Sched.com Conference Mobile Apps
BSidesSF 2024
has ended
Create Your Own Event
BSidesSF 2024
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Map
Speakers
Sponsors
Tickets
Search
or browse by date + venue
AI
Birds of a Feather
Community Organization
Detection & Response
Food & Drink
All
Bar
Embarcadero
General
Keynote
Panel
Podcast
Presentation
Privacy & Governance
Protective & Corrective Security Controls
Remarks
Security Leadership & Culture
Security @ Scale
Usable Privacy & Security
Village
All
CTF
Village Talk
Village Workshop
Workshop
Popular
menu
Menu
Schedule
Speakers
Sponsors
Tickets
Search
Popular Events
#1
π¬ TL;DR: Applying AI to Security
#2
π¬ Navigating the AI Frontier: Investing in AI in the Evolving Cyber Landscape
#3
π¬ Opening Remarks
#4
π¬ LLMs at the Core: From Attention to Action in Scaling Security Teams
#5
π¬ Insecurity protocols: an overview of modern authentication
#6
Party
#7
π¬ Security Considerations for Services Using AI Models
#8
π€ Titans of Scale: Strategies to Scale Security in Expanding Organizations
#9
π€ From Hacking to C-Suite: Navigating the Labyrinth of Security Careers
#10
Happy Hour
#11
Lunch
#12
π¬ Attacking & Defending Supply Chains. How we got Admin in your Cloud, Again
#13
π¬ Protecting data vs systems: practicality, performance, and problems solved
#14
Breakfast
#15
π¬ Decoding Fraud: The Evolution and Impact of Netflix's Fraud Metrics
#16
π¬ The Secret Life of Secrets
#17
π¬ Heard you liked access, so we built Access to manage your access for Access
#18
π¬ Advanced Persistent Teenagers: Understanding the Lapsus$ Playbook
#19
π¬ One-Click Code Fix: Securing Code Using AI
#20
π¬ LLM Privacy Paradox: Balancing Data Utility with Security
#21
π¬ Hook, Line, and Tinker: A Dive into Phishing Campaign Sites
#22
π¬ Reinventing ETL for Detection and Response Teams
#23
π¬ Skynet the CTI Intern: Building Effective Machine Augmented Intelligence
#24
π€ Combating Generative AI's Privacy Abuses
#25
π¬ Effective building blocks for securing multi-tenant Kubernetes clusters
#26
π¬ Six Years in Review: Transforming Company Culture to Embrace Risk
#27
π¬ Unlocking the Future: AI is the Key to CISOs Top Challenges
#28
πͺΏ Why Everyone Hates Vulnerability Management & How to Make Better
#29
π¬ Opening Remarks
#30
π¬ Army of Proxies! How Netflix scales identity based zero trust architecture
#31
π¬ Insane in the Supply Chain: Threat modeling for attacks on AI systems
#32
π¬ Finetuning Large Language Models (LLMs) for Security Log Detections
#33
π¬ Closing Ceremony
#34
π¬ Startup Security, 2nd Edition
#35
π€ Founders R Us: Tales from recent security CEOs
#36
π¬ Securing Generative AI: Is it all an Illusion?
#37
π¬ Effective security on a tight budget
#38
Breakfast
#39
π¬ 5 security startup pitches to raise money and eyebrows
#40
Lunch
#41
π¬ Imperfect Security: Doing Less to Achieve Better Security
#42
π¬ Effective Detection in Kubernetes Clusters
#43
πͺΏ Harnessing Human Behavior: How to Truly Influence Secure Behavior
#44
π¬ Cybersecurity meets Generative AI: Automating Your Compliance Operations
#45
π¬ Pushing Boundaries: Journeys to the top of Security Engineering
#46
π¬ AiIAM: Transforming the Democratized AWS IAM Architecture with LLMs
#47
π¬ How to Secure Cloud Machine Identities
#48
π¬ Long Live Short Lived Credentials - Auto-rotating Secrets At Scale
#49
π¬ Next-Gen Detection: Harnessing LLMs for Sigma Rule Automation
#50
π¬ PirOps: What 18th-Century Piracy can Teach Us about SecOps
Popular by Type
All Types
AI
Birds of a Feather
Community Organization
Detection & Response
Food & Drink
General
Keynote
Panel
Podcast
Presentation
Privacy & Governance
Protective & Corrective Security Controls
Remarks
Security Leadership & Culture
Security @ Scale
Usable Privacy & Security
Village
Village Talk
Village Workshop
Workshop
Popular by Day
All days
Saturday, May 4
Sunday, May 5