Sched.com Conference Mobile Apps
BSidesSF 2022
has ended
Create Your Own Event
BSidesSF 2022
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Tickets
Map
Search
or browse by date + venue
Closing Ceremony
Community Organizations
CTF
All
Village
Food & Drink
General
Keynote
Simulcast
Talk
All
OTR
Panel
Village
Workshop
Popular
menu
Menu
Schedule
Speakers
Sponsors
Tickets
Map
Search
Popular Events
#1
Keynote: We Need More Mediocre Security Engineers
#2
Opening Remarks
#3
Avoiding insidious points of compromise in infrastructure access systems
#4
Lunch
#5
Breakfast
#6
Emerging Best Practices in Software Supply Chain Security: What We Can Learn from Google, the White House, OWASP, and Gartner
#7
Happy Hour
#8
Detection-as-code: Why it works and where to start
#9
Read the Fantastic Manual: Writing Security Docs People Will Actually Read
#10
Party
#11
Buying Security: A Client's Guide
#12
Embracing Risk Responsibly: Moving beyond inflexible SLAs and exception hell by treating security vulnerabilities and risk like actual debt
#13
Redefining Threat Modeling: Security team goes on vacation
#14
An Unlikely Friendship: Why Security Engineers and Product Managers Should Be Working Together
#15
Go With The (Work)flow
#16
WireGuard from the ground up
#17
Achieving the Web Isolation Nirvana - How far along are we?
#18
Red Teaming macOS Environments with Hermes the Swift Messenger
#19
Coffee
#20
Crypto & Privacy Village
#21
Registration
#22
Cryptography and Blockchain Security
#23
Sponsor Raffle
#24
Capture the Flag
#25
Lockpick Village
#26
Finding Bugs and Scaling Your Security Program with Semgrep
#27
WISP (Women in Security and Privacy) Meet-up
#28
Keynote: Building sustainable security programs
#29
Lunch
#30
Opening Remarks
#31
Exposed secrets - How public git repositories and docker images expose millions of secrets like API keys and security certificates every year
#32
Breakfast
#33
Closing Ceremony
#34
Practical Threat Hunting With Machine Learning
#35
The CISO Panel Discussion
#36
Burnout: The Weakness to your Security Plan
#37
How to Fake Friends and Find People: A Build-A-Buddy case study
#38
Ooga Booga - Avoiding Reinvention of the Wheel (Useful Security Tools and Lessons to Know)
#39
Attacking and Defending Infrastructure with Terraform: How we got admin across cloud environments
#40
Threat hunting: Using MITRE ATT&CK against Carbanak malware
#41
The power of guardrails: How to slash your risk of XSS in half
#42
Hook, Line and Sinker - Pillaging API Webhooks
#43
So You Think You Can Secure Your Cloud : Red Team Engagements in GCP
#44
Hacker TikTok: Community, Creativity, and Controversy
#45
XSS mitigation: the state of the art
#46
Biohacker: The Invisible Threat
#47
Securing Internal Applications @ Loom
#48
Log in Your Own Eye - Exploiting a Stealthy C2 Channel in Azure Logging Infrastructure
#49
Don't turn your back on Ransomware!
#50
Rise of the Vermilion: Cross-Platform Cobalt Strike Beacon Targeting Linux and Windows
Popular by Type
All Types
Closing Ceremony
Community Organizations
CTF
Food & Drink
General
Keynote
Simulcast
Talk
Village
Workshop
Popular by Day
All days
Saturday, Jun 4
Sunday, Jun 5
Twitter Feed