BSidesDFW
BSidesDFW
  • Видео 74
  • Просмотров 8 724
U.S. Cybersecurity Laws and Regulations - An Overview of Key Cybersecurity Legislation
BSidesDFW 2024 Track 3 Session 6 - 02 Nov 2024
** Recording started a couple minutes late.
U.S. Cybersecurity Laws and Regulations - An Overview of Key Cybersecurity Legislation
In today's digital landscape, cybersecurity has become a critical concern for organizations, governments, and individuals alike. This paper provides an overview of signifi cant U.S. cybersecurity laws and regulations designed to protect sensitive information and ensure compliance in various sectors. Key federal laws, such as the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act (ECPA), and the Federal Information Security Modernization Act (FISMA), are highlighted for their roles in preve...
Просмотров: 38

Видео

Stature of the Ministry
Просмотров 7День назад
BSidesDFW 2024 Track 2 Session 6 - 02 Nov 2024 Stature of the Ministry How it started vs How it is going. Get a quick history of BSidesDFW. Gain a deeper understanding of our guiding principles. Discovery what we are targeting for the future. Decide how you can help. @0isac0 @hacknotcrime advocate, @DFW_InfoSec contributor, @BSidesDFW coordinator
Building a world-class soc starts with building world-class people
Просмотров 15День назад
BSidesDFW 2024 Track 2 Session 5 - 02 Nov 2024 Building a world-class soc starts with building world-class people There are several methodologies people apply in building a SOC. From my experience, the most successful model is one that focuses on building and taking care of the people who work in it. I'll go over a few of the observations and philosophies that I have picked up along the way tha...
I Hope This Email Finds you Well
Просмотров 22День назад
BSidesDFW 2024 Track 1 Session 5 - 02 Nov 2024 I Hope This Email Finds you Well AI Phishing, MFA Theft, Consent Grant Abuse, and Remediation in O365 & Entra ID. Mack Taff IT Guy focused on Cybersecurity. CEH, CHFI and other stuff.
Attackers Perspective: Dangers of Relying on Marketecture Exploring the Risks and Strategies in ESA
Просмотров 2114 дней назад
BSidesDFW 2024 Track 3 Session 4 - 02 Nov 2024 Attackers' Perspective: The Dangers of Relying on Marketecture Exploring the Risks and Strategies in Enterprise Security Architecture (ESA) As the threat landscape evolves, traditional Enterprise Security Architectures (ESA) struggle to keep up with growing attack surfaces. This talk explores the critical intersection between ESA and Offensive Secu...
AI Security: No hype. Just hacks
Просмотров 4614 дней назад
BSidesDFW 2024 Track 2 Session 4 - 02 Nov 2024 AI Security: No hype. Just hacks AI here, AI there, AI Everywhere. Who is using AI in your organization and how? Where is your information going and how is it being used? What can you do about it? Don't go in unarmed. Learn about the latest resources and techniques used to attack and defend Artificial Intelligence in all its forms (yes, GenAI isn't...
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Просмотров 8714 дней назад
BSidesDFW 2024 Track 1 Session 4 - 02 Nov 2024 Clearing the FOG: Unveiling the Latest Ransomware Trickery FOG ransomware, a newly emerged threat in the cyber landscape, has been causing significant disruptions, especially within educational institutions. At Beazley Security Labs, our research team has been investigating this ransomware group since its appearance in May 2024 and we have conducte...
Threat Modeling: Intro for Security Architecture
Просмотров 12514 дней назад
BSidesDFW 2024 Track 3 Session 3 - 02 Nov 2024 Threat Modeling: Intro for Security Architecture Overview of how to integrate threat modeling as part of annual governance and release security architecture reviews. Threat modeling is a structured approach to identify and prioritize potential security threats to a system, application, or network. It is a proactive measure that helps organizations ...
Security's Effect on the Bottom Line: Corporate Financial Literacy for InfoSec Professionals
Просмотров 3014 дней назад
BSidesDFW 2024 Track 2 Session 3 - 02 Nov 2024 weird video capture flicker at 38-40 minutes. Security's Effect on the Bottom Line: Corporate Financial Literacy for Information Security Professionals Cyber security and information security professionals are trained to communicate risk to other technology professionals. But how do we translate that technical risk to business process owners and ex...
I Knew You Were Trouble
Просмотров 4214 дней назад
BSidesDFW 2024 Track 1 Session 3 - 02 Nov 2024 I Knew You Were Trouble This presentation unfolds a narrative of how a single OSINT pivot, a SHA-1 hash of a TLS certificate, unraveled a network of Lockbit Cobalt Strike servers. Beginning with an unexpected discovery during research on Blackcat ransomware investigation, the talk will highlight how a single pivot led to the identification of 44 re...
EMS and IR Professionals Have a Lot More in Common Than Just a Bunch of Acronyms
Просмотров 4014 дней назад
BSidesDFW 2024 Track 2 Session 2 - 02 Nov 2024 EMS and IR Professionals Have a Lot More in Common Than Just a Bunch of Acronyms EMS and IR professionals are the "first responders" to incidents that people never want to happen. Whether the incident is a ransomware infection at your local hospital; or a respiratory infection caused by a virus that spreads through the air; the people on the front ...
Oh Crap, Do I Need a CNAPP?
Просмотров 1621 день назад
BSidesDFW 2024 Track 1 Session 2 - 02 Nov 2024 no sound for first 2 minutes Oh Crap, Do I Need a CNAPP? In the rapidly evolving world of cloud security, Cloud Native Application Protection Platforms (CNAPPs) have emerged as comprehensive solutions for safeguarding cloud environments. However, the term is often misunderstood, leading to confusion about what a CNAPP truly entails and whether it i...
Switch to Pole Position: What OT Security can achieve by changing the game.
Просмотров 1521 день назад
BSidesDFW 2024 Track 3 Session 1 - 02 Nov 2024 Switch to Pole Position: What OT Security can achieve by changing the game. Security is stuck being the knife in a gunfight. Instead, it should be an enabler of reliable and efficient operations, even safety. This presentation outlines how to get OT Security to Pole Position in the game that really matters. Vivek Ponnada Vivek Ponnada, currently a ...
The Art of Networking
Просмотров 5621 день назад
BSidesDFW 2024 Track 2 Session 1 - 02 Nov 2024 The Art of Networking You have heard that, "It's who you know that matters most", "Networking is a natural behavior", "You should network when you need it" If I tell you that all this is a big lie, would you be willing to listen to the truth ? What if I showed you the art of networking would you be willing to practice it? If the answer is yes, then...
Do you know where your secrets are? Exploring the problem of secret sprawl and management maturity
Просмотров 47Год назад
Do you know where your secrets are? Exploring the problem of secret sprawl and management maturity
You're In... Now what? A LotL discussion
Просмотров 45Год назад
You're In... Now what? A LotL discussion
Let Me In!!! An Overview of RFID Badge Systems and Attacks
Просмотров 158Год назад
Let Me In!!! An Overview of RFID Badge Systems and Attacks
White Phoenix: Beating Intermittent Encryption
Просмотров 62Год назад
White Phoenix: Beating Intermittent Encryption
What the smish!?
Просмотров 502 года назад
What the smish!?
Minimizing AWS S3 bucket attack vectors at scale
Просмотров 2562 года назад
Minimizing AWS S3 bucket attack vectors at scale
Effective DFIR Triage Techniques to Detect Modern Rootkits
Просмотров 1562 года назад
Effective DFIR Triage Techniques to Detect Modern Rootkits
Visual Badge Forgery
Просмотров 552 года назад
Visual Badge Forgery
Cybersecurity Imposter Syndrome and Burnout
Просмотров 872 года назад
Cybersecurity Imposter Syndrome and Burnout
Broken Access Control How to Protect Your APIs Against the World's Top Vulnerability
Просмотров 772 года назад
Broken Access Control How to Protect Your APIs Against the World's Top Vulnerability
Routers HATE This One Neat Trick Exploiting Cisco Smart Routers HATE This
Просмотров 1802 года назад
Routers HATE This One Neat Trick Exploiting Cisco Smart Routers HATE This
Rosetta 2 Keeping Mac Malware Alive for Years to Come
Просмотров 2292 года назад
Rosetta 2 Keeping Mac Malware Alive for Years to Come
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
Просмотров 1742 года назад
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
Intro to API Hacking
Просмотров 2322 года назад
Intro to API Hacking
Container Crisis 3 More Containers More Problems
Просмотров 672 года назад
Container Crisis 3 More Containers More Problems
Unraveling the Russian Snake Turla
Просмотров 2652 года назад
Unraveling the Russian Snake Turla

Комментарии

  • @AnriannaQT
    @AnriannaQT 10 дней назад

    <3

  • @joshuawlawson
    @joshuawlawson Год назад

    Great talk! Thank you!

  • @muio
    @muio Год назад

    Idea flowing, thank you for the demo.

  • @binarywasp
    @binarywasp Год назад

    I know that guy! 😊

  • @jonathanthoresen7646
    @jonathanthoresen7646 Год назад

    Let Me In!!!!

  • @Escalon-
    @Escalon- Год назад

    very informative thank you:)

  • @willemvdk4886
    @willemvdk4886 2 года назад

    Ah what a bummer, no slides...

  • @poisonouscupcakes
    @poisonouscupcakes 2 года назад

    Or at least link to the slides?

    • @jamycasteel1561
      @jamycasteel1561 2 года назад

      Hey. I'm not sure what happened with the slides and the video. I also think that my other comment got removed because it had a link, but the slides are linked from my Twitter and LinkedIn. My name is my username on both services.

  • @sabyasachisahoo8975
    @sabyasachisahoo8975 2 года назад

    Hello BSides,1st thanks for uploading this video,, but could you please recheck this video,because the slides are not visible..could you please reupload the video with correct format. Thanks

    • @jamycasteel1561
      @jamycasteel1561 2 года назад

      Hey. I'm not sure what happened with the slides and the video. I also think that my other comment got removed because it had a link, but the slides are linked from my Twitter and LinkedIn. My name is my username on both services.

  • @mohamedelbaz9288
    @mohamedelbaz9288 2 года назад

    you're awesome 🌷

  • @sydneyhutchison6692
    @sydneyhutchison6692 3 года назад

    Great video!!

  • @JohnnyCiocca
    @JohnnyCiocca 3 года назад

    I felt a little bit dissapointed because the title says "modular approach to penetration testing" but the presentation in itself talks about OSINT - but still gave a thumbs up because this is beautiful <3 would love to see some more about actual pentesting and red teaming on Jupyter Notebooks!

  • @datashark7048
    @datashark7048 4 года назад

    Going all the way from the basics of Jupyter has been helpful. Definitely an underrated tool. I can already see myself using Jupyter for our pen tests.

  • @dozieprosper1651
    @dozieprosper1651 4 года назад

    all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram

  • @dozieprosper1651
    @dozieprosper1651 4 года назад

    all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram all doubts are cleared.all thanks to this great hacker anonymoushack he got me 6btc +14782076047 WhatsApp,Instagram

  • @ferasdour
    @ferasdour 4 года назад

    Woot proud texans!