For sponsorship opportunities:



Tickets Available!

Track 1Track 2
8:00 am Check-in & coffee!

9:00 am Opening Keynote

Jack Daniel —

10:00 am Threat Modeling the Minecraft Way

Jarred White —

Hacking Peoples' Lives with Google Sync

Shawn Edwards, Sean Hopkins

11:00 am Web shells as a covert channel

Joe Vest —

A practical approach to deploying Data Loss Prevention

Jon Damratoski —

12:00 pm Lunch (sponsored)!

1:00 pm Afternoon Keynote

Adrian Crenshaw —

2:00 pm Seriously, what the &^*& is Network Segmentation?

Edgar Rojas —

At the mountains of malware: Lessons learned from analyzing terabytes of malware

Wes Widner —

3:00 pm 10 Pitfalls of SOC, IH & IR

Paul Jorgensen —

Slaying Rogue Access Points with Python and Cheap Hardware

Gabriel Ryan —

4:00 pm Privacy 101: An introduction with Tradecraft Light

Leonard Isham —

History of WRT and Wireless Mesh protocols.

Alex Kot

5:00 pm

Call for Papers has begun!

Send your abstract (in your preferred format) to:

Topics of Interest

Vulnerabilities ICS\SCADA
Telecommunications Threat Intelligence
Incident Handling \ Incident Response Digital Forensics
Network Infrastructure Critical Infrastructure
Exploits Reverse Engineering
Tool Development Secure Coding
Application Security Database Security
Wireless New Technologies
Cryptography Python, Ruby etc....
Mobile Security Malware
Monitoring and Analysis Analytics

Dynetics is a secure facility. Non-US citizens should submit early.


BSides Huntsville is an annual security conference located in The Rocket City. BSides Huntsville 2014 and 2015 were sold-out and 2016 is expected to do the same. All BSides teams are volunteers working hard to put together a productive and enjoyable conference.

Please make time to visit the sponsors between talks.

 High Res Logo

The Huntsville metro area has the highest per capita concentration of engineers in the country. We consistently rank near the top for annual lists of best cities. For 2015 we were #1 Best City for Engineers. If your business is tech, Huntsville is a great place to be.

If this is your first time visiting Huntsville, we encourage you to tour the city and Alabama's #1 tourist destination: The U.S. Space & Rocket Center. It is about 5 miles away from the conference. Shopping and restaurants are 4 miles away at Bridge Street Town Centre.


To Volunteer:

Use Contact Form



View at IronGeek


Calhoun Community College
University of Alabama in Huntsville
North Alabama ISSA
Parameter Security

Feb 8, 2014


Dr. Rayford Vaughn

Building The Future of P-12 Cyber Education

Dr. Casey Wardynski

Cyber Security Program At UAH

Russ Ward

1337 in the Library: Obtaining your information security education on the cheap

Adrian Crenshaw

Zero to Hero: Breaking into the security Field

Jeremy Conway

Certifications in Cybersecurity

Adam Wade Lewis

Trojans – The Forgotten Enemy

Dave Chronister

The Amazing Cybermen

Ben McGee

Why you are pwn’d and don’t know it!

Ben Miller

Cyber Security, What's The Fuss?

Deborah William

HTTPS: Now You See Me

Tim Mullican

Introduction to hacking with PowerShell

Scott Busby

All You Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches

Valerie Thomas

Digital Energy BPT

Paul Coggin


View at IronGeek


Dragos Security
Binary Defense Systems
Parameter Security
Hacker University
Core Security
North Alabama ISSA
H2L Solutions
Cyber Symbiotics

Classes: Feb 6th 2015

CybatiWorks "Mission: Control Systems"

Matt Luallen

Intro to Threat Intelligence

Robert M. Lee

Track 1: Feb 7th 2015


Robert M. Lee

Hijacking Label Switched Networks in the Cloud

Paul Coggin

Real World Threats

Russ Ward

Lock picking, but bypass is easier

Adrian Crenshaw

The Dark Side Of PowerShell

Joshua Smith

Give me your data!

Dave Chronister

Gods and Monsters: A tale of the dark side of the web

Aamir Lakhani

Sensory Perception: A DIY approach to building a sensor network

Tim Fowler

Reverse Engineering Network Device APIs

Dan Nagle

Track 2: Feb 7th 2015

So Easy A High-Schooler Could Do It: Static malware analysis using function-level signatures

James Brahm, Matthew Rogers, and Morgan Wagner

Pragmatic Cloud Security: What InfoSec Practitioners Have Been Waiting For

Josh Danielson and Arthur Andrieu

Developing and Open Source Threat Intelligence Program

Edward McCabe

Applying User-Centered Design Techniques for Augmenting Human Perception in Cyber Warfare

Frank Cohee

The Great Trojan Demo

Ben Miller

A Virtual SCADA Laboratory for Cybersecurity Pedagogy and Research

Zach Thornton

PlagueScanner: An Open Source Multiple AV Scanner Framework