To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
08:00
08:00
60min
Registration Table Opens! - UC Lobby
Track 1 (UC Conf. Rm. A) (2nd Floor)
08:00
60min
Registration Table Opens! - UC Lobby
Track 2 (Moody Rm. 101)
08:00
60min
Registration Table Opens! - UC Lobby
Track 3 (Moody Rm. 102)
08:00
60min
Registration Table Opens! - UC Lobby
Workshops - UC Conf. Rm. B (2nd Floor)
08:00
60min
Registration Table Opens! - UC Lobby
Workshops - UC Conf. Rm. C (2nd Floor)
08:00
540min
Click Here For Info on the All Day Events! | Vendor/Sponsor Alley | Villages: Amateur Radio/Lockpicking/Hardware/Soldering | Challenges/CTFs: Crypto/SnekWars/BSidesSATX 2135 CTF

A Lane for All Things BSides! This lane provides information on all non-talk/workshop specific items, such as villages & more!

Conference
All Day Events in the UC
09:00
09:00
45min
From Evidence to Insight: Digital Forensics Made Easy with FTK Imager
Divi Anand

A corporate espionage case. A suspect. Clues left behind on a machine that doesn't lie. This session dives into the thrilling world of digital forensics using FTK Imager to follow digital breadcrumbs, uncover hidden evidence, and think like an attacker. Learn how free tools, sharp instincts, and smart techniques can turn secrets into stories. Because humans hide things. Computers don’t.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
09:00
45min
Safe in Digital Playgrounds: Protecting Children from Online Predators on Roblox, Minecraft, and Discord
Fredrick F. Hall

With rising cases of adults using Roblox, Minecraft, and Discord to exploit children, this session equips parents, educators, and youth with tools to stay safe. Learn to adjust privacy settings, spot grooming behavior, and respond to suspicious activity. Gain practical strategies and resources to help protect children in online spaces.

In The Beginning
Track 2 (Moody Rm. 101)
09:00
45min
Training Isn't Enough: Hacking Hackers via Flipper Zero + Evil Portals
W. Garrett Myler

W. Garrett Myler has successfully used the Flipper Zero to test the effectiveness of evil portal attacks. You'll be shocked by the demographics (and training!) of the unwitting test subjects he social engineered. Garrett will show you how he used the Flipper Zero and evil portals to conduct his research and what individuals and companies should do to avoid being victims in our modern world of infostealers and credential stuffing.

In the Clouds
Track 3 (Moody Rm. 102)
09:45
09:45
5min
Session Setup Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
09:45
5min
Session Setup Break
Track 2 (Moody Rm. 101)
09:45
5min
Session Setup Break
Track 3 (Moody Rm. 102)
09:50
09:50
45min
I'm A Machine, And You Should Trust Me: The Future Of Non-Human Identity
Dwayne McDaniel

The future of machine identity and access management is the future of security and business resiliency.

Attend this session to:
- Better communicate about why we must do things differently and soon
- Learn how the open-source software community has looked at addressing the identity problem
- Understand what commercial options are available
- Map a path away from the world of long-lived credentials

In the Clouds
Track 3 (Moody Rm. 102)
09:50
45min
Throwback Thursday: How Cybercriminals are Exploiting Old Vulnerabilities and Using Past Scams to Target Us
Anthony Hendricks

Every Thursday, thousands of people flock to X, Instagram, and TikTok to post old photos and their favorite memories as part of #ThrowbackThursday. Not to be outdone, Cybercriminals are doing the same thing. Last year, most vulnerabilities exploited by criminals were from 2020 or earlier, and the most common online scams were repeats of previous years. So, why are criminals using these legacy vulnerabilities and well-known scams? Because they work.

In The Beginning
Track 2 (Moody Rm. 101)
09:50
45min
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
Allyn Stott

It’s coming, and you aren’t ready. Your company’s virtual agent is sending inappropriate messages and handing out customer PII to anyone that asks nicely. And who are they going to call? You. This talk explores the investigation and response process for handling the unique threats to GenAI chatbots.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
10:00
10:00
120min
Pwning Web Apps (Conf. Rm. B)
Phillip Wylie

In this intro to web application penetration testing workshop, participants will learn the basics of web application penetration testing including; methodology, tools, techniques, and resources. The skills taught in this workshop are valuable to aspiring bug hunters for use in bug bounties.

Workshops
Workshops - UC Conf. Rm. B (2nd Floor)
10:00
120min
Tabletop Exercise, Shadows to Stability: Protecting the Community from Disruptive Cyber Attacks (Conf. Rm. C)
Rob Dodson

Blackout Warfare – What happens within a community when a threat actor targets the electric utility. How does this impact other daily life and operations that depend on computer technology to function.

Workshops
Workshops - UC Conf. Rm. C (2nd Floor)
10:35
10:35
15min
Morning Coffee/Vendor Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
10:35
15min
Morning Coffee/Vendor Break
Track 2 (Moody Rm. 101)
10:35
15min
Morning Coffee/Vendor Break
Track 3 (Moody Rm. 102)
10:50
10:50
45min
All Eyes on AI Governance: Perspectives from Security Practitioners
Dirce E. Hernandez

In this presentation, leaders will get a better understanding of how AI governance functions and AI GRC enabled policies can be integrated into their cybersecurity programs and hopefully help them assess their cybersecurity maturity in the process. Furthermore, I will discuss how an effective AI governance program can help anticipate and prevent security breaches.

In the Clouds
Track 3 (Moody Rm. 102)
10:50
45min
Automate All the Things! No-Code Edition (Security Nightmares Included)
Rob Kraus, JR Hernandez

No-code automation tools like n8n, Make, and Zapier are the cool new kids on the block, letting anyone build complex workflows without writing a line of code. Great for business folks and security teams who want to automate the boring stuff! But here's the catch, these platforms come with a side of security headaches. We'll dive into how these tools can elevate your security operations game while also showing how attackers can leverage these capabilities. Come see both sides of the no-code coin!

In The Beginning
Track 2 (Moody Rm. 101)
10:50
45min
Your Info, Their Payday: A Look into the Infostealer Economy
Jonathan Gonzalez

Infostealers are central to today’s cybercrime economy, enabling large-scale credential theft and driving an ecosystem of illicit trade. This talk examines the infostealer lifecycle, the mass resale of stolen data through automated platforms, and how their accessibility sustains a growing criminal market. It also explores the economic structures that enable this malware-as-a-service model and its implications for defenders attempting to cease it's utilizations by adversaries.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
11:35
11:35
5min
Session Setup Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
11:35
5min
Session Setup Break
Track 2 (Moody Rm. 101)
11:35
5min
Session Setup Break
Track 3 (Moody Rm. 102)
11:40
11:40
45min
My Cyber Sense Is Tingling! Detection Engineering With Free Tools
Matthew Gracie

Detection Engineering is the art and science of taking information about potential threats and turning it into automated alerts. In this talk I will discuss using the free and open Security Onion platform to monitor network traffic and logs in your environment and alert you to potentially malicious or suspicious events.

In The Beginning
Track 2 (Moody Rm. 101)
11:40
45min
Securing Open Source: A National Security Imperative
Crystal Beth Poenisch

Neglected, underresourced, or insecure open source code is being weaponized by adversarial nations and threat actors—and it’s putting our infrastructure at risk. As CISA and other regulators join forces with industry to tackle opaque software supply chains, this talk breaks down what’s at stake, what’s in motion, and what defenders and leaders can do to make and use more safe and reliable software.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
11:40
45min
The Human Cost of Cyber Attacks: Beyond the Financial Impact
Jacob Wellnitz

Cybersecurity incidents aren't just about data breaches and financial losses—they deeply affect real lives. Incident responders experience intense burnout and psychological strain, while individuals in impacted communities suffer real-world consequences, including disrupted medical treatments, lost savings, stress, and anxiety from compromised healthcare, power, oil & gas, water, and financial services. This session uncovers the human realities behind cyber attacks.

In the Clouds
Track 3 (Moody Rm. 102)
12:00
12:00
50min
Lunch - UC Cafeteria
Workshops - UC Conf. Rm. B (2nd Floor)
12:00
50min
Lunch - UC Cafeteria
Workshops - UC Conf. Rm. C (2nd Floor)
12:25
12:25
50min
Lunch - UC Cafeteria
Track 1 (UC Conf. Rm. A) (2nd Floor)
12:25
50min
Lunch - UC Cafeteria
Track 2 (Moody Rm. 101)
12:25
50min
Lunch - UC Cafeteria
Track 3 (Moody Rm. 102)
13:05
13:05
120min
Pen-Testing Cloud REST APIs (Conf. Rm. B 🎉)
Rodney Beede

Hands-on workshop of application security pen testing of cloud REST APIs. Covering hacking of OpenStack, Google Cloud, and Salesforce.

Workshops
Workshops - UC Conf. Rm. B (2nd Floor)
13:15
13:15
45min
AI Agents: Augmenting Vulnerability Analysis and Remediation
Peyton Smith

This talk will explore the tangible impact of LLMs in cybersecurity, focusing on how they can be used to automate proactive security workflows at scale using agentic patterns.

We’ll analyze real world case studies to show where AI agents excel and where they fall short. Specifically, we'll discuss how AI agents can be used to augment traditional human-driven processes to expedite vulnerability identification, assessment, and remediation.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
13:15
45min
Hacker Reels: Cyber Cinema Sins
Women's Society of Cyberjutsu, Alamo Chapter, Dr. Melisa Joyner, Dr. Diana Orozco, Elizabeth Amy Posada

Think Hollywood hacks are real? Think again. In this fun and interactive session, we’ll break down famous movie and TV hacking scenes, separate fact from fiction, and reveal how real cyber pros get the job done. From flashy exploits to true-to-life tactics, you’ll walk away entertained, informed, and ready to spot the myths in your next movie night.

In The Beginning
Track 2 (Moody Rm. 101)
13:15
45min
Your AI-Cybersecurity Crash Course
Ryan Rosado

The cyber gap has been as high as 3.5 million people globally, however has anyone actually measured how many people are in cybersecurity? While there aren’t many metrics to go off, as of 2024, it was about 5.5 million globally. With the emergence of AI, this number is about to reset back to zero. I personally keep running into cyber professionals at all levels who say they do not know where to start. This can be Your AI-Cyber Crash Course to enable AI literacy for BSides SATX Attendees

In the Clouds
Track 3 (Moody Rm. 102)
14:00
14:00
5min
Session Setup Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
14:00
5min
Session Setup Break
Track 2 (Moody Rm. 101)
14:00
5min
Session Setup Break
Track 3 (Moody Rm. 102)
14:05
14:05
25min
Bridging the Gap: Empowering Non-Technical Teams in Information Security
Steven Ollek

In today's rapidly evolving digital landscape, information security is no longer the sole responsibility of IT departments. Ensuring robust security and compliance requires the active participation of all employees, including those who may not consider themselves technically proficient. This talk will explore strategies to secure, communicate compliance, and drive intrinsic security behaviors among non-technical staff by demystifying complex concepts & fostering a culture of security awareness.

In the Clouds
Track 3 (Moody Rm. 102)
14:05
25min
Locks, Common Vulnerabilities and Exposures
Radioteacher

Many brand new locks have common and very old vulnerabilities that make them easy to open with the right tools. This interactive presentation will demonstrate a number of common attacks.

In The Beginning
Track 2 (Moody Rm. 101)
14:05
25min
Offensive by Design: GenAI and Docker for the Lazy Hacker
Wes Wright

This talk will demonstrate a practical, real-world integration of Generative AI into offensive security operations. Focusing on improving workflow automation for red teamers, pen-testers, and hybrid operators through structured co-development with GenAI. It also includes humorous stories of the headaches and many bugs experienced along the way. Attendees will walk away with a deeper appreciation for how GenAI can augment security professionals.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
14:30
14:30
5min
Session Setup Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
14:30
5min
Session Setup Break
Track 2 (Moody Rm. 101)
14:30
5min
Session Setup Break
Track 3 (Moody Rm. 102)
14:35
14:35
45min
Detections and Evasions for Configuration Manager Attack Paths
Joshua Prager

The presentation will discuss the Misconfiguration Manager project attack techniques for both an offensive and defensive audience. Additionally, it will discuss detection and evasion techniques in a "Red vs Blue" style format.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
14:35
45min
Identity and Access Management (IAM) - How it all fits together
Pete Babcock

Identity and Access Management (IAM) is more than just accounts and passwords. Here is your chance to understand at a high level what capabilities that IAM provides and how it all fits together.

In the Clouds
Track 3 (Moody Rm. 102)
14:35
45min
Starting Your Homelab
SciaticNerd

This presentation covers the concept and foundation of what a homelab can be used for, and shares one set of options. We'll cover how to connect using current no-cost tools and how to safely connect without opening ports in your home router. Along the way we can learn skills that apply to this ever advancing world. So whether you're a relative beginner, a seasoned professional, or somewhere in-between, there's something for all skill levels in the mix.

In The Beginning
Track 2 (Moody Rm. 101)
15:20
15:20
15min
Afternoon Vendor Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
15:20
15min
Afternoon Vendor Break
Track 2 (Moody Rm. 101)
15:20
15min
Afternoon Vendor Break
Track 3 (Moody Rm. 102)
15:35
15:35
45min
Encrypting Your Infrastructure Without Getting Fired
Matt Moen

As we push things like Kubernetes clusters to edge installations for reduced latency and increased availability, how protected are they against crowbar theft? Encrypting their disks reduces these risks, but then you discover corner cases in production where your servers aren't automatically decrypting, and you've effectively DoSed yourself. Oops. We'll explore an alternative with network-based decryption without escrow or proprietary hardware using the Open Source Linux tools Tang and Clevis.

In the Clouds
Track 3 (Moody Rm. 102)
15:35
45min
Quantifying Breach Impact Mitigation by ZTA
Alexey Malashev

In today's interconnected business world, communication between systems is crucial but also a vector for adversaries. This project evaluates the effectiveness of micro-segmentation in mitigating network breaches within a Zero-Trust model. By comparing segmented and non-segmented environments, the study quantifies the impact of breaches based on attack path depth and total impact score, providing insights for IT decision-making and control selection

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
15:35
45min
Ransomware Response in Action: Lessons from the Frontlines
Aishwarya Desai

Is your incident response team ready for ransomware? This session delivers a technical walk through of how ransomware attacks unfold, from initial compromise to lateral movement and data exfiltration. Through a real-world case study, we’ll explore forensic investigation techniques, containment strategies, and recovery planning. Attendees will gain actionable insights to enhance readiness and reduce dwell time during high-impact incidents.

In The Beginning
Track 2 (Moody Rm. 101)
16:20
16:20
5min
Session Setup Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
16:20
5min
Session Setup Break
Track 2 (Moody Rm. 101)
16:20
5min
Session Setup Break
Track 3 (Moody Rm. 102)
16:25
16:25
25min
Copy, Paste, Compromise: The Danger of ClickFix Attacks
Dalton Ireland

Threat actors are weaponizing trust and urgency in terrifying new ways, and the ClickFix attack is proof. This deceptively simple technique tricks users into executing malware with a single copied command—no exploits, no macros, just human behavior working against itself. If you work in incident response or SOC operations, understanding ClickFix isn’t optional—it’s essential. See why this attack works, how to stop it, and what’s next in the evolving playbook of cyber deception.

In The Weeds
Track 1 (UC Conf. Rm. A) (2nd Floor)
16:25
25min
Getting On The Same Level: What I Learned From Building A Security Table Top Exercise
Dwayne McDaniel

At DEFCON 32, my team taught over 160 people the limitations of manual code review to solve secrets sprawl.
This talk is a quick recap of the surprising findings we unexpectedly gathered and the power of getting away from the keyboard. I will reveal my new theory on driving better conversations across teams and roles to actually try and improve security, and not just show how clever we are.

In the Clouds
Track 3 (Moody Rm. 102)
16:25
25min
What I Learned Mentoring 130+ Cybersecurity Students into Tech
Bonifacio Capuyan

Breaking into cybersecurity can feel overwhelming, especially for those without a traditional background. After mentoring over 130 students including college graduates, career changers from other industries, high school grads, and individuals of all ages I've seen firsthand what it takes to make the leap into tech and security. In this talk, I’ll share the key strategies, mindsets, and resources that consistently helped them succeed.

In The Beginning
Track 2 (Moody Rm. 101)
16:50
16:50
5min
Session Breakdown Break
Track 1 (UC Conf. Rm. A) (2nd Floor)
16:50
5min
Session Breakdown Break
Track 2 (Moody Rm. 101)
16:50
5min
Session Breakdown Break
Track 3 (Moody Rm. 102)
17:00
17:00
45min
Closing Ceremonies - UC Cafeteria
Track 1 (UC Conf. Rm. A) (2nd Floor)
17:00
45min
Closing Ceremonies - UC Cafeteria
Track 2 (Moody Rm. 101)
17:00
45min
Closing Ceremonies - UC Cafeteria
Track 3 (Moody Rm. 102)
17:00
45min
Closing Ceremonies - UC Cafeteria
Workshops - UC Conf. Rm. B (2nd Floor)
17:00
45min
Closing Ceremonies - UC Cafeteria
Workshops - UC Conf. Rm. C (2nd Floor)