Previous Speakers
View our talented speakers from past BSides312 conferences
Watch Many Past Talks on YouTube2026
4dw@r3
OpenSource Poison: A Long Ignored Risk
Admford
You Did the Work — Now Get the Title
Amanda Kollmorgan
Ctrl + Alt + Lead: Rebooting Cyber Culture with Human Skills
Catherine Ullman
So, You Want to be a Forensicator...
Heidi Potter
(Keynote) Community Doesn’t Start With a Conference
HelpMeRob
We Need to Talk About Signal: Security Assumptions, Threat Models, and Activist Community Risk
John Mathot
The Subliminal Handshake: secret communication using the TLS handshake
Kyprianos Vasilopoulos
The Walking Dead of AD: Uncovering rare DACL-led escalation and a BloodHound-integrated tool
Larry Trowell
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware
Matt Scheurer
Definitely Not Secure (DNS)
mcdwayne
From Pets To Cattle To Agents: Evolving Identity And Security For Workloads
Mr. Sprawl
Bullying your co-workers with Phishing emails
Nikos Vourdas
The Walking Dead of AD: Uncovering rare DACL-led escalation and a BloodHound-integrated tool
PANTH13R
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware
Paul Petefish
Penetration Testing Is Busted: Introducing a Continuous Testing Methodology
rand0h
Countdown To ZeroPay- When the fall is all that’s left, it matters a great deal.
Tib3rius
Vibe Hacking: Building Autonomous Offensive Security Tools with Claude Code
ギンジ🐾ターラノー
Beyond the Self Check-Out
2025
Cathy Ullman
Defending Beyond Defense
Chris Traynor
Pentest Pains
Danielle McGuire
Securing the Grid of Tomorrow
Filipi Pires
Misconfiguration-Driven Cloud Attacks: A Graph-Based Exploration
Ginji Terrano
Open Sesame
Jose Hernandez
Bringing Down the BYOVD: Leveraging WDAC to End Malicious Driver Attacks
Kadi McKean
Trailblazing: Lessons from Oregon Trail for the Secure Software Supply Chain
Olivia Gallucci
Unlocking macOS Internals: A Beginner's Guide to Apple's Open Source Code
Patrick Laverty
Can a Hacker Murder Your City
Roy Talyosef
Adversarial Intelligence: Redefining Application Security through the eyes of an attacker
Steve Shelton
(Keynote) When the Night Has Come: Finding Belonging in a World That Doesn't Understand Us
Tamry Juntunen
Empowering Neurodivergent Individuals in Cybersecurity: Strategies for Inclusion and Success
Zach Smith
Monsters Under Your Bed - Mapping the Dark Web with Python
2024
Stefani Goerlich
Opening Keynote: "Securing Sexuality: Rewiring our Intimate Connections"
Chris Roberts
Closing Keynote: "The Evolution of Threat Intelligence: Tracking Your Boss for Fun, Profit, and Protection"
Thamer AlJohani
"Navigating Privacy in the Digital Era: A Comprehensive Exploration of GDPR and CCPA"
Sara Anstey
"Educating Your Guesses: How to Quantify Risk and Uncertainty"
Dr. Catherine J. Ullman
"Dumpster Fires: three things about IR I learned as a firefighter"
Jake Hildreth
"Protect Your Most Sensitive Users With This One Weird Trick!"
Dwayne McDaniel
"Championing Security: Scaling Security At Every Level"
Anita Nikolich
"Senior Citizens Fight Scammers"
Whitney Phillips
"Mobile Application Penetration Testing"
Ryan Wisniewski
"The SaaS and the Furious: A Deep Dive into SaaS Compromises"
