Sched.com Conference Mobile Apps
BSidesSF 2022
has ended
Create Your Own Event
Menu
Schedule
Speakers
Sponsors
Tickets
Map
Search
Log in
Sign up
BSidesSF 2022
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Tickets
Map
Search
or browse by date + venue
Closing Ceremony
Community Organizations
CTF
All
Village
Food & Drink
General
Keynote
Simulcast
Talk
All
OTR
Panel
Village
Workshop
Popular
Popular Events
#1
Keynote: Building sustainable security programs
#2
Keynote: We Need More Mediocre Security Engineers
#3
Opening Remarks
#4
Avoiding insidious points of compromise in infrastructure access systems
#5
Lunch
#6
Breakfast
#7
Emerging Best Practices in Software Supply Chain Security: What We Can Learn from Google, the White House, OWASP, and Gartner
#8
Happy Hour
#9
Lunch
#10
Detection-as-code: Why it works and where to start
#11
Read the Fantastic Manual: Writing Security Docs People Will Actually Read
#12
Party
#13
Opening Remarks
#14
Exposed secrets - How public git repositories and docker images expose millions of secrets like API keys and security certificates every year
#15
Buying Security: A Client's Guide
#16
Embracing Risk Responsibly: Moving beyond inflexible SLAs and exception hell by treating security vulnerabilities and risk like actual debt
#17
Redefining Threat Modeling: Security team goes on vacation
#18
Breakfast
#19
An Unlikely Friendship: Why Security Engineers and Product Managers Should Be Working Together
#20
Closing Ceremony
#21
Practical Threat Hunting With Machine Learning
#22
The CISO Panel Discussion
#23
Burnout: The Weakness to your Security Plan
#24
How to Fake Friends and Find People: A Build-A-Buddy case study
#25
Ooga Booga - Avoiding Reinvention of the Wheel (Useful Security Tools and Lessons to Know)
#26
Attacking and Defending Infrastructure with Terraform: How we got admin across cloud environments
#27
Threat hunting: Using MITRE ATT&CK against Carbanak malware
#28
Go With The (Work)flow
#29
The power of guardrails: How to slash your risk of XSS in half
#30
WireGuard from the ground up
#31
Hook, Line and Sinker - Pillaging API Webhooks
#32
So You Think You Can Secure Your Cloud : Red Team Engagements in GCP
#33
Achieving the Web Isolation Nirvana - How far along are we?
#34
Hacker TikTok: Community, Creativity, and Controversy
#35
XSS mitigation: the state of the art
#36
Biohacker: The Invisible Threat
#37
Red Teaming macOS Environments with Hermes the Swift Messenger
#38
Coffee
#39
Securing Internal Applications @ Loom
#40
Crypto & Privacy Village
#41
Registration
#42
Log in Your Own Eye - Exploiting a Stealthy C2 Channel in Azure Logging Infrastructure
#43
Don't turn your back on Ransomware!
#44
Cryptography and Blockchain Security
#45
Sponsor Raffle
#46
Capture the Flag
#47
Lockpick Village
#48
Finding Bugs and Scaling Your Security Program with Semgrep
#49
WISP (Women in Security and Privacy) Meet-up
#50
Rise of the Vermilion: Cross-Platform Cobalt Strike Beacon Targeting Linux and Windows
Popular by Type
All Types
Closing Ceremony
Community Organizations
CTF
Food & Drink
General
Keynote
Simulcast
Talk
Village
Workshop
Popular by Day
All days
Saturday, Jun 4
Sunday, Jun 5
Twitter Feed