We chose SecOps as a general theme this year because we believe that performing basic security operations is the most important thing you can do as a security professional. Most issues tend to fall back to misconfigurations, a lack of monitoring, and just a general lack of process.
We are looking for talks that present the following types of topics:
Top configurations for configuring your small network
How to work safely with containers and container environments
What is the CIS Benchmark
The best way to securely configure <pick your favorite thing>
What is the CyberSecurity Framework and why would you care
What is a good approach for data security
How does basic backup and recovery fit into a security program
What should I be logging and monitoring if I am not doing a thing right now
What are the top items I should be monitoring
How to make compliance useful
How do you write a good incident handling process/playbook
What are the best FOSS cyber tools
If you are supporting a DevOps team where does security fit in
What does a SecOps program look like – what roles, tools, and processes do I need
How can I implement user behavior analysis on a budget
What will a SIEM look like in 2020
What is different with cloud security – especially in a hybrid environment
What are the best ways to make sure you SecOps are working
The areas or domains of security and why they matter (have you thought about physical security lately)
We have dedicated an entire track to more detailed demonstrations, hands-on, and just more time to talk about how things really work.
This is an opportunity for you to show everyone more than just some slides. Think of it as a security science fair.
Show how to use your favorite tool in Kali from beginning to end
Perform some static analysis on a code sample and then correct an example vulnerability
Don’t just talk about reading net-flow logs but show people what tools to use and what to look for
Run through your own top 20 security list for securing containers
Securely configure that home switch the way you are supposed to
Open that Bluetooth door lock
Intercept some airwaves and show people why this area of security is even more important than evert
Bring in your favorite hardware
We want a half a dozen presenters to have a very short presentation to tell everyone what they will be demonstrating then spend the rest of the day showing off. It will be a chance to mingle and talk to people who are passionate about what they do while they are doing it.
We already have a Raspberry Pi Zero W in our Hacker Everyday Carry stash but we didn’t have any way to power it. So how can you supply enough power to the Pi Zero for it to operate at least a day? Get a battery pack of course.
The Pi Zero W uses anywhere from 100mA to 240mA depending on what is being processed and if the Wi-Fi is turned on. So the power usage is around 200mA. We don’t really have to pull out our power formulas to figure this out. The Anker USB Charger has 13,000mAh available. 13,000mAh/200mA = 65h (65 hours). We know we shouldn’t run the pack down to nothing so it looks like we can run the Pi Zero for a couple of days on this pack without any trouble. Is that cool or what?
So which battery goes in the bag?
Anker PowerCore 13000 Portable Charger
Phone Charger Power Bank with PowerIQ and VoltageBoost
Micro USB cable
Don’t forget to follow us on @BsidesCHA and watch this blog for more updates.
Tickets are also on sale so pick you up several for you and for your friends. See you there.