Feb 4, 2017


Dynetics, Inc (Solutions Complex building)
1004 Explorer Blvd, Huntsville, AL 35805


For sponsorship opportunities:

Call For Speakers now open

Send CFP to

Opening Keynote Speaker

Dave Chronister     

Afternoon Keynote Speaker

Adrian Crenshaw     

Topics of Interest:

TelecommunicationsThreat Intelligence
Incident Handling \ Incident ResponseDigital Forensics
Network InfrastructureCritical Infrastructure
ExploitsReverse Engineering
Tool DevelopmentSecure Coding
Application SecurityDatabase Security
WirelessNew Technologies
Cryptography Python, Ruby etc....
Mobile SecurityMalware
Monitoring and AnalysisAnalytics


BSides Huntsville is an annual security conference located in The Rocket City. Stay tuned as 2017 will be its 4th consecutive year! Previous years were well received and videos are available from IronGeek. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

Please make time to visit the sponsors between talks.

 High Res Logo

The Huntsville metro area has the highest per capita concentration of engineers in the country. We consistently rank near the top for annual lists of best cities. For 2015 we were #1 Best City for Engineers. If your business is tech, Huntsville is a great place to be.

If this is your first time visiting Huntsville, we encourage you to tour the city and Alabama's #1 tourist destination: The U.S. Space & Rocket Center. It is about 5 miles away from the conference at Dynetics (Solutions Complex building). Shopping and restaurants are 4 miles away at Bridge Street Town Centre.


To Volunteer:

Use Contact Form



View at IronGeek


Calhoun Community College
University of Alabama in Huntsville
North Alabama ISSA
Parameter Security

Feb 8, 2014


Dr. Rayford Vaughn

Building The Future of P-12 Cyber Education

Dr. Casey Wardynski

Cyber Security Program At UAH

Russ Ward

1337 in the Library: Obtaining your information security education on the cheap

Adrian Crenshaw

Zero to Hero: Breaking into the security Field

Jeremy Conway

Certifications in Cybersecurity

Adam Wade Lewis

Trojans – The Forgotten Enemy

Dave Chronister

The Amazing Cybermen

Ben McGee

Why you are pwn’d and don’t know it!

Ben Miller

Cyber Security, What's The Fuss?

Deborah William

HTTPS: Now You See Me

Tim Mullican

Introduction to hacking with PowerShell

Scott Busby

All You Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches

Valerie Thomas

Digital Energy BPT

Paul Coggin


View at IronGeek


Dragos Security
Binary Defense Systems
Parameter Security
Hacker University
Core Security
North Alabama ISSA
H2L Solutions
Cyber Symbiotics

Classes: Feb 6th 2015

CybatiWorks "Mission: Control Systems"

Matt Luallen

Intro to Threat Intelligence

Robert M. Lee

Track 1: Feb 7th 2015


Robert M. Lee

Hijacking Label Switched Networks in the Cloud

Paul Coggin

Real World Threats

Russ Ward

Lock picking, but bypass is easier

Adrian Crenshaw

The Dark Side Of PowerShell

Joshua Smith

Give me your data!

Dave Chronister

Gods and Monsters: A tale of the dark side of the web

Aamir Lakhani

Sensory Perception: A DIY approach to building a sensor network

Tim Fowler

Reverse Engineering Network Device APIs

Dan Nagle

Track 2: Feb 7th 2015

So Easy A High-Schooler Could Do It: Static malware analysis using function-level signatures

James Brahm, Matthew Rogers, and Morgan Wagner

Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For

Josh Danielson and Arthur Andrieu

Developing and Open Source Threat Intelligence Program

Edward McCabe

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Frank Cohee

The Great Trojan Demo

Ben Miller

A Virtual SCADA Laboratory for Cybersecurity Pedagogy and Research

Zach Thornton

PlagueScanner: An Open Source Multiple AV Scanner Framework



View at IronGeek


Binary Defense Systems
Adrian Crenshaw
Tactical Edge
National Cyber Summit

Track 1: 9:00 am

Opening Keynote

Jack Daniel

Track 1: 10:00 am

Slaying Rogue Access Points with Python and Cheap Hardware

Gabriel Ryan

Track 1: 11:00 am

Web shells as a covert channel

Joe Vest

Track 1: 1:00 pm

Afternoon Keynote: TSA Luggage Locks: Details, Flaws & Making The Best Of A Bad Lock

Adrian Crenshaw

Track 1: 2:00 pm

At the mountains of malware: Lessons learned from analyzing terabytes of malware

Wes Widner

Track 1: 3:00 pm

Exploiting first hop protocols to own the network.

Paul Coggin

Track 1: 4:00 pm

History of WRT and Wireless Mesh protocols.

Alex Kot

Track 1: 5:00 pm

BSides Closeout

Paul Coggin

Track 2: 10:00 am

Hacking Peoples' Lives with Google Sync

Shawn Edwards, Sean Hopkins

Track 2: 11:00 am

A practical approach to deploying Data Loss Prevention

Jon Damratoski

Track 2: 2:00 pm

Threat Modeling the Minecraft Way

Jarred White

Track 2: 3:00 pm

Privacy 101: An introduction with Tradecraft Light

Leonard Isham