Tom Eston and Yael Basurto to Present at BSides Las Vegas

Date:
Past Event
Location:
Tuscany Hotel and Casino in Las Vegas, NV
Bsides Las Vegas logo on Bishop Fox purple background

Join Bishop Fox AVP of Consulting, Tom Eston, and Security Consultant, Yael Basurto at the 13th BSides Las Vegas. After a two-year hiatus, BSides Las Vegas is back in real life where you can attend a variety of technical and academic presentations and learn from skilled security practitioners. In BSides tradition, there will be a variety of other activities including a Lock Pick Village, Happy Hour, and evening entertainment.

Register to attend.

Presentations

Title: Management Hacking 101: Leading High Performance Teams

Presenter: Tom Eston

Date: August 10, 2022

Time: 10:30 a.m.

Location: Hire Ground

Abstract: 

Have you been recently promoted (willingly or unwillingly) into a leadership role within your organization? Are you someone that has been a technical “individual contributor” and now you’ve made a career change into management? If so, this talk is for you!

Tom will share his 17 year career journey from IT professional to penetration tester, making the leap into management, and now as an executive overseeing multiple teams. Throughout his career he’s learned many lessons on how to be a better manager and leader. In this talk he'll share his real-world experiences to help you be a great manager and leader. Topics include:

  • What makes a great team
  • How to hire great people
  • Understanding emotional intelligence
  • What motivates team members
  • Goal setting and evaluating performance
  • The importance of communication, feedback, and coaching

After this talk you will be able to immediately apply these concepts to yourself and the teams you manage.

Title: ICS Security Assessments 101 or How da Fox I Test Dis?

Presenter: Yael Basurto

Date: August 10, 2022

Time: 2 p.m.

Location: I Am The Cavalry

Abstract:

We have seen many ICS attacks both in the news and in several talks at security conferences. They show how ICS protocols are insecure by default and how we can mess with control components so easily. However, from a consulting point of view, are we really asking our ICS clients to let us mess with their critical infrastructure just to show what we already know?

In this talk, I’ll show how we can scope and address an ICS security engagement aligned with the industry’s needs. I’ll talk about real-world planning, attack surface identification, exploitation, and reporting from the understanding of what is giving value to our ICS clients. To keep things spicy, I’ll also include short demos to better show what we can do for each assessment type and yea some exploitation as well.



Tom Eston

About the speaker, Tom Eston

VP of Consulting and Cosmos at Bishop Fox

Tom Eston is the VP of Consulting and Cosmos at Bishop Fox. Tom's work over his 15 years in cybersecurity has focused on application, network, and red team penetration testing as well as security and privacy advocacy. He has led multiple projects in the cybersecurity community, improved industry standard testing methodologies and is an experienced manager and leader. He is also the founder and co-host of the podcast The Shared Security Show; and a frequent speaker at user groups and international cybersecurity conferences including Black Hat, DEF CON, DerbyCon, SANS, InfoSec World, OWASP AppSec, and ShmooCon.
More by Tom

Yael Basurto

About the speaker, Yael Basurto

Security Consultant II

Yael Basurto is a Bishop Fox security consultant. He specializes in offensive security and has a varied background in security assessments for different industries such as financial, government, retail, hotel, and mining. He has performed penetration testing for network, web, and mobile applications, and red teaming for financial and critical control infrastructure. Yael is also a security conference enthusiast, co-organizig Security BSides CDMX, and has presented at the DEF CON Recon Village, BSides events, and HackFest.

More by Yael

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.