcelona
· 2019
Technical
DevSecOps
Tooling
Red
Talk
Open →
2022-01
28:54
CVE Crisis: The State Of The Vulnerability Disclosure Landscape
Jerry Gamblin
BSides Newcastle
· 2025
Policy
Technical
Threat Intel
Vulnerability Research
Talk
Open →
2025-11
27:35
PW - Breachego - Christian Heinrich & Daniel Cuthbert
BSides Las Vegas
Open →
2016-12
30:36
Red Teaming AI Systems for Security Validations
Ankush Gupta
BSides Seattle
· 2026
Technical
AI Security
Threat Modeling
Vulnerability Research
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2026-03
40:39
BG - An Introduction of the Kobra, a Client for the Badger Version 2.0, Providing Tactical Situation
BSides Las Vegas
Open →
2016-12
29:05
Getting On The Same Level: What I Learned Building A Security Table Top Exercise
Dwayne Mcdaniel
BSides SATX
· 2025
Talk
Open →
2025-09
35:14
Ransomware: The Playing Field has Changed
Glen Stacey
BSides St. John's
· 2023
Technical
Malware Analysis
Threat Intel
Talk
Open →
2025-05
26:22
Unseen in the Stack: Mapping Hidden Java Dependencies for Real-World Applications
Oron Gutman
BSides NYC
· 2025
Technical
Supply Chain Security
Vulnerability Research
Talk
Open →
2025-11
42:40
The Declarative Future
Liam Randall
BSides Charm
Technical
Container Security
Detection Engineering
Web AppSec
Keynote
Open →
2021-05
24:39
Shift Left with DevSecOps: Scanning Every Code Change
Avinash Jain
BSides Newcastle
· 2020
Technical
DevSecOps
OWASP
Talk
Open →
2020-11
25:47
United in Defense: Architecting Safe and Trustworthy AI Agents
Rabimba Karanjai
BSides Seattle
· 2026
Technical
AI Security
Supply Chain Security
Threat Modeling
Talk
Open →
2026-03
17:43
Breaking In, Giving Back: My Cyber Security Journey - Tom Coogans
Tom Coogans
BSides Basingstoke
· 2025
Career
Community
Career & Soft Skills
DevSecOps
Intro
Talk
Open →
2025-09
52:49
The Battle for OSINT – Are you Team GUI or Team Command Line?
Tracy Z. Maleeff
Joe Gray
BSides Charm
· 2017
Technical
OSINT
Demo
Talk
Open →
2021-05
48:46
Talking to Devs about NHI Security & Governance
Dwayne Mcdaniel
BSides 312
· 2025
Technical
Talk
Open →
2025-11
46:02
DeceptionOps: Automating Deception Tech - Andrew Waite
BSides Newcastle
Open →
2023-12
35:30
Flex Seal Your CI/CD Pipeline
Ochaun Marshall
BSides Columbus
· 2020
Technical
Cloud IAM
DevSecOps
Blue
Talk
Open →
2020-08
15:32
Atomic Red Team: Testing Your Security Posture
Michael Haag
BSides Boise
· 2020
Technical
Detection Engineering
Threat Modeling
Vulnerability Research
Talk
Open →
2020-02