Sched.com Conference Mobile Apps
BSides Atlanta 2020
has ended
Create Your Own Event
BSides Atlanta 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Map
Search
or browse by date + venue
Closing remarks
Connect
Detect
Keynote
Opening Remarks
Paid Training
Panel
Protect
Sponsors
Popular
menu
Menu
Schedule
Speakers
Sponsors
Exhibitors
Map
Search
Popular Events
#1
Pivot Into Pentesting - Coalfire LABS
#2
Malware Reverse Engineering Class - ECCouncil
#3
Keynote address
#4
Opening remarks
#5
Wrapup & Giveaways
#6
Conquering the Cloud: Defense-in-Depth Strategies for Amazon Web Services
#7
How to build your own SIEM with open source tools and methodologies
#8
Manuals for Herding Clouds: Free tools for improved security
#9
What to expect when you are expecting a pen test
#10
Exploiting OAuth 2.0 and OpenID Connect: Lessons Learned from Bug Bounty Programs
#11
Automated Web Application and API Discovery and Other Things That Sound Simple but Are Actually Difficult
#12
Connecting the Dots, Detecting Threats, and Protecting the Enterprise With Security Onion
#13
Serverless Password Cracking or: How I Learned to Stop Worrying and Love AWS
#14
The Hacker Hippocampus: Meet your brain on games
#15
Expose Yourself Without Insecurity: Cloud Breach Patterns
#16
Cybersecurity Merger and Acquisition Due Diligence
#17
Compromising Containers and Clusters
#18
From 0 to red team — what does the red team do and when/why do I need one?
#19
How to Give Good Resume!
#20
Look! There’s a Threat Model in My DevOps
#21
Crypto-Agility: Responding Quickly to Cybersecurity Events
#22
Low Tech & Insecure: Building Healthy Boundaries & Defeating Imposter Syndrome
#23
Binary Defense
#24
Secure Code Warrior CTF Kickoff
#25
Realigning From Chaotic Evil
#26
Software Supply Chain Threat Detection
#27
The Men Who Never Were: Assessing Ties Between the Samsam Ransomware Campaign and the IRGC
#28
Diversity in STEM panel
#29
How to Use Code Signing to Protect your Critical Software Infrastructure
#30
Bishop Fox
#31
Flex Seal your CI/CD Pipeline
#32
Coalfire
#33
Kenna Security
#34
Synopsys
#35
NCCGroup
#36
GuidePoint Security
#37
Critical Path
#38
Corelight
Popular by Type
All Types
Closing remarks
Connect
Detect
Keynote
Opening Remarks
Paid Training
Panel
Protect
Sponsors
Popular by Day
All days
Friday, Mar 27
Saturday, Mar 28