Loading…
Type: Track 1 clear filter
Friday, May 9
 

9:00am EDT

Vulnerability Exploitation in the Cloud: A Cross-Platform Graph-Based Attack
Friday May 9, 2025 9:00am - 9:45am EDT
Exploring attack paths across AWS, Azure, GCP and OCI. Learn to dissect misconfigurations through graph-mode visualization, map potential attack paths, and implement practical mitigation using open-source tools. Elevate your defense strategy and fortify cloud environments against evolving threats.
Speakers
avatar for Filipi Pires

Filipi Pires

Head of Identity Threat Labs, Segura
I've been working as Head of Identity Threat Labs and Global Product Advocate at Segura, Founder at Black&White Technology, Cybersecurity Advocate, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate. International Speaker at Security and New technologies... Read More →
Friday May 9, 2025 9:00am - 9:45am EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

10:00am EDT

Lessons From a Year in Product Security: Bugs, Vulnerabilities, and Everything In-Between
Friday May 9, 2025 10:00am - 10:45am EDT
After a decade in consulting roles like software engineer and penetration tester, I joined an open-source company to secure its 300+ repositories across numerous platforms. This session highlights key vulnerabilities and lessons learned, with actionable advice for attendees of all backgrounds.
Speakers
avatar for Lorenzo Gallegos

Lorenzo Gallegos

Staff Product Security Engineer, Mattermost
Lorenzo is currently a Staff Product Security Engineer at Mattermost where his responsibilities include security testing, security reviews, secure coding training, bug bounty program, security champions program, security automation, and more. Prior to his role at Mattermost he spent... Read More →
Friday May 9, 2025 10:00am - 10:45am EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

11:00am EDT

Beyond Compliance: How to Build a Cybersecurity Program That Actually Works
Friday May 9, 2025 11:00am - 11:15am EDT
For years, cybersecurity leaders have been caught in a cycle of compliance—chasing checkboxes, aligning to frameworks, and struggling to keep up with ever-changing regulations. But here’s the real question: Are these standards making us more secure, or just more compliant?
Speakers
avatar for Russell Eubanks

Russell Eubanks

Managing Partner, Cyverity
Russell is a Managing Partner at Cyverity, an information security consulting firm specializing in governance and fractional CISO based in Venice, Florida. He is the former CIO and CISO of the Federal Reserve Bank of Atlanta and Principal Instructor and Author with the SANS Institute... Read More →
Friday May 9, 2025 11:00am - 11:15am EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

11:15am EDT

How to kill a robot. Mapping the attack surface.
Friday May 9, 2025 11:15am - 11:30am EDT
Ready to reign in rogue robots? Let's use our hive mind to sting them where it hurts in the circuits. Fuzz sensors, pwn software, lace AI with venom. Crack firmware hives, jam RF, shred control loops. Join the swarm at BSides Knoxville for an electrifying hack fest that'll make bots scatter!
Speakers
avatar for Bobbie Jo Dyar (KweenB)

Bobbie Jo Dyar (KweenB)

KweenB is an ethical hacker and security researcher with a passion for buzzing into the frontiers of cybersecurity. Known for her hands-on research into vulnerabilities, KweenB fuels a hive mind of inspiration, sparking bold, visionary ideas that elevate the hacking community. With... Read More →
Friday May 9, 2025 11:15am - 11:30am EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

1:00pm EDT

KEYNOTE
Friday May 9, 2025 1:00pm - 1:45pm EDT
TBD
Speakers
avatar for Dave Lewis

Dave Lewis

Global Advisory CISO, 1Password
Dave has 30 years of industry experience. He has extensive experience in IT security operations and management. Dave is the Global Advisory CISO for 1Password.He is the founder of the security site Liquidmatrix Security Digest & podcast. He is currently a member of the board of directors... Read More →
Friday May 9, 2025 1:00pm - 1:45pm EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

2:00pm EDT

An Old Hillbilly's Guide to BASH for Pentests: Automating, Logging, and Covering Your Butt
Friday May 9, 2025 2:00pm - 2:45pm EDT
Tired of running the same commands over and over? Wish your notes didn't look like a crime scene? Bash scripting can automate the boring, streamline engagements, and save your butt when things go sideways. Come learn how to hack smarter, not harder, because pentesting should be fun, not tedious!
Speakers
avatar for Adam Compton

Adam Compton

Principal Security Consultant, TrustedSec
Adam Compton has been a programmer, researcher, instructor, professional pentester, father, husband, and farmer. Adam has over 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam's career, he has worked... Read More →
Friday May 9, 2025 2:00pm - 2:45pm EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

3:00pm EDT

From Guardian to Threat: The Double Life of Security Tools
Friday May 9, 2025 3:00pm - 3:45pm EDT
The misuse of open-source red-teaming tools by cybercriminals and nation-states is rising, turning security assets into attack vectors. Tools like Sliver are exploited for advanced threats. Our AI methodology analyzes high-risk tools, enabling organizations to detect/mitigate threats proactively.
Speakers
avatar for Stephen Hilt

Stephen Hilt

Trend Micro
Stephen Hilt is a Sr. Threat Researcher at Trend Micro. Stephen focuses on General Security Research, Threat Actors, Malware behind attacks, and Industrial Control System Security. Stephen enjoys breaking things and putting them back together with a few extra parts to spare. Stephen... Read More →
Friday May 9, 2025 3:00pm - 3:45pm EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

4:00pm EDT

Writing a Modern Assembler
Friday May 9, 2025 4:00pm - 4:45pm EDT
Modern disassemblers are awesome, but assemblers today are little better than they were in the nineties. I'm fixing that by writing one that easily ports to new architectures, saving me a ton of work in embedded systems exploitation.
Speakers
avatar for Travis Goodspeed

Travis Goodspeed

Grateful to be back in Knoxville, Travis Goodspeed spends his days reverse engineering electronics and editing the International Journal of PoC||GTFO. He drives a fleet of Studebakers and enjoys developing X-rays in his home dark room.
Friday May 9, 2025 4:00pm - 4:45pm EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917

5:00pm EDT

Liability Landmines: How Lax Security Measures Can Put Your Business in the Legal Crosshairs
Friday May 9, 2025 5:00pm - 5:45pm EDT
In an era of increasing data breaches, inadequate security isn't just a technical gap, it's a legal ticking time bomb. Learn how seemingly small oversights in access control and data protection can expose businesses to crippling liability, and discover practical steps to minimize your risk.

## Introduction

Businesses of every size are under mounting pressure to protect sensitive data. When an organization's security posture is weak, especially in areas like access control or policy enforcement, the legal consequences can be swift and severe. In this talk, we'll dissect the intersection of cybersecurity and liability, revealing the most common pitfalls that can leave businesses exposed to lawsuits, regulatory fines, and reputational damage.

## Why This Topic Matters

The growing complexity of cybersecurity means that many organizations overlook the legal implications of their security posture. Often, executives view security as a purely technical concern, until an incident happens, and the legal fallout is severe. This session aims to illuminate how specific security failures, especially around access control and privilege management, can directly translate into legal liability.

## What You'll Learn

1. Legal Frameworks & Regulations

Overview of relevant U.S. and international laws, from data protection regulations (GDPR, HIPAA) to newer legislation targeting corporate accountability (such as the SEC's cybersecurity rules).

2. Common Failure Points

How poorly enforced access policies, insider threats, and deficient incident response protocols create liability.

3. Case Studies & Lessons Learned

Real-world examples showcasing the severe financial, operational, and reputational consequences for companies that failed to protect sensitive data.

4. Risk Mitigation Tactics

Best practices for building robust access controls, continuous monitoring, and governance frameworks that stand up in court and regulatory investigations.

## Who Should Attend?

This talk is geared toward anyone responsible for or interested in cybersecurity risk management, security engineers, IT managers, CISOs, compliance officers, and legal professionals. By integrating both the technical and legal viewpoints, attendees will gain a holistic understanding of the steps required to protect not just their data, but their entire organization from crippling liability.
Speakers
avatar for Weslen Lakins

Weslen Lakins

Lewis Thomason, P.C.
Friday May 9, 2025 5:00pm - 5:45pm EDT
The Mill & Mine 227 W Depot Ave, Knoxville, TN 37917
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.