Previous Speakers

View our talented speakers from past BSides312 conferences

Watch Many Past Talks on YouTube

2026

4dw@r3

OpenSource Poison: A Long Ignored Risk

Admford

You Did the Work — Now Get the Title

Amanda Kollmorgan

Ctrl + Alt + Lead: Rebooting Cyber Culture with Human Skills

Catherine Ullman

So, You Want to be a Forensicator...

Heidi Potter

(Keynote) Community Doesn’t Start With a Conference

HelpMeRob

We Need to Talk About Signal: Security Assumptions, Threat Models, and Activist Community Risk

John Mathot

The Subliminal Handshake: secret communication using the TLS handshake

Kyprianos Vasilopoulos

The Walking Dead of AD: Uncovering rare DACL-led escalation and a BloodHound-integrated tool

Larry Trowell

Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware

Matt Scheurer

Definitely Not Secure (DNS)

mcdwayne

From Pets To Cattle To Agents: Evolving Identity And Security For Workloads

Mr. Sprawl

Bullying your co-workers with Phishing emails

Nikos Vourdas

The Walking Dead of AD: Uncovering rare DACL-led escalation and a BloodHound-integrated tool

PANTH13R

Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware

Paul Petefish

Penetration Testing Is Busted: Introducing a Continuous Testing Methodology

rand0h

Countdown To ZeroPay- When the fall is all that’s left, it matters a great deal.

Tib3rius

Vibe Hacking: Building Autonomous Offensive Security Tools with Claude Code

ギンジ🐾ターラノー

Beyond the Self Check-Out

2025

Cathy Ullman

Defending Beyond Defense

Chris Traynor

Pentest Pains

Danielle McGuire

Securing the Grid of Tomorrow

Filipi Pires

Misconfiguration-Driven Cloud Attacks: A Graph-Based Exploration

Ginji Terrano

Open Sesame

Jose Hernandez

Bringing Down the BYOVD: Leveraging WDAC to End Malicious Driver Attacks

Kadi McKean

Trailblazing: Lessons from Oregon Trail for the Secure Software Supply Chain

Olivia Gallucci

Unlocking macOS Internals: A Beginner's Guide to Apple's Open Source Code

Patrick Laverty

Can a Hacker Murder Your City

Roy Talyosef

Adversarial Intelligence: Redefining Application Security through the eyes of an attacker

Steve Shelton

(Keynote) When the Night Has Come: Finding Belonging in a World That Doesn't Understand Us

Tamry Juntunen

Empowering Neurodivergent Individuals in Cybersecurity: Strategies for Inclusion and Success

Zach Smith

Monsters Under Your Bed - Mapping the Dark Web with Python

2024

Stefani Goerlich

Opening Keynote: "Securing Sexuality: Rewiring our Intimate Connections"

Chris Roberts

Closing Keynote: "The Evolution of Threat Intelligence: Tracking Your Boss for Fun, Profit, and Protection"

Thamer AlJohani

"Navigating Privacy in the Digital Era: A Comprehensive Exploration of GDPR and CCPA"

Sara Anstey

"Educating Your Guesses: How to Quantify Risk and Uncertainty"

Dr. Catherine J. Ullman

"Dumpster Fires: three things about IR I learned as a firefighter"

Jake Hildreth

"Protect Your Most Sensitive Users With This One Weird Trick!"

Dwayne McDaniel

"Championing Security: Scaling Security At Every Level"

Anita Nikolich

"Senior Citizens Fight Scammers"

Whitney Phillips

"Mobile Application Penetration Testing"

Ryan Wisniewski

"The SaaS and the Furious: A Deep Dive into SaaS Compromises"