Track 1 |
Title |
Speaker |
Track 2 |
Title |
Speaker |
08:45 - 09:00 |
Opening Remarks |
BSidesROC Staff |
08:45 - 09:00 |
Opening Remarks |
BSidesROC Staff |
09:00 - 09:50 |
Keynote |
Moose |
09:00 - 09:50 |
Keynote |
Moose |
10:00 - 10:50 |
Forensic Analysis of Microsoft Quick Assist |
Tyler Hudak |
10:00 - 10:50 |
The Risky Business of Risk Illiteracy |
Sean Juroviesky |
11:00 - 11:50 |
Forensics after an object storage breach: Investigating Cloud Storage Misconfigurations and Ransomware Attacks |
Velizar Demirev |
11:00 - 11:50 |
Discord OSINT: Using the Power of Empathy Banana |
Zach Malinich |
12:00 - 01:30 |
Lunch |
Lunch |
Lunch |
Lunch |
Lunch |
01:30 - 01:55 |
Beyond Health Tracking Exploring the Forensic Potential of Oura Ring Data |
Sarah Hayes |
01:30 - 01:55 |
CRXaminer - Deep dive into Chrome extensions (+tool) |
Mark El-Khoury |
02:00 - 02:50 |
Peace, prosperity, and espionage: ASEAN and BRICS targeted by the People’s Republic of China |
Devon Kerr |
02:00 - 02:50 |
Securing the EVSEcosystem |
Danielle McGuire |
03:00 - 03:50 |
DevSecOps isn’t real, it can’t hurt you, and other lies: Lessons learned from letting engineers approve their own pull requests |
Ethan Witherington |
03:00 - 03:25 |
Bridging the Gap Between GRC and Cybersecurity: Strategies for Effective Collaboration |
Kartik Khurana |
|
|
|
03:30 - 03:55 |
OT Security is Hard: Why can’t I do an arp scan? |
Michael Nee |
04:00 - 04:50 |
A Bug Hunter’s Way of Assessing Web Application Security |
Saurabh Singh |
04:00 - 05:00 |
Investigating a Malicious Script in Microsoft Intune: A DFIR Case Study |
Dennis Labossiere |
05:00 - 05:30 |
Closing Remarks |
BSidesROC Staff |
Closing Remarks |
BSidesROC Staff |
|