BSidesCharm 2023 - Shakespeare, Bacon, and the NSA - Brendan O’Leary
BSidesCharm 2023 - It’s all Magic(RAT) – A look into recent North Korean nation-state attacks
BSidesCharm 2023 - Blackbox Containers: Container Security in the Enterprise - Kenny Parsons
BSidesCharm 2023 - Measuring Your Zero Trust Maturity - Elizabeth Schweinsberg
BSidesCharm 2023 - Baby Steps to the Future – Evolving into the Next-Gen SOC - Craig Bowser
BSidesCharm 2023 - AD and DNS: A Match Made in Heck - Jim Sykora and Jake Hildreth
BSidesCharm 2023 - Entering the Cybersecurity Field as a 17 Year Old - Sully Vickers
BSidesCharm 2023 - The Action Group Model for Incident Response - Shawn Thomas and Taylor Johnson
BSidesCharm 2023 - Detecting and Triaging Modern Windows Rootkits - Andrew Case
BSidesCharm 2023 - Don’t Panic! A Guide to Proactive Security for Small Businesses
BSidesCharm 2023 - Settle the Score: CVSS Fundamentals - Beth Moseng
BSidesCharm 2023 - Hack Your Brain: Using IR skills to help recover from grief - Marc Muher
BSidesCharm 2023 - Keynote: AI with a Security Mindset - Elissa Shevinsky
BSidesCharm 2023 - Protecting Yourself From Supply Chain Attacks–Trust Is Overrated- Paul Asadoorian
BSidesCharm 2023 - Complexity for complexity’s sake: The bane of cybersecurity programs
BSidesCharm 2023 - Stop the Leak! Adversarial Thinking in Cybersecurity with PRE-ATT&CK- Nick Ascoli
BSidesCharm 2023 - Ten Ways to Frustrate Attackers in 2023 - Justin Palk
BSidesCharm 2023 - Driving Your Own Vulnerability: How to Navigate the Road of BYOD Attacks
BSidesCharm 2023 - Make Better Risk Decisions to Prevent Future Cyber Attacks - Nathan Wenzler
BSidesCharm 2022 - The tribe and the copycat – A look into Pakistani APT campaigns in recent years