BSides CHS 2024 Schedule

Friday, Nov. 1 - Simply Cyber Con

16:00 - 21:00

Simply Cyber Con requires separate registration.


Saturday, Nov. 2 - Main Event

08:30 - 09:00

Check-In / Registration

09:00 - 10:00

Keynote

 

Marcus J. Carey

Principal Research Scientist at ReliaQuest

 

TRACK 1 TRACK 2

10:00 - 10:15

Break

10:15 - 11:00

Recursion is a Harsh Mistress: The Dangers of Building a Recursive Internet Scanner - Joel Moore "A Shell? In the HTTP server response factory? Ok I guess we doin' shells now:" Creating a Secure Web Server from 2 Vulnerable Web Servers (Live Exploit Demos!) - Parker Garrison

11:00 - 11:15

Break

11:15 - 12:00

Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government - Mark Parsons Chasing Whispers: A Pragmatic Review of Adversary Emulation Processes - Kyle Smith

12:00 - 13:30

Lunch Break

13:30 - 14:15

The Hashcat Chronicles: Cracking Passwords Like a Pro - Jon Milkins Shattering Trust: Live Deepfakes and the Fall of Legacy Verification on Facetime and Beyond - Paul Vann

14:15 - 14:25

Break

14:25 - 14:50

The Great Overcomplication - Sam Richman Doe-n't Play Fair: Game Hacking for Security Professionals - Max Harley & Nick Powers

14:50 - 15:00

Break

15:00 - 15:25

From Beans to Breaches: What a Coffee Maker Can Teach Us About Getting Started with Application Security Testing - Lou Vega RCE through the Supply Chain - Matt Phelps

15:25 - 15:35

Break

15:35 - 16:00

Robots aren’t taking over the world, hackers are! - Christina Lawson Transitioning into Tech: The discipline and the practice - Steve McCauley

16:00 - 16:10

Break

16:10 - 16:35

Apply Team Threat Hunting with AI and Automation - Kenneth Peeples Defeating Doubt: How to Empower Early Cyber Professionals and Retain Great Future Talent - Markel Samuel

16:35 - 16:45

Break

16:45 - 17:00

Wrapup
 

Speaker Bios

Marcus J. Carey

Marcus J. Carey is a former Navy Cryptologist who has journeyed into cybersecurity innovation and entrepreneurship. Presently, he is serving as a Principal Research Scientist in the Office of the CTO at ReliaQuest, exploring the intersection of AI and cybersecurity. Driven by a deep passion for crafting technology solutions that enhance cybersecurity for all, Marcus is committed to the development of user-friendly, high-impact cybersecurity solutions.


Joel Moore @TheTechromancer

TheTechromancer is a hacker at Black Lantern Security, headquartered in Charleston. He loves writing Python tools, and is the author of TrevorSpray and BBOT.


Parker Garrison

Independent cybersecurity consultant and serial CTF Winner with experience in the public and private sector Parker Garrison has consistently finished 1st in various CTFs and presented at conferences such as DerbyCon, where he gave a live demonstration of exploit development and bypassing exploit mitigations. He has professional experience in the private and public sectors, as well as an independent consultant.


Mark Parsons

Mark Parsons is a Senior Threat Hunter for Sophos Managed Detection and Response, where he get to identify new and undetected adversaries across the globe. When he’s not threat hunting, Mark heavily enjoys snowboarding (outside of the state of South Carolina) and is a loving dog dad.


Kyle Smith @HeckSec

Kyle, a former financial advisor turned cybersecurity expert, currently serves as a senior cybersecurity analyst for a Fortune 20 company, specializing in offensive operations like penetration testing. His diverse background includes time in the Army National Guard and assisting MSPs in England. Beyond his professional role, Kyle is passionate about mentoring youth, demonstrated by his leadership in organizing a 2023 event at Denhac hackerspace to introduce high schoolers to technology and STEM careers. He holds a Bachelor of Science in Economics from Purdue University.


Jon Milkins @Caveman

Jon is a veteran of the US Army and has been working in cybersecurity for the past 12 years with a primary focus on penetration testing and security assessments, mixing in a near 5 year stint as a Lead SOC Analyst. He is currently working as a Red Teamer / Penetration Tester. In his free time, Jon likes to crack passwords, go hiking with his wife and dogs in the mountains of Vermont, brew hard cider and distill Brandy, and plays tabletop roleplaying games with friends.


Paul Vann

Paul Vann is a cybersecurity expert and the founder of IdentifAI, a company specializing in deepfake detection and prevention. With almost a decade of experience, Paul focuses on safeguarding digital ecosystems, particularly through the development of AI-driven solutions. His work emphasizes the protection of personal data and the ethical use of AI, making him a recognized thought leader in the field. Paul is dedicated to advancing cybersecurity practices and mentoring the next generation of experts.


Sam Richman @Serious Sam

Sam Richman is an Associate Principal Solution Architect at Red Hat, specializing in Zero Trust and DoD ecosystem partnerships. He has more than 20 years of experience in U.S. government enterprise IT, both in the federal service and in multiple industry roles, supporting civilian and Defense Department initiatives such as cybersecurity, agile architecture, application delivery and data integration/analytics.


Max Harley @0xdab0
Max Harley is a senior consultant and red team tool developer at SpecterOps. His passion for cybersecurity and software development has motivated him to release open source tools, focused on offensive data science, payload delivery and JA3. He is a Clemson University alumni and former president of their cybersecurity club, CU Cyber.

Nick Powers @zyn3rgy
Nick is a service architect for the adversary simulation team at SpecterOps. He has experience with providing, as well as leading, red team and pentest service offerings for a large number of fortune 500 companies. Nick has previously presented at Defcon, Wild West Hacking Fest, and instructed trainings at Blackhat. With a career focused on offensive security, a few of his interests and prior research focuses have included initial access techniques, evasive Windows code execution, and targeted cross-protocol relay of NTLM authentication.


Lou Vega @brainthump

Lou is an experienced Application Security Engineer with a passion for uncovering vulnerabilities and pushing software beyond its limits. With a knack for breaking applications and making them behave in ways developers never intended, he is dedicated to strengthening security and safeguarding systems. Outside of his work in cybersecurity, he finds solace in the quiet of the night, capturing stunning photographs of the night sky, blending his technical precision with artistic expression.


Matt Phelps @mats3c

Born and raised in the Milwaukee area, Matt now spends his time in Charlotte, NC with his wife and 5-year old cockapoo Jackson. After twelve years working in IT, he made the switch to Application Security and never looked back. Matt now spends his days digging into web app vulnerabilities, exploitation scenarios, and generative AI security.


Christina Lawson

Christina Lawson is a Research Engineer and Lab Manager at EPRI. She has an Electrical Engineering Bachelors with a concentration in Power systems. She currently works on cyber security projects focused on protecting and monitoring OT systems within the power industry and manages the EPRI Digital Instrumentation & Controls Lab. She is also one of EPRI’s certified drone pilots and unmanned technology researcher.


Steve McCauley

After spending 10 years as a beer brewer Steve McCauley transitioned into IT as a DevOps Engineer about two years ago at the tender young age of 39. Currently working towards a career in DevSecOps, he has been an active member of the Charleston InfoSec Group for about 4 years and volunteered at Charleston B-Sides in 2023.


Kenneth Peeples @shadowbat

Kenneth Peeples has a passion for Cybersecurity and anything open source. He has worked on many initiatives globally for Red Hat/IBM and is currently pursuing a Doctorate in Systems Engineering. Examining problems and providing solutions are enjoyable to him. He has enjoyed concentrating on Zero Trust Architecture, and Artificial Intelligence. Kenneth is currently working on two community projects Kestrel-as-a-Service for Team Threat Hunting and Crowsnest-security for Zero Trust Visualization.


Markel Samuel @markel_samuel0

Markel Samuel is a Cybersecurity and Compliance Auditor with a proven track record of conducting comprehensive cybersecurity compliance assessments across various frameworks including SOC 2 Reporting, PCI-DSS, NIST CSF, HITRUST, FFIEC CAT, and SWIFT Banking. He is experienced in identifying gaps and mitigating risks with Fortune 500 client companies spanning diverse industries such as financial institutions, retail, energy, and information technology. Markel also spends time helping others hone their skills and get into the field.