BSides CHS 2024 Schedule
Friday, Nov. 1 - Simply Cyber Con
16:00 - 21:00
Simply Cyber Con requires separate registration.
Saturday, Nov. 2 - Main Event
08:30 - 09:00
Check-In / Registration
09:00 - 10:00
Keynote
TRACK 1 | TRACK 2 | |||
10:00 - 10:15 |
Break | |||
10:15 - 11:00 |
Recursion is a Harsh Mistress: The Dangers of Building a Recursive Internet Scanner - Joel Moore | "A Shell? In the HTTP server response factory? Ok I guess we doin' shells now:" Creating a Secure Web Server from 2 Vulnerable Web Servers (Live Exploit Demos!) - Parker Garrison | ||
11:00 - 11:15 |
Break | |||
11:15 - 12:00 |
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government - Mark Parsons | Chasing Whispers: A Pragmatic Review of Adversary Emulation Processes - Kyle Smith | ||
12:00 - 13:30 |
Lunch Break | |||
13:30 - 14:15 |
The Hashcat Chronicles: Cracking Passwords Like a Pro - Jon Milkins | Shattering Trust: Live Deepfakes and the Fall of Legacy Verification on Facetime and Beyond - Paul Vann | ||
14:15 - 14:25 |
Break | |||
14:25 - 14:50 |
The Great Overcomplication - Sam Richman | Doe-n't Play Fair: Game Hacking for Security Professionals - Max Harley & Nick Powers | ||
14:50 - 15:00 |
Break | |||
15:00 - 15:25 |
From Beans to Breaches: What a Coffee Maker Can Teach Us About Getting Started with Application Security Testing - Lou Vega | RCE through the Supply Chain - Matt Phelps | ||
15:25 - 15:35 |
Break | |||
15:35 - 16:00 |
Robots aren’t taking over the world, hackers are! - Christina Lawson | Transitioning into Tech: The discipline and the practice - Steve McCauley | ||
16:00 - 16:10 |
Break | |||
16:10 - 16:35 |
Apply Team Threat Hunting with AI and Automation - Kenneth Peeples | Defeating Doubt: How to Empower Early Cyber Professionals and Retain Great Future Talent - Markel Samuel | ||
16:35 - 16:45 |
Break | |||
16:45 - 17:00 |
Wrapup |
Speaker Bios
Marcus J. Carey
Marcus J. Carey is a former Navy Cryptologist who has journeyed into cybersecurity innovation and entrepreneurship. Presently, he is serving as a Principal Research Scientist in the Office of the CTO at ReliaQuest, exploring the intersection of AI and cybersecurity. Driven by a deep passion for crafting technology solutions that enhance cybersecurity for all, Marcus is committed to the development of user-friendly, high-impact cybersecurity solutions.
Joel Moore @TheTechromancer
TheTechromancer is a hacker at Black Lantern Security, headquartered in Charleston. He loves writing Python tools, and is the author of TrevorSpray and BBOT.
Parker Garrison
Independent cybersecurity consultant and serial CTF Winner with experience in the public and private sector Parker Garrison has consistently finished 1st in various CTFs and presented at conferences such as DerbyCon, where he gave a live demonstration of exploit development and bypassing exploit mitigations. He has professional experience in the private and public sectors, as well as an independent consultant.
Mark Parsons
Mark Parsons is a Senior Threat Hunter for Sophos Managed Detection and Response, where he get to identify new and undetected adversaries across the globe. When he’s not threat hunting, Mark heavily enjoys snowboarding (outside of the state of South Carolina) and is a loving dog dad.
Kyle Smith @HeckSec
Kyle, a former financial advisor turned cybersecurity expert, currently serves as a senior cybersecurity analyst for a Fortune 20 company, specializing in offensive operations like penetration testing. His diverse background includes time in the Army National Guard and assisting MSPs in England. Beyond his professional role, Kyle is passionate about mentoring youth, demonstrated by his leadership in organizing a 2023 event at Denhac hackerspace to introduce high schoolers to technology and STEM careers. He holds a Bachelor of Science in Economics from Purdue University.
Jon Milkins @Caveman
Jon is a veteran of the US Army and has been working in cybersecurity for the past 12 years with a primary focus on penetration testing and security assessments, mixing in a near 5 year stint as a Lead SOC Analyst. He is currently working as a Red Teamer / Penetration Tester. In his free time, Jon likes to crack passwords, go hiking with his wife and dogs in the mountains of Vermont, brew hard cider and distill Brandy, and plays tabletop roleplaying games with friends.
Paul Vann
Paul Vann is a cybersecurity expert and the founder of IdentifAI, a company specializing in deepfake detection and prevention. With almost a decade of experience, Paul focuses on safeguarding digital ecosystems, particularly through the development of AI-driven solutions. His work emphasizes the protection of personal data and the ethical use of AI, making him a recognized thought leader in the field. Paul is dedicated to advancing cybersecurity practices and mentoring the next generation of experts.
Sam Richman @Serious Sam
Sam Richman is an Associate Principal Solution Architect at Red Hat, specializing in Zero Trust and DoD ecosystem partnerships. He has more than 20 years of experience in U.S. government enterprise IT, both in the federal service and in multiple industry roles, supporting civilian and Defense Department initiatives such as cybersecurity, agile architecture, application delivery and data integration/analytics.
Max Harley @0xdab0
Max Harley is a senior consultant and red team tool developer at SpecterOps. His passion for cybersecurity and software development has motivated him to release open source tools, focused on offensive data science, payload delivery and JA3. He is a Clemson University alumni and former president of their cybersecurity club, CU Cyber.
Nick Powers @zyn3rgy
Nick is a service architect for the adversary simulation team at SpecterOps. He has experience with providing, as well as leading, red team and pentest service offerings for a large number of fortune 500 companies. Nick has previously presented at Defcon, Wild West Hacking Fest, and instructed trainings at Blackhat. With a career focused on offensive security, a few of his interests and prior research focuses have included initial access techniques, evasive Windows code execution, and targeted cross-protocol relay of NTLM authentication.
Lou Vega @brainthump
Lou is an experienced Application Security Engineer with a passion for uncovering vulnerabilities and pushing software beyond its limits. With a knack for breaking applications and making them behave in ways developers never intended, he is dedicated to strengthening security and safeguarding systems. Outside of his work in cybersecurity, he finds solace in the quiet of the night, capturing stunning photographs of the night sky, blending his technical precision with artistic expression.
Matt Phelps @mats3c
Born and raised in the Milwaukee area, Matt now spends his time in Charlotte, NC with his wife and 5-year old cockapoo Jackson. After twelve years working in IT, he made the switch to Application Security and never looked back. Matt now spends his days digging into web app vulnerabilities, exploitation scenarios, and generative AI security.
Christina Lawson
Christina Lawson is a Research Engineer and Lab Manager at EPRI. She has an Electrical Engineering Bachelors with a concentration in Power systems. She currently works on cyber security projects focused on protecting and monitoring OT systems within the power industry and manages the EPRI Digital Instrumentation & Controls Lab. She is also one of EPRI’s certified drone pilots and unmanned technology researcher.
Steve McCauley
After spending 10 years as a beer brewer Steve McCauley transitioned into IT as a DevOps Engineer about two years ago at the tender young age of 39. Currently working towards a career in DevSecOps, he has been an active member of the Charleston InfoSec Group for about 4 years and volunteered at Charleston B-Sides in 2023.
Kenneth Peeples @shadowbat
Kenneth Peeples has a passion for Cybersecurity and anything open source. He has worked on many initiatives globally for Red Hat/IBM and is currently pursuing a Doctorate in Systems Engineering. Examining problems and providing solutions are enjoyable to him. He has enjoyed concentrating on Zero Trust Architecture, and Artificial Intelligence. Kenneth is currently working on two community projects Kestrel-as-a-Service for Team Threat Hunting and Crowsnest-security for Zero Trust Visualization.
Markel Samuel @markel_samuel0
Markel Samuel is a Cybersecurity and Compliance Auditor with a proven track record of conducting comprehensive cybersecurity compliance assessments across various frameworks including SOC 2 Reporting, PCI-DSS, NIST CSF, HITRUST, FFIEC CAT, and SWIFT Banking. He is experienced in identifying gaps and mitigating risks with Fortune 500 client companies spanning diverse industries such as financial institutions, retail, energy, and information technology. Markel also spends time helping others hone their skills and get into the field.