544:
32:
150:, and hybrid. BSides falls into the unconference, or anti-conference, event style and is completely attendee driven. Attendees appear at a predetermined time, discuss ideas, and collaboratively agree upon what the schedule will look like for that day. Talks that get the most attention and conversation get added to the schedule.
142:
Over time the conference format matured and was released to enable individuals to start their own BSides conferences. The Las Vegas BSides conference is also considered part of Hacker Summer Camp given its schedule and proximity to other security conferences during that time.
131:(commonly referred to as BSides) is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack Daniel, and Chris Nickerson in 2009. Due to an overwhelming number of presentation submissions to
448:
374:
398:
347:
321:
452:
273:
585:
498:
604:
248:
96:
68:
578:
473:
135:
USA in 2009, the rejected presentations were presented to a smaller group of individuals. The event was named after the
75:
115:
619:
49:
571:
82:
449:"Growing InfoSec "Unconference" Exceeds 20 Global Events This Year & Expects 400 Attendees in San Francisco"
53:
64:
325:
609:
297:
423:
42:
614:
399:"BSides Cairo: The security conference that's building information sharing from the ground up"
224:
89:
199:
524:
8:
559:
164:
132:
551:
159:
136:
20:
555:
598:
147:
348:"Top cybersecurity conferences for when Black Hat and RSA aren't right"
424:"What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas"
322:"Network Security Blog » Have you signed up for Security BSides?"
179:
31:
543:
174:
169:
274:"After 10 Years And 600 Events, Security BSides Keeps Growing"
529:
375:"More than 200 attend Idaho Falls cybersecurity conference"
146:
Of the three standard conference event styles, structured,
56:. Unsourced material may be challenged and removed.
249:"Becoming jaded with Security BSides' Jack Daniel"
499:"Security B-Sides: Rise of the 'Anti-conference'"
596:
579:
403:The Daily Swig | Cybersecurity news and views
19:"BSides" redirects here. For music term, see
586:
572:
474:"Security BSides Grows, But Not Too Much"
200:"B-Sides: A Grassroots Security Movement"
116:Learn how and when to remove this message
197:
496:
597:
372:
345:
538:
54:adding citations to reliable sources
25:
13:
271:
198:Bradbury, Danny (7 October 2016).
14:
631:
518:
542:
346:Loshin, Peter (29 August 2017).
30:
490:
466:
441:
416:
41:needs additional citations for
16:Information security conference
391:
366:
339:
314:
290:
265:
241:
217:
191:
1:
605:Computer security conferences
373:HUNTER, ILEANA (2022-10-08).
298:"Security BSides / FrontPage"
185:
558:. You can help Knowledge by
497:Brenner, Bill (2010-02-24).
7:
153:
10:
636:
537:
137:"B-side" of a vinyl record
18:
225:"BSides / BSidesHistory"
620:Computer security stubs
302:www.securitybsides.com
229:www.securitybsides.com
50:improve this article
352:TechTarget Security
610:Hacker conventions
567:
566:
552:computer security
160:Hacker conference
126:
125:
118:
100:
65:"Security BSides"
21:A-side and B-side
627:
588:
581:
574:
546:
539:
525:Official Website
513:
512:
510:
509:
494:
488:
487:
485:
484:
470:
464:
463:
461:
460:
451:. Archived from
445:
439:
438:
436:
435:
420:
414:
413:
411:
410:
395:
389:
388:
386:
385:
370:
364:
363:
361:
359:
343:
337:
336:
334:
333:
324:. Archived from
318:
312:
311:
309:
308:
294:
288:
287:
285:
284:
272:Vamosi, Robert.
269:
263:
262:
260:
259:
245:
239:
238:
236:
235:
221:
215:
214:
212:
210:
195:
121:
114:
110:
107:
101:
99:
58:
34:
26:
635:
634:
630:
629:
628:
626:
625:
624:
595:
594:
593:
592:
535:
521:
516:
507:
505:
495:
491:
482:
480:
472:
471:
467:
458:
456:
447:
446:
442:
433:
431:
422:
421:
417:
408:
406:
397:
396:
392:
383:
381:
371:
367:
357:
355:
344:
340:
331:
329:
320:
319:
315:
306:
304:
296:
295:
291:
282:
280:
270:
266:
257:
255:
247:
246:
242:
233:
231:
223:
222:
218:
208:
206:
196:
192:
188:
156:
129:Security BSides
122:
111:
105:
102:
59:
57:
47:
35:
24:
17:
12:
11:
5:
633:
623:
622:
617:
612:
607:
591:
590:
583:
576:
568:
565:
564:
547:
533:
532:
527:
520:
519:External links
517:
515:
514:
489:
465:
440:
415:
390:
365:
338:
313:
289:
264:
253:SearchSecurity
240:
216:
189:
187:
184:
183:
182:
177:
172:
167:
162:
155:
152:
124:
123:
38:
36:
29:
15:
9:
6:
4:
3:
2:
632:
621:
618:
616:
615:Unconferences
613:
611:
608:
606:
603:
602:
600:
589:
584:
582:
577:
575:
570:
569:
563:
561:
557:
554:article is a
553:
548:
545:
541:
540:
536:
531:
528:
526:
523:
522:
504:
500:
493:
479:
475:
469:
455:on 2016-11-05
454:
450:
444:
429:
425:
419:
404:
400:
394:
380:
379:Post Register
376:
369:
353:
349:
342:
328:on 2016-11-05
327:
323:
317:
303:
299:
293:
279:
275:
268:
254:
250:
244:
230:
226:
220:
205:
201:
194:
190:
181:
178:
176:
173:
171:
168:
166:
163:
161:
158:
157:
151:
149:
144:
140:
138:
134:
130:
120:
117:
109:
106:November 2016
98:
95:
91:
88:
84:
81:
77:
74:
70:
67: –
66:
62:
61:Find sources:
55:
51:
45:
44:
39:This article
37:
33:
28:
27:
22:
560:expanding it
549:
534:
530:Unconference
506:. Retrieved
502:
492:
481:. Retrieved
478:Dark Reading
477:
468:
457:. Retrieved
453:the original
443:
432:. Retrieved
430:. 2022-08-09
427:
418:
407:. Retrieved
405:. 2020-03-06
402:
393:
382:. Retrieved
378:
368:
356:. Retrieved
354:. TechTarget
351:
341:
330:. Retrieved
326:the original
316:
305:. Retrieved
301:
292:
281:. Retrieved
277:
267:
256:. Retrieved
252:
243:
232:. Retrieved
228:
219:
207:. Retrieved
203:
193:
148:unconference
145:
141:
128:
127:
112:
103:
93:
86:
79:
72:
60:
48:Please help
43:verification
40:
209:19 November
204:SecTor 2018
599:Categories
508:2023-02-25
503:CSO Online
483:2016-11-05
459:2016-11-05
434:2023-02-25
428:CyberScoop
409:2023-02-25
384:2023-02-25
332:2016-11-05
307:2016-11-05
283:2024-01-28
258:2016-11-03
234:2024-01-28
186:References
76:newspapers
180:Summercon
165:Black Hat
133:Black Hat
358:18 March
154:See also
175:Kiwicon
170:DEF CON
90:scholar
278:Forbes
92:
85:
78:
71:
63:
550:This
97:JSTOR
83:books
556:stub
360:2024
211:2018
69:news
52:by
601::
501:.
476:.
426:.
401:.
377:.
350:.
300:.
276:.
251:.
227:.
202:.
139:.
587:e
580:t
573:v
562:.
511:.
486:.
462:.
437:.
412:.
387:.
362:.
335:.
310:.
286:.
261:.
237:.
213:.
119:)
113:(
108:)
104:(
94:·
87:·
80:·
73:·
46:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.