BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.bsidessatx.com//
BEGIN:VTIMEZONE
TZID:US/Central
BEGIN:STANDARD
DTSTART:20001029T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:CST
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T020000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T020000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:CDT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T020000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-HY7VMZ@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T090000
DTEND;TZID=US/Central:20240608T094500
DESCRIPTION:This talk explores the creation process of a digital certificat
 e\,\nused for identity in protocols such as TLS\, a critical element for s
 ecure online interactions. After submission to a Certificate Authority (CA
 ) there are still many more steps that are necessary before the certificat
 e is ultimately signed and returned to the requester. In this session we w
 ill dive into the processes that go into providing trust with digital cert
 ificates on the Internet.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:The Digital Trust Journey: From Key Generation to Signed Certificat
 e - Carl Mehner
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/HY7VMZ/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-XS9AF8@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T090000
DTEND;TZID=US/Central:20240608T094500
DESCRIPTION:Oh sure\, you read all those posts about "My Home Lab" with all
  the pictures of 19" racks in a garage or basement. But seriously\, how ca
 n you truly utilize your home lab\, not just to learn\, but to boost your 
 career and help you get noticed as being that "Unique Individual" that a c
 ompany really wants to hire! Come join this talk to learn about building a
  Home Lab on a budget AND using it to really get ahead. Your lab should be
  an advantage and a fun learning experience without breaking the bank.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Home Labs for fun and !profit (Put your home lab on your resume!) -
  Kat Fitzgerald
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/XS9AF8/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-TSMEHN@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T090000
DTEND;TZID=US/Central:20240608T094500
DESCRIPTION:Despite more than 3 million unfilled cybersecurity jobs worldwi
 de\, recent college and university graduates are struggling to enter the w
 orkforce. Experienced IT workers struggle to make the jump to cybersecurit
 y roles. What does it really take to make a successful transition to the c
 yber workforce? Chip shares the results of surveying 150 IT hiring manager
 s and supervisors on attitudes about hiring. Including the role of partici
 pation in cyber competitions and “hacking challenges."
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Competitions & Competencies: or “How to Hack your way into the Cy
 ber Workforce!” - Chip Thornsburg
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/TSMEHN/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-UU7ZGB@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T100000
DTEND;TZID=US/Central:20240608T104500
DESCRIPTION:This presentation is for security practitioners who are interes
 ted in learning about the fundamentals of Detection-as-Code and how to bui
 ld a CI/CD pipeline to automate the management of detection rules in secur
 ity tools.\n\nCore concepts and benefits of Detection-as-Code will be cove
 red before walking through the process of building and implementing a CI/C
 D pipeline. A practical threat detection use case will be utilized through
 out the presentation before testing it end-to-end.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:From soup to nuts: Building a Detection-as-Code pipeline - David Fr
 ench
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/UU7ZGB/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-MPEHJU@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T100000
DTEND;TZID=US/Central:20240608T104500
DESCRIPTION:This presentation offers a fresh perspective on imparting digit
 al citizenship education to elementary students by integrating traditional
  folklore into cyber teachings. Weaving captivating tales and timeless wis
 dom with essential cyber safety principles empowers young learners to navi
 gate the digital landscape responsibly. This approach aims to foster a dee
 per understanding of online risks and encourage proactive strategies for s
 afe and ethical online behavior.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Cyber Safeguarding Through Folklore: Engaging Elementary Students i
 n Digital Citizenship Education - Dr. J
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/MPEHJU/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-T78SBG@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T100000
DTEND;TZID=US/Central:20240608T102500
DESCRIPTION:This presentation provides a roadmap for starting a career in I
 nfoSec\, highlighting the importance of both technical and soft skills\, v
 arious educational pathways\, and the rich tapestry of career opportunitie
 s within the field. It stresses the significance of hands-on experience\, 
 certifications\, and community engagement. Attendees are encouraged to emb
 ark on continuous learning and networking to navigate the evolving cyberse
 curity industry.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Embarking on Your INFOSEC Journey in Military City USA - Alec Kaden
  Higgins
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/T78SBG/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-WUEA83@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T103000
DTEND;TZID=US/Central:20240608T105500
DESCRIPTION:I discuss tips and tricks for a successful physical access cont
 rol (badging) system based on my five year stint at a vendor where I insta
 lled\, repaired and upgraded systems installed by my employer and other ve
 ndors
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Access control done right the first time - Tim Clevenger
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/WUEA83/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-VDPH8U@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T110000
DTEND;TZID=US/Central:20240608T114500
DESCRIPTION:This session delves into the indispensable role of financial co
 ncepts such as Know-Your-Customer (KYC) and Anti-Money Laundering (AML) in
  predicting and effectively addressing key areas of the cyber threat lands
 cape. We will highlight the critical need for cybersecurity expertise in c
 omprehending and countering the complex landscape of digital threats\, and
  the current status quo of merging these two worlds.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Navigating the Shadows: The Crucial Intersection of KYC\, AML\, and
  Cyber Threat Intelligence - Jonathan Gonzalez
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/VDPH8U/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-AVVBNT@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T110000
DTEND;TZID=US/Central:20240608T114500
DESCRIPTION:While your internal network gleams under the watchful eye of se
 curity tools\, lurking in the shadows lies a vulnerable reality: your **ex
 ternal attack surface**. Unseen servers\, forgotten cloud instances\, and 
 misconfigured applications - all potential footholds for attackers - remai
 n hidden in the vast expanse of the internet. This presentation arms you w
 ith the tactical expertise to **illuminate these hidden assets** using the
  power of potent reconnaissance tools.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Seeing Outside In: Mapping Your External Attack Surface - Arcadio A
 guilar
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/AVVBNT/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-3VL8JM@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T110000
DTEND;TZID=US/Central:20240608T112500
DESCRIPTION:In this presentation\, we will explore Window’s Data Protecti
 on API (DPAPI) to gain an understanding of how it works and how it is expl
 oited to dump credentials. DPAPI is utilized to encrypt data on a Windows 
 system and is used by various applications like Chrome and Edge’s passwo
 rd managers. We will explore the code and requirements used for data encry
 ption and decryption. Along with ways to abuse DPAPI\, such as establishin
 g Domain Persistence through extracting Domain Controllers’ Backup Key.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:DPAPI - The Spice of Encryption - Jacob Villarreal
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/3VL8JM/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-VETLAV@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T120000
DTEND;TZID=US/Central:20240608T124500
DESCRIPTION:Endpoint security agents for Windows have been explored in grea
 t detail\, but their counterparts for other operating systems are largely 
 undocumented. This talk will focus on the telemetry sources available to E
 DR agents on macOS and Linux to understand how they detect malicious behav
 ior and identify opportunities for evasion.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:EDR Internals for macOS and Linux - Kyle Avery
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/VETLAV/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-MHCJ8F@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T120000
DTEND;TZID=US/Central:20240608T122500
DESCRIPTION:Nation-state actors are actively targeting software developers 
 in open-source software. You will learn in this talk about two recent npm 
 campaigns attributed to a North Korean state-sponsored cyber threat group\
 , the Lazarus Group.  Software developers armed with these details of thei
 r motivations and evolving tactics are better equipped to defend themselve
 s from this serious threat. This talk is intended for all audiences.  No p
 rior knowledge of malicious code or malware is assumed.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Nation-State Threats in the Open-Source Software Supply Chain - Ros
 s Bryant
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/MHCJ8F/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-ZAEA8H@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T123000
DTEND;TZID=US/Central:20240608T131500
DESCRIPTION:Offensive security is an essential part of a cybersecurity prog
 ram\, but it is often misunderstood\, which could lead to not achieving th
 e goals of an organization. An example of a lack of understanding is reque
 sting the wrong type of assessment\, such as an adversary emulation instea
 d of a pentest.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Offensive Security Awareness - Phillip Wylie
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/ZAEA8H/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-RUKWUV@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T130000
DTEND;TZID=US/Central:20240608T134500
DESCRIPTION:Companies face pressing new cybersecurity and cyber risk report
 ing rules from the NYDFS\, SEC & other regulatory reporting agencies. Top 
 of mind items includie material incident disclosure within days. With mult
 iple regulators expecting timely action\, effective risk and incident mana
 gement requires not only insight and agility\, but also a partnership acro
 ss IT/Cybersecurity Compliance and Enterprise risk management functions.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Doubling down on Compliance: Deep Dive into relevant 2024 Cybersecu
 rity Regulations including NYDFS\, SEC\, & Others! - Dirce E. Hernandez
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/RUKWUV/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-7XWUUC@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T130000
DTEND;TZID=US/Central:20240608T134500
DESCRIPTION:In recent years\, the field of cybersecurity has grown exponent
 ially\, becoming increasingly vital in safeguarding our digital infrastruc
 ture. However\, amidst this growth\, one demographic remains underrepresen
 ted – women. Despite their capabilities\, talents\, and contributions\, 
 women in cybersecurity still face barriers and stereotypes. It's time to i
 lluminate their pivotal role in fortifying our digital world and recognize
  them as the unsung heroes of cyberspace.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:Women in Cybersecurity: The Digital Rosie - Women’s Society of Cy
 berjutsu\, Alamo Chapter\, Edith Pena\, Geneva Knott\, Susan Markose\, Hol
 lis Cantrell
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/7XWUUC/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-XFM8DV@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T133000
DTEND;TZID=US/Central:20240608T141500
DESCRIPTION:LLMs are going to destroy the world but until they do let’s t
 ry to understand how they work. The goal of this presentation is to explai
 n to a script kiddie the underlying technologies of how LLMs work. The hop
 e I have for this talk is that understanding LLMs will demystify the buzzw
 ords around AI and help you use this technology in new and innovative ways
 . -> Please read complete abstract in the notes section.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:LLMs for Beginners - JR Hernandez
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/XFM8DV/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-UDWUJZ@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T140000
DTEND;TZID=US/Central:20240608T142500
DESCRIPTION:Cybersecurity Career Ambassadors are building a community of le
 aders motivated to educate people about cybersecurity and cybersecurity ca
 reers.  You showed up at BSides - you are motivated by cybersecurity.  You
  are the person we're looking for.  Come learn about this program sponsore
 d by NIST's NICE\, a program that has White House-level attention.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Cybersecurity Career Ambassadors - A NIST NICE Community of Interes
 t - Karl Sickendick
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/UDWUJZ/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-LMEKAA@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T140000
DTEND;TZID=US/Central:20240608T144500
DESCRIPTION:Your company has total control over your DNS records and system
 s exposed to the Internet.  Tightly managing these resources will protect 
 your brand and your systems.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:DNS and Attack Surface Management - Paul Guido\, CISSP\, CCSP
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/LMEKAA/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-VRHCPP@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T143000
DTEND;TZID=US/Central:20240608T151500
DESCRIPTION:Your metrics are boring and dangerous. Recycled slides with mea
 ningless counts of alerts\, incidents\, true and false positives… SNOOZE
 . Even worse\, it’s motivating your team to distort the truth and subver
 t progress. This talk is your wake-up call to rethink your detection and r
 esponse metrics. You’ll get a practical framework for developing your ow
 n metrics\, a new maturity model for measuring capabilities\, and lots of 
 visual examples of metrics that won’t put your audience to sleep.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:The Fault in Our Metrics: Rethinking How We Measure Detection & Res
 ponse - Allyn Stott
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/VRHCPP/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-SGZFGX@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T143000
DTEND;TZID=US/Central:20240608T151500
DESCRIPTION:Overview of how to integrate threat modeling as part of annual 
 governance and release security architecture  reviews.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Threat Modeling Intro for Security Architecture - Brennan Crowe
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/SGZFGX/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-7YCQZB@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T150000
DTEND;TZID=US/Central:20240608T154500
DESCRIPTION:This presentation will discuss offensive tradecraft that establ
 ishes elevated persistence within an Active Directory environment. We will
  discuss offensive and defensive considerations covering the operational f
 low of technique execution. Additionally\, we will provide guidance on det
 ecting\, triaging\, and recovering from identified domain persistence tech
 niques.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:Domain Persistence- Detection\, Triage\, and Recovery - Joshua Prag
 er
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/7YCQZB/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-UKCUS9@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T153000
DTEND;TZID=US/Central:20240608T155500
DESCRIPTION:Obfuscated\, fileless malware poses a significant challenge to 
 automated detection systems and wastes valuable time during manual analysi
 s. This challenge occurs as the many layers of obfuscation must be unravel
 ed before the true malicious payload is revealed. In this talk\, research 
 will be presented that demonstrates how the tree-sitter parser generator l
 ibrary can be used to write scalable\, accurate\, and attributable detecti
 ons for malicious Powershell and Bash payloads.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Hunting Fileless Malware with Treesitter - David McDonald
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/UKCUS9/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-K9NVQN@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T153000
DTEND;TZID=US/Central:20240608T161500
DESCRIPTION:When assessing AI-related risk\, do we include our vendors' use
  of AI? We don't have to reinvent the VRM wheel: we just have to consider 
 some new factors.  How in the world do we assess AI risk\, and where do we
  start? We will discuss these questions\, new tools\, and creative approac
 hes such as (and not limited to)the NIST AI RMF\, ISO standards 23053 and 
 42001\, contractual considerations\, and legislation like the EU-AI Act to
  help reduce AI risk in the VRM process.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:VRM 201: Effectively Assessing Vendor AI Risk - Chris Honda
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/K9NVQN/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-GP7QCR@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T160000
DTEND;TZID=US/Central:20240608T164500
DESCRIPTION:Start Early\, Stay Safe: The Crucial Role of Cyber in Education
  proposes early cyber safety education in schools & homes through interact
 ive methods. Aimed at educators\, parents & children to address growing cy
 ber threats.
DTSTAMP:20260310T002111Z
LOCATION:Track 2 (Moody Rm 101)
SUMMARY:Start Early\, Stay Safe: The Crucial Role of Cyber in Education - F
 rank Hall
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/GP7QCR/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-3HW3ED@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T160000
DTEND;TZID=US/Central:20240608T164500
DESCRIPTION:Incident detection today is based on protecting the conduit to 
 protect the data inside.  Lack of correlation between APIs and data has le
 ad to high false positive rates that are inundating incident response team
 s.  We present a new approach to data security incident detection and resp
 onse that avoids correlation with the goal of maximizing the real incident
  to false positive ratio.  This approach is particularly useful with APIs 
 that feed RAG and fine tuning models in generative AI.
DTSTAMP:20260310T002111Z
LOCATION:Track 1 (UC Conference Rm A)
SUMMARY:A New Architecture for Data Security to Free Incident Responders fr
 om False Positives - Rob Quiros
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/3HW3ED/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-bsidessatx-2024-LGUUXG@cfp.bsidessatx.com
DTSTART;TZID=US/Central:20240608T163000
DTEND;TZID=US/Central:20240608T165500
DESCRIPTION:Data Security Posture Management (DSPM) is gaining attention an
 d traction within the data security. What are the challenges that DSPM att
 empts to address? How is it different from traditional data security? This
  session will cover DSPM current state\,  reference frameworks\, and lesso
 ns learned from DSPM related projects.
DTSTAMP:20260310T002111Z
LOCATION:Track 3 (Moody Rm 102)
SUMMARY:Unpacking Data Security Posture Management (DSPM) - Coop\, Jennifer
  Fite
URL:https://cfp.bsidessatx.com/bsidessatx-2024/talk/LGUUXG/
END:VEVENT
END:VCALENDAR
