Knowledge

Security BSides

Source 📝

544: 32: 150:, and hybrid. BSides falls into the unconference, or anti-conference, event style and is completely attendee driven. Attendees appear at a predetermined time, discuss ideas, and collaboratively agree upon what the schedule will look like for that day. Talks that get the most attention and conversation get added to the schedule. 142:
Over time the conference format matured and was released to enable individuals to start their own BSides conferences. The Las Vegas BSides conference is also considered part of Hacker Summer Camp given its schedule and proximity to other security conferences during that time.
131:(commonly referred to as BSides) is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack Daniel, and Chris Nickerson in 2009. Due to an overwhelming number of presentation submissions to 448: 374: 398: 347: 321: 452: 273: 585: 498: 604: 248: 96: 68: 578: 473: 135:
USA in 2009, the rejected presentations were presented to a smaller group of individuals. The event was named after the
75: 115: 619: 49: 571: 82: 449:"Growing InfoSec "Unconference" Exceeds 20 Global Events This Year & Expects 400 Attendees in San Francisco" 53: 64: 325: 609: 297: 423: 42: 614: 399:"BSides Cairo: The security conference that's building information sharing from the ground up" 224: 89: 199: 524: 8: 559: 164: 132: 551: 159: 136: 20: 555: 598: 147: 348:"Top cybersecurity conferences for when Black Hat and RSA aren't right" 424:"What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas" 322:"Network Security Blog » Have you signed up for Security BSides?" 179: 31: 543: 174: 169: 274:"After 10 Years And 600 Events, Security BSides Keeps Growing" 529: 375:"More than 200 attend Idaho Falls cybersecurity conference" 146:
Of the three standard conference event styles, structured,
56:. Unsourced material may be challenged and removed. 249:"Becoming jaded with Security BSides' Jack Daniel" 499:"Security B-Sides: Rise of the 'Anti-conference'" 596: 579: 403:The Daily Swig | Cybersecurity news and views 19:"BSides" redirects here. For music term, see 586: 572: 474:"Security BSides Grows, But Not Too Much" 200:"B-Sides: A Grassroots Security Movement" 116:Learn how and when to remove this message 197: 496: 597: 372: 345: 538: 54:adding citations to reliable sources 25: 13: 271: 198:Bradbury, Danny (7 October 2016). 14: 631: 518: 542: 346:Loshin, Peter (29 August 2017). 30: 490: 466: 441: 416: 41:needs additional citations for 16:Information security conference 391: 366: 339: 314: 290: 265: 241: 217: 191: 1: 605:Computer security conferences 373:HUNTER, ILEANA (2022-10-08). 298:"Security BSides / FrontPage" 185: 558:. You can help Knowledge by 497:Brenner, Bill (2010-02-24). 7: 153: 10: 636: 537: 137:"B-side" of a vinyl record 18: 225:"BSides / BSidesHistory" 620:Computer security stubs 302:www.securitybsides.com 229:www.securitybsides.com 50:improve this article 352:TechTarget Security 610:Hacker conventions 567: 566: 552:computer security 160:Hacker conference 126: 125: 118: 100: 65:"Security BSides" 21:A-side and B-side 627: 588: 581: 574: 546: 539: 525:Official Website 513: 512: 510: 509: 494: 488: 487: 485: 484: 470: 464: 463: 461: 460: 451:. Archived from 445: 439: 438: 436: 435: 420: 414: 413: 411: 410: 395: 389: 388: 386: 385: 370: 364: 363: 361: 359: 343: 337: 336: 334: 333: 324:. Archived from 318: 312: 311: 309: 308: 294: 288: 287: 285: 284: 272:Vamosi, Robert. 269: 263: 262: 260: 259: 245: 239: 238: 236: 235: 221: 215: 214: 212: 210: 195: 121: 114: 110: 107: 101: 99: 58: 34: 26: 635: 634: 630: 629: 628: 626: 625: 624: 595: 594: 593: 592: 535: 521: 516: 507: 505: 495: 491: 482: 480: 472: 471: 467: 458: 456: 447: 446: 442: 433: 431: 422: 421: 417: 408: 406: 397: 396: 392: 383: 381: 371: 367: 357: 355: 344: 340: 331: 329: 320: 319: 315: 306: 304: 296: 295: 291: 282: 280: 270: 266: 257: 255: 247: 246: 242: 233: 231: 223: 222: 218: 208: 206: 196: 192: 188: 156: 129:Security BSides 122: 111: 105: 102: 59: 57: 47: 35: 24: 17: 12: 11: 5: 633: 623: 622: 617: 612: 607: 591: 590: 583: 576: 568: 565: 564: 547: 533: 532: 527: 520: 519:External links 517: 515: 514: 489: 465: 440: 415: 390: 365: 338: 313: 289: 264: 253:SearchSecurity 240: 216: 189: 187: 184: 183: 182: 177: 172: 167: 162: 155: 152: 124: 123: 38: 36: 29: 15: 9: 6: 4: 3: 2: 632: 621: 618: 616: 615:Unconferences 613: 611: 608: 606: 603: 602: 600: 589: 584: 582: 577: 575: 570: 569: 563: 561: 557: 554:article is a 553: 548: 545: 541: 540: 536: 531: 528: 526: 523: 522: 504: 500: 493: 479: 475: 469: 455:on 2016-11-05 454: 450: 444: 429: 425: 419: 404: 400: 394: 380: 379:Post Register 376: 369: 353: 349: 342: 328:on 2016-11-05 327: 323: 317: 303: 299: 293: 279: 275: 268: 254: 250: 244: 230: 226: 220: 205: 201: 194: 190: 181: 178: 176: 173: 171: 168: 166: 163: 161: 158: 157: 151: 149: 144: 140: 138: 134: 130: 120: 117: 109: 106:November 2016 98: 95: 91: 88: 84: 81: 77: 74: 70: 67: –  66: 62: 61:Find sources: 55: 51: 45: 44: 39:This article 37: 33: 28: 27: 22: 560:expanding it 549: 534: 530:Unconference 506:. Retrieved 502: 492: 481:. Retrieved 478:Dark Reading 477: 468: 457:. Retrieved 453:the original 443: 432:. Retrieved 430:. 2022-08-09 427: 418: 407:. Retrieved 405:. 2020-03-06 402: 393: 382:. Retrieved 378: 368: 356:. Retrieved 354:. TechTarget 351: 341: 330:. Retrieved 326:the original 316: 305:. Retrieved 301: 292: 281:. Retrieved 277: 267: 256:. Retrieved 252: 243: 232:. Retrieved 228: 219: 207:. Retrieved 203: 193: 148:unconference 145: 141: 128: 127: 112: 103: 93: 86: 79: 72: 60: 48:Please help 43:verification 40: 209:19 November 204:SecTor 2018 599:Categories 508:2023-02-25 503:CSO Online 483:2016-11-05 459:2016-11-05 434:2023-02-25 428:CyberScoop 409:2023-02-25 384:2023-02-25 332:2016-11-05 307:2016-11-05 283:2024-01-28 258:2016-11-03 234:2024-01-28 186:References 76:newspapers 180:Summercon 165:Black Hat 133:Black Hat 358:18 March 154:See also 175:Kiwicon 170:DEF CON 90:scholar 278:Forbes 92:  85:  78:  71:  63:  550:This 97:JSTOR 83:books 556:stub 360:2024 211:2018 69:news 52:by 601:: 501:. 476:. 426:. 401:. 377:. 350:. 300:. 276:. 251:. 227:. 202:. 139:. 587:e 580:t 573:v 562:. 511:. 486:. 462:. 437:. 412:. 387:. 362:. 335:. 310:. 286:. 261:. 237:. 213:. 119:) 113:( 108:) 104:( 94:· 87:· 80:· 73:· 46:. 23:.

Index

A-side and B-side

verification
improve this article
adding citations to reliable sources
"Security BSides"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Black Hat
"B-side" of a vinyl record
unconference
Hacker conference
Black Hat
DEF CON
Kiwicon
Summercon
"B-Sides: A Grassroots Security Movement"
"BSides / BSidesHistory"
"Becoming jaded with Security BSides' Jack Daniel"
"After 10 Years And 600 Events, Security BSides Keeps Growing"
"Security BSides / FrontPage"
"Network Security Blog » Have you signed up for Security BSides?"
the original
"Top cybersecurity conferences for when Black Hat and RSA aren't right"
"More than 200 attend Idaho Falls cybersecurity conference"
"BSides Cairo: The security conference that's building information sharing from the ground up"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.