Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Microsoft Defender for Endpoint
113
talks mention this tool across
56
BSides chapters.
Talks featuring Microsoft Defender for Endpoint
39:16
Next Gen AV vs My Shitty Code
James Williams
BSides Manchester
· 2018
Technical
Malware
Post-Exploitation
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2018-08
42:05
Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale - Ross Bevington
Ross Bevington
BSides Exeter
Technical
Talk
Open →
2024-10
41:25
Command-Line Obfuscation: You Can Run, _and_ You Can Hide
Wietze Beukema
BSides Dublin
· 2024
Technical
DFIR
Detection Engineering
Talk
Open →
2024-06
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
41:33
Stop Writing Malware! The Blue Team Has Done It for You
Alberto Rodriguez
Erik Hunstad
BSides Augusta
· 2022
Technical
Advanced
Red
Talk
Open →
2022-10
51:35
Red Team Handcuffs
Caleb McGary
BSides Seattle
· 2020
Technical
Supply Chain Security
Red
Case Studies and Incidents Analysis
Talk
Open →
2020-11
45:19
Wykorzystanie ATT@CK MITRE Do Wykrywania Technik Stosowanych
Jacek Grymuza
BSides Warsaw
· 2018
Technical
Talk
Open →
2018-10
19:14
Zero2Hero: Red Team Tradecraft
Jordan Jay
BSides Basingstoke
Technical
Red
Talk
Open →
2022-07
28:06
Getting In: Initial Access In 2023 by Tony Gee
Tony Gee
BSides Dublin
· 2023
Technical
Talk
Open →
2023-07
53:00
Keynote: David Kennedy
David Kennedy
BSides Augusta
· 2018
Keynote
Open →
2018-10
31:15
Encrypted Client Hello: What Does This Mean for TLS Connections?
Paul Brears
BSides Cheltenham
· 2023
Technical
Cryptography
Network Security
Privacy
Talk
Open →
2023-06
32:59
EDR Evasion Primer
Jorge Gimenez
BSides Berlin
· 2022
Technical
Active Directory
Malware Analysis
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-02
30:06
Windows Event Forwarding and OSSEC — You can do this!
Robert Wilson
BSides Augusta
· 2018
Technical
DevSecOps
Blue
Talk
Open →
2018-11
46:17
Let's Start Over!
Craig Chamberlain
BSides DC
· 2018
Technical
Demo
Open →
2018-11
3:40:07
Security BSides Warsaw 2025 ścieżka 1 dzień 2
BSides Warsaw 2025
Technical
Advanced
Red
Panel
Open →
2025-11
2:11:51
Building InfoSec Worker Power Through the Labor Movement
Logan Arma
BSides Las Vegas
· 2025
Community
Career & Soft Skills
Talk
Open →
2025-08
29:50
Large NLP Machine Learning Models and Their Upcoming Impact on Cybersecurity
Geoff McDonald
BSides Vancouver
· 2022
Technical
AI Security
Malware Analysis
Threat Intel
Intro
Talk
Open →
2022-07
3:33:32
BSides 2019 Day 1 Track 2
BSides Vancouver
Open →
2019-03
38:01
Living on the Edge: Evicting Threat Actors from Perimeter Appliances
Evgen Blohm
Marius Genheimer
BSides Frankfurt
· 2025
Technical
DFIR
Network Security
Vulnerability Research
Advanced
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2025-12
30:06
BSidesSF 2024 - Effective Detection in Kubernetes Clusters (Shay Berkovich, Oren Ofer)
Shay Berkovich
Oren Ofer
BSidesSF
· 2024
Technical
Talk
Open →
2024-07
52:58
Command-Line Obfuscation: You can run, _and_ you can hide
Wietze Beukema
BSides Prishtina
Technical
Purple
Red
Demo
Talk
Open →
2024-09
40:28
Slipping The Net: Qakbot, Emotet And Defense Evasion
Cian Heasley
BSides Cambridge
· 2024
Technical
Detection Engineering
Malware Analysis
Social Engineering
Blue
Talk
Open →
2024-01
47:19
Bypassing Anti-Virus Using BadUSB by Cristian Cornea
Cristian Cornea
BSides Cheltenham
· 2023
Technical
Talk
Open →
2023-06
43:57
MS SQL Super Quality Logs
Tristan
BSides Perth
· 2023
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Methodology
Technical Deep-dives
Talk
Open →
2023-08
52:58
Dave Kennedy Keynote
Dave Kennedy
BSides Boston
· 2017
Technical
Keynote
Open →
2017-05
27:15
Abusing Azure Arc: From Service Principal Exposed To Reverse Shell
Christian Bortone
BSides Leeds
· 2024
Technical
Active Directory
Cloud IAM
Advanced
Red
Technical Deep-dives
Talk
Open →
2024-07
49:49
Closing the Visibility Gap: Threat Hunting with Hawk in the Microsoft Cloud
Jonathan Butler
Lorenzo
Paul Navarro
BSides Charm
· 2025
Technical
Tooling
Cloud IAM
DFIR
Detection Engineering
Blue
Demo
Talk
Open →
2025-05
39:53
When The Hunter Becomes The Hunted: Using Minifilters To Disable EDRs
Tom Philippe
BSides London
· 2025
Technical
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-02
28:35
BSides Rochester 2018 - Virtualization Based Security Strengths and Weaknesses
BSidesROC
Open →
2018-04
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
· 2024
Research
Technical
Cryptography
Malware Analysis
Reverse Engineering
Advanced
Red
Empirical Research
+2
Open →
2024-04
45:09
Reverse-Shell Fallacy: An introduction into defence evasion techniques
Gerhard Botha
BSides Joburg
· 2024
Technical
Red
Talk
Open →
2024-08
18:00
Dana Baril - Eliminating Alert Fatigue: Reducing False Positives Through Better Engineering
Dana Baril
BSides TLV
· 2020
Technical
Talk
Open →
2020-07
45:34
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
Jason Ostrom
BSides Dallas/Fort Worth
· 2022
Technical
Cloud IAM
Detection Engineering
Threat Modeling
Purple
Technical Deep-dives
Demo
Talk
Open →
2022-11
54:51
Spoofing Commands - Can You Trust Process Creation Logs?
BSides Canberra
· 2024
Technical
Intermediary
Talk
Open →
2024-12
22:45
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides PDX
· 2024
Research
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
42:47
Playing Peekaboo With Runtime In CI/CD Pipelines
Patricia R
BSides London
· 2025
Technical
DevSecOps
Supply Chain Security
Intermediary
Talk
Open →
2026-03
25:01
Windows 11 At Your Service
Michael Bargury
BSidesSF
· 2023
Technical
Cloud IAM
Malware Analysis
Red
Talk
Open →
2023-05
53:27
Unparalleled Remote Desktop Monitoring: Revealing Attackers' Tradecraft
Olivier Bilodeau
Adrian Beron
BSides Augusta
· 2023
Research
DFIR
Malware Analysis
Network Security
Threat Intel
Blue
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2023-10
22:26
Fantastic Cloud Security Mistakes by Sarah Young
Sarah Young
BSides Leeds
· 2023
Technical
Talk
Open →
2023-07
54:45
GT - Reduce, Reuse and Recycle ML Solutions for Security - Ram Shankar Siva Kumar
BSides Las Vegas
Open →
2019-10
36:34
Bypassing Anti-Virus Using BadUSB
Cristian Cornea
BSides Dublin
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Advanced
Red
Demo
Talk
Open →
2023-07
34:30
Unmasked! - Fighting Stealthy Execution Methods Using Process Creation Properties
Philip Tsukerman
Amir Kutcher
BSides TLV
· 2022
Technical
Talk
Open →
2022-07
38:58
Windows Management Instrumentation for Good and Evil
Jaime Geiger
BSides Delaware
· 2017
Technical
Talk
Open →
2017-11
31:15
Unconditionally Conditional – Strong Authentication in Microsoft Entra ID
Don Mallory
BSides Toronto
· 2023
Technical
Active Directory
Cloud IAM
Blue
Talk
Open →
2023-11
41:57
Alexa and Cortana in Windowsland: Hacking an Innovative Partnership
Amichai Shulman
Yuval Ron
BSides TLV
· 2019
Technical
Voice Assistant Security
Vulnerability Research
Intermediary
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-11
45:14
The Art of Infiltration: Leveraging Trusted Relationships
Vladimir Ožura
BSides Zagreb
Technical
Active Directory
DFIR
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2025-03
30:24
BSides Sofia 2025: Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Sofia
· 2025
Technical
Case Studies and Incidents Analysis
Talk
Open →
2025-04
32:09
BSides DC 2019 - Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD
Stephan Borosh
BSides DC
· 2019
Technical
Active Directory
Talk
Open →
2019-10
26:47
Bypassing Antivirus with badUSB: Evading Windows Defender via Keyboard Emulation
Cristian Cornea
BSides Sofia
· 2023
Technical
Hardware Hacking
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2023-03
29:21
Bypassing Anti-Virus Using BadUSB
Cristian Cornea
BSides Cymru Wales
· 2023
Technical
Talk
Open →
2023-04
38:52
Too Many Secrets: You Can Run But You Can't Hide From Windows Forensics
Angie McKeown
BSides Cheltenham
Technical
Blue
Talk
Open →
2024-07
38:39
Microsoft Security Co-Pilot: Do you really need AI in your SOC?
Thomas Dang
BSides Edmonton
· 2024
Technical
Talk
Open →
2024-12
28:20
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Juho Jauhiainen
BSides Dublin
Technical
Talk
Open →
2025-10
27:40
All You Need is Guest
Avishai Efrat
BSides TLV
· 2024
Technical
Cloud IAM
Red
Demo
Talk
Open →
2024-08
39:10
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
Bobby
BSides Dallas/Fort Worth
· 2024
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
42:36
Game Of Codes: QR Thrones, Image Battles, And The Quest For Initial Access
Josh Kamdjou
BSides London
Talk
Open →
2024-02
47:56
SOC Adventures In TiETW
Luke Jones
BSides London
Technical
Talk
Open →
2024-02
34:50
AMSI: O cão de guarda que late mas não morde?
Mario Lobo Romero
BSides São Paulo
· 2025
Technical
Detection Engineering
Malware Analysis
Technical Deep-dives
Talk
Open →
2025-06
31:37
Windows EventLog Persistence: Abusing Event Logs for Undetectable Red Team Access
Fabricio Gimenes
BSides Las Vegas
· 2024
Technical
Malware Analysis
Advanced
Red
Talk
Open →
2024-09
32:23
The Emotional Rollercoaster That Is Penetration Testing
Kurt Pomeroy
BSides Vancouver
· 2022
Career
War Stories
Active Directory
Malware Analysis
Red
Talk
Open →
2022-07
24:20
Rogue - Neil Lines
Neil Lines
BSides Leeds
Technical
Red
Talk
Open →
2020-07
35:47
Navigating AI Security: Identifying Risks & Implementing Mitigations
Simran Kaur
BSides Vancouver Island
· 2025
Technical
AI Security
Cloud IAM
Supply Chain Security
Intermediary
Blue
Talk
Open →
2026-02
51:28
Measures for Securing Privileged Users in M365&Azure Every Organization Should Take by Eric Woodruff
Eric Woodruff
BSides Tampa
Technical
Active Directory
Cloud IAM
Blue
Talk
Open →
2024-05
33:52
What the Log?! So Many Events, So Little Time...
Miriam Wiesner
BSides Luxembourg
· 2019
Technical
Open →
2019-11
45:00
Intelligence Driven Incident Response
Vito Alfano
Artem Artemov
BSides Zagreb
· 2024
Technical
DFIR
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2025-03
43:44
Bridging Clouds and Domains, Expanding Risks
Guillaume Bossiroy
BSides Limburg
· 2026
Technical
Active Directory
Cloud IAM
Blue
Red
Demo
Talk
Open →
2026-04
48:16
Please Waste My Time
Qasim Ijaz
BSides Buffalo
· 2024
Technical
Blue
Talk
Open →
2024-06
17:47
Trouble with the Troubleshooter: A Primer on CVE-2022-30190
Grant Shanklin
BSides KC
· 2022
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-10
33:54
EDR Evasion 101 in a Professional Hacker Red Team
André Lima
BSides Kristiansand 2026
Technical
Detection Engineering
Reverse Engineering
Advanced
Red
Talk
Open →
2026-02
28:24
Fantastic Clear-Text Passwords And Where To Collect Them
Stephan Berger
BSides Munich
· 2025
Technical
Active Directory
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2026-02
23:29
Windows Defender Exploit Guard vs. Unpatched Software and Zero-Day Exploits
Chad Duffey
BSides Toronto
· 2020
Technical
Reverse Engineering
Vulnerability Research
Blue
Talk
Open →
2021-11
55:43
Creating an Effective Security Posture
Dominique Pizzie
BSides SATX
· 2019
Career
Talk
Open →
2019-09
39:00
Thermostats Gone Wild: Gaining Domain Admin from an Unsecured HVAC System
David Ramírez
BSides CDMX
· 2025
Technical
Active Directory
Vulnerability Research
Web AppSec
Red
Talk
Open →
2025-07
27:54
GT - Social Engineering: Training The Human Firewall
BSides Las Vegas
Open →
2023-10
52:34
G1234! - Protecting Windows Credentials: An Excessive Guide for Security Professionals - Mark Burnet
BSides Las Vegas
Open →
2017-08
44:35
Restless Guests: From Subscription to Backdoor Intruder by Simon Maxwell-Stewart
Simon Maxwell-Stewart
BSides Edmonton
· 2025
Technical
Cloud IAM
Red
Technical Deep-dives
Talk
Open →
2025-10
35:13
Hunting from APT to *QL Queries: From approach to tool
Eddy Mota
Edu Vivi
BSides São Paulo
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Demo
Talk
Open →
2025-06
36:56
Practical Defense
Sean Whalen
BSides Cincinnati
· 2017
Talk
Open →
2017-05
39:38
I Know What You Did Last Summer… I'm Still Hacking Your Small Business
Vincent Matteo
BSides KC
· 2022
Technical
Red
Case Studies and Incidents Analysis
Talk
Open →
2022-10
45:18
CrowdStrike
BSides Calgary
· 2022
Technical
Threat Intel
Vulnerability Research
Intro
Blue
Talk
Open →
2022-12
42:47
BSidesCharm 2022 - Log4j From The Trenches - Max Thauer
BSides Charm
Open →
2022-07
49:26
Please Waste My Time - Qasim Ijaz
Qasim Ijaz
BSides KC
Technical
Blue
Talk
Open →
2024-05
51:11
trustno1: Protecting your Data in a Zero Trust World
David Branscome
BSides Charleston
· 2019
Technical
Active Directory
Cloud IAM
Talk
Open →
2019-11
49:15
Doesn't It make You WannaCry: Mitigating Ransomware on a Windows Network
David Branscome
BSides Charleston
· 2018
Technical
Malware Analysis
Network Security
Supply Chain Security
Blue
Demo
Talk
Open →
2018-11
31:06
Escapades in DFIR, An Incident Responder's Reflections
Mark Nakamura
BSides RDU
· 2022
Career
War Stories
DFIR
Detection Engineering
Threat Intel
Blue
Purple
Talk
Open →
2023-03
17:35
Automagic your attack simulation - JJ Widener
JJ Widener
BSides KC
· 2022
Technical
Blue
Talk
Open →
2022-10
44:38
Breaking the Illusion: Bypassing Endpoint Security Controls with Simple Tactics
Blake Hudson
Caleb Sargent
BSides Las Vegas
· 2025
Technical
Detection Engineering
Malware Analysis
Red
Talk
Open →
2025-12
47:26
I Make Them Good Processes Go Bad: Deep Dive on LOLbins & GTFObins
Taylor Kaufman
BSides Buffalo
· 2023
Technical
Blue
Red
Talk
Open →
2023-06
45:50
Threats Versus Capabilities: Building Better Detect and Respond Capabilities
Thomas Fischer
BSides Dublin
· 2022
Technical
Detection Engineering
Threat Intel
Blue
Talk
Open →
2022-05
24:50
PG - Enemy at the Gate, and Beyond: Detecting and Stopping Account Takeover
Yuval Zacharia
BSides Las Vegas
· 2023
Technical
Cloud IAM
Detection Engineering
Threat Intel
Blue
Talk
Open →
2023-10
36:13
Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised
Adam Steed
BSides Philly
· 2017
Technical
Active Directory
Talk
Open →
2017-08
56:35
5 Things that Matter
Dave Kennedy
BSides Charlotte
· 2019
Keynote
Open →
2019-11
47:34
I came in like a wrecking ball
Vincent
BSides SLC
· 2023
Technical
Intermediary
Red
Talk
Open →
2023-06
44:23
My Cyber Sense Is Tingling! Detection Engineering With Free Tools
Matthew Gracie
BSides SATX
· 2025
Technical
Talk
Open →
2025-09
28:52
The World Of Cyber Security, According To Microsoft
Nick Lines
BSides Leeds
Intro
Talk
Open →
2025-08
38:31
Migrating IoT to the Cloud: Security Considerations and Benefits
Jonathan Fisher
BSides SATX
· 2022
Technical
Talk
Open →
2023-03
46:15
A-hunting We Will Go! Adventures in Endpoint Threat Detection
David Branscome
Bsides CT
· 2020
Technical
Blue
Talk
Open →
2020-11
27:39
Don't Panic! CrowdStrike, the Biggest PC Cyber Attack That Never Was & Its Lessons
Gal Urbach
BSides TLV 2024
Technical
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Talk
Open →
2026-03
57:26
From Anonymous User to GA: Azure-to-GitHub-to-Entra ID Escalation
Rogier Dijkman
Stefan Alexander Smit
BSides Limburg
· 2026
Technical
Active Directory
Cloud IAM
Purple
Demo
Open →
2026-04
49:32
The Million Dollar CEO Fraud: Anatomy of a Business Email Compromise
Damien McAndrews
BSides Calgary
Technical
Cloud IAM
DFIR
Threat Intel
Case Studies and Incidents Analysis
Talk
Open →
2024-03
45:36
Agentic AI Malware: Why the Cybersecurity Battle Isn’t Over
Candid Wuest
BSides Las Vegas
· 2025
Technical
AI Security
Malware Analysis
Advanced
Red
Talk
Open →
2025-12
25:21
Mind Management
Eric Woodruff
BSidesROC
· 2023
Technical
Talk
Open →
2024-09
32:54
Wait, there can't be only one?
Michael Kavka
BSides Buffalo
· 2022
Technical
Talk
Open →
2022-06
52:48
Securing the Grid of Tomorrow
Danielle McGuire
BSides 312
· 2025
Technical
Critical Infrastructure Security
IoT
Intermediary
Talk
Open →
2025-11
41:43
Red and Blue Teaming and the Powers Gained! Adversarial Emulation: Jason Maynard
Jason Maynard
BSides Edmonton 2023
Technical
Blue
Red
Demo
Talk
Open →
2023-10
52:58
You Moved to Office 365, Now What?
Sean Metcalf
BSides Charm
· 2019
Technical
Active Directory
Cloud IAM
Blue
Talk
Open →
2021-05
27:06
SOC Like a Genius: Cognitive Agents Delivering Wisdom at Scale
Oudy Even Haim
Sarah Young
BSides Las Vegas
· 2025
Technical
AI Security
Detection Engineering
Threat Intel
Blue
Demo
Talk
Open →
2025-12
47:47
Trust Boundary Theater: Lateral Movement in the Age of Hybrid Cloud
Ian Lin
Chance Pearson
BSides Edmonton
· 2025
Technical
Active Directory
Cloud IAM
Red
Talk
Open →
2025-10
33:29
Rips, Reps and Revelations: Creating Cyber Fire Drills with Atomic Red Team
Paul Michaud
BSidesROC
· 2023
Technical
Detection Engineering
Threat Intel
Purple
Talk
Open →
2024-09
59:30
Ransomware Upheaval: Trends from the Trenches After Colonial Pipeline
Keith Swanson
BSides Greenville
· 2021
War Stories
Case Studies and Incidents Analysis
Talk
Open →
2021-07
33:45
The Unbearable Weight of Commercial Licensing: Combining Closed Systems with Open Source Defense
Keya Arestad
BSides Las Vegas
· 2025
Technical
Blue
Demo
Talk
Open →
2025-12
28:37
Cloud Security anno 2025: Start Secure, Stay Secure
Rhesa Baar
BSides Amsterdam
· 2025
Technical
Cloud IAM
Talk
Open →
2026-01
15:11
The Prevalence of PlugX and Hardening Against It
Will Bailey
BSides Bristol
· 2025
Technical
Malware Analysis
Threat Intel
Talk
Open →
2025-01