-
Opening Ceremony
- BSides Luxembourg Crew
-
Securing Code, Pipelines
And The Readguard From Cyber Threats
- Ruggero Tonelli
-
Threat Hunting On Linux And Mac
With Auditbeat System Module
- Aaron Jewitt
-
Security Tradeoffs In Elasticsearch
- Philipp Krenn
-
What The Log?!
So Many Events, So Little Time...
- Miriam Wiesner
-
How To Shield An IoT Product
From The OWASP IoT Top 10
- Pablo Endres
-
Excel For Blue Teams
- Didier Stevens
-
Automated Attack Surface Detection
And Information Gathering
- Thorsten Ries
-
A Walk Through Logs Hell
- Xavier Mertens
-
Syslog-ng: Getting Started, Parsing
Messages, Storing In Elasticsearch
- Peter Czanik
-
(Identify) | Protect | Detect | Respond
A Deep Dive Into A High Visibility 2017 Breach
- James Nemetz
-
Where's Wally? Hands-On Thread Hunting
In Elasticsearch Using EE-Outliers
- Daan Raman
-
Telecom Security And A Usecase In SMS Phishing
- Dr. Cu D. Nguyen and Alexandre De Oliveira
-
Recent Advances In
Cloud Security Monitoring
- David Szili
-
What You Most Likely
Did Not Know About Sudo
- Peter Czanik
-
Closing Notes
- BSides Luxembourg Crew