2022-07-28 | GrrCON 2012 Raymond Lily OSINT Footprinting | 0:00 | 8 | |
|
2022-07-28 | GrrCON 2012 Richard Stiennon Cyber Defense | 0:00 | 3 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Cynthia Moore Social Butterflies | 0:00 | 1 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Joe Brinkley TheBlindHacker CyberPhunk2020 How to kick off your Cyber | 0:00 | 5 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers John Foster PKI & US | 0:00 | 2 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Josh Corman Advice I wish I had gotten | 0:00 | 1 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Keith Chapman Inciting the Imagination How we can help students see th | 0:00 | 2 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Lauren Rogers How to build a SOC in reality | 0:00 | 2 | |
|
2022-07-28 | GRIMMCon 0x2 New Speakers Nicole Hoffman ATT&CK on the C Suite Cheat Codes | 0:00 | 5 | |
|
2022-07-28 | GRIMMCon 0x2 Experts Jaime William Technical lessons from emulating adversaries | 0:00 | 0 | |
|
2022-07-28 | GRIMMCon 0x2 Experts Jeffball Embbed Device ROP Tips and tricks Netgear | 0:00 | 3 | |
|
2022-07-28 | GRIMMCon 0x2 Experts John Hammond & Caleb Stewart Pwncat | 0:00 | 60 | |
|
2022-07-28 | GRIMMCon 0x2 Experts Jorge Orchilles Purple Team Exercises | 0:00 | 1 | |
|
2022-07-28 | Christopher Lopez Asking Questions and Writing Effectively | 0:00 | 0 | |
|
2022-07-28 | Johnny Xmas Urban Exploration A COVID friendly Hacker Hobby | 0:00 | 9 | |
|
2022-07-28 | Blake Regan Limiting Admin User Risk in a Windows Environment and Other Tips | 0:00 | 3 | |
|
2022-07-28 | Carey Lening Privacy Shield is Dead Using Technology to Make the Lawyers Happy | 0:00 | 5 | |
|
2022-07-28 | Juan Spinel GDPR Strategies for Failure | 0:00 | 2 | |
|
2022-07-28 | Kamel Bluetooth as a Rising Concern in Automotive Security | 0:00 | 7 | |
|
2022-07-28 | Catherine Ullman Incident Communications 101 Breaking the Bad News | 0:00 | 2 | |
|
2022-07-28 | Konstantin Klinger Identifying Malware Analysis Using Bloom Filters and DGArchive | 0:00 | 6 | |
|
2022-07-28 | Maggie Morganti Hoe the Planet Not Your Mama's Social Engineering Talk | 0:00 | 23 | |
|
2022-07-28 | Nathan Chung Neurodiversity in Cybersecurity | 0:00 | 11 | |
|
2022-07-28 | Nicole Hoffman The Cognitive Stairways of Analysis | 0:00 | 3 | |
|
2022-07-28 | Nina Jones Phishing and Social Engineering, 101 | 0:00 | 0 | |
|
2022-07-28 | Oscar Delgado Unit Operations for ICS Security Professionals One big and expensive Lego | 0:00 | 3 | |
|
2022-07-28 | Sounil Yu Opening Keynote How to Delay Building a Skynet | 0:00 | 7 | |
|
2022-07-28 | Stephen Mondiguing How to Learn Malware Analysis Without Breaking the Bank | 0:00 | 11 | |
|
2022-07-28 | Bringing Critical D&D Skills to the Workplace | 0:00 | 0 | |
|
2022-07-28 | The Future is Humans, Not Machines | 0:00 | 1 | |
|
2022-07-28 | What to Expect When You're Expecting a Pentest | 0:00 | 3 | |
|
2022-07-28 | Building an Effective Red Team | 0:00 | 8 | |
|
2022-07-28 | Uncovering Lazarus Group's Operation 'Dream Job' | 0:00 | 21 | |
|
2022-07-28 | APT ATT&CK Emulation | 0:00 | 26 | |
|
2022-07-28 | Design Thinking for Blue Teams | 0:00 | 0 | |
|
2022-07-28 | Blood in the Wires How the Tech Industry Fails Humanity | 0:00 | 0 | |
|
2022-07-28 | Electronify Your Objective C | 0:00 | 5 | |
|
2022-07-28 | Emulating Supply Chain Attacks with Assume Breach | 0:00 | 6 | |
|
2022-07-28 | Exploiting COM with Microsoft Word | 0:00 | 6 | |
|
2022-07-28 | Funtastic Packers and Where To Find Them | 0:00 | 0 | |
|
2022-07-28 | Intro to Hardware Hacking with a DRM'ed LED Therapy Mask | 0:00 | 13 | |
|
2022-07-28 | It's Broke, Let's Fix It | 0:00 | 0 | |
|
2022-07-28 | Know Thy Enemy Know Thyself | 0:00 | 4 | |
|
2022-07-28 | Kubernetes Security 101 Best Practices to Secure Your Cluster | 0:00 | 4 | |
|
2022-07-28 | Opening with Ron Gula | 0:00 | 0 | |
|
2022-07-28 | OSINT for Beginners | 0:00 | 217 | |
|
2022-07-28 | Repo Jacking How Github Usernames Expose 70k OSS Projects To Remote Code Injection | 0:00 | 37 | |
|
2022-07-28 | Speak Impact | 0:00 | 1 | |
|
2022-07-28 | Jinkies this Email looks Suspicious Nicole Hoffman | 0:00 | 1 | |
|
2022-07-28 | Notable ICS Cybersecurity Events Jason Allnut | 0:00 | 2 | |
|
2022-07-28 | Opening Keynote Tatyana Bolton | 0:00 | 11 | |
|
2022-07-28 | Rebuilding Trust after a Cyber or Disinformation Attack Devi Nair | 0:00 | 4 | |
|
2022-07-28 | Side Hustles Your Entry Into Tech Elyse Y Robinson | 0:00 | 30 | |
|
2022-07-28 | Solving Web Security Vulnerabilities with Pentesting Gabrielle Botbol | 0:00 | 6 | |
|
2022-07-28 | Tropical Spy tricks and tales of a Brazilian social engineer Marina Ciavatta | 0:00 | 4 | |
|
2022-07-28 | Adopt purple team strategy to augment Application Security Trupti Shiralkar | 0:00 | 6 | |
|
2022-07-28 | Bad legislation for Critical infrastructure Security Keenan Skelly | 0:00 | 1 | |
|
2022-07-28 | Closing Keynote The FAIL Horsemen | 0:00 | 0 | |
|
2022-07-28 | Cybersecurity Education Without Behavior Change, What Is The Point Sidd Chopra | 0:00 | 4 | |
|
2022-07-28 | How an ineffective Data Governance Program destroyed the Galactic Empire Micah Brown | 0:00 | 1 | |
|
2022-07-28 | IPv6Does size matter Anastasiia Mytrofanovska | 0:00 | 1 | |
|
2022-07-28 | Zero Trust Model Impostors Among us Sarthak Taneja | 0:00 | 4 | | Among Us
|
2022-07-28 | Utilizing Native Functionality in ICS to improve Security Vivek Ponnada | 0:00 | 2 | |
|
2022-07-28 | When Opposites Attract Making Privacy Trend on TikTok Ghufran Salih | 0:00 | 3 | |
|
2022-07-28 | Tim Medin Access Still Granted | 0:00 | 4 | |
|
2022-07-28 | Bryan Bradford I want all the DATA Why death by logging and alerts is bad | 0:00 | 0 | |
|
2022-07-28 | Daniel Borges Keyloggers on Major Operating Systems Windows, Linux, macOS | 0:00 | 5 | |
|
2022-07-28 | Dawnlight A Beginner’s Guide to Hacking Your Cybersecurity Career | 0:00 | 1 | |
|
2022-07-28 | Elaine Harrison Neukirch Fun with MITRE ATT&CK and NIST 800 53 | 0:00 | 9 | |
|
2022-07-28 | Hise Gibson Building Agile Tech Organizations Keynote | 0:00 | 11 | |
|
2022-07-28 | Ian Tabor Value pasta auto how I built it and saved $28000 | 0:00 | 67 | |
|
2022-07-28 | Jorge Orchilles The State of C2 with the C2 Matrix | 0:00 | 4 | |
|
2022-07-28 | Keenan Skelly Bad Legislation turned Good Part 2 CISA FTW | 0:00 | 0 | |
|
2022-07-28 | Marie Williams Pivoting In Life Making Lateral Movements | 0:00 | 3 | |
|
2022-07-28 | Nikki Robinson Using Behavioral Analysis Techniques to Improve Security | 0:00 | 2 | |
|
2022-07-28 | Paul Cummings Building a Whole Cyber Human Candidate | 0:00 | 5 | |
|
2022-07-28 | Sean McKeever Teaching Kids to Hack | 0:00 | 2 | |
|
2022-07-28 | Teresa Rothaar What Is a Cybersecurity Copywriter, Anyway | 0:00 | 73 | |
|
2022-07-28 | Thomas Somerville CTI for the Rest of Us | 0:00 | 20 | |
|
2022-07-28 | Kernel Fun Jon Oberheide | 0:00 | 2 | |
|
2022-07-28 | ZeuS Inside Command and Control Adam Johnson | 0:00 | 1 | |
|
2022-07-28 | Least resistance is anything but futile Tim Maletic | 0:00 | 1 | |
|
2022-07-28 | Legal Perspectives on Data Breaches Carol Romej | 0:00 | 0 | |
|
2022-07-28 | Mike Kemp When I grow up I want to be a cyber terrorist | 0:00 | 17 | |
|
2022-07-28 | AlgoSec | 0:00 | 6 | |
|
2022-07-28 | Blinkie Lights Network Monitoring with Arduino Steve Ocepek | 0:00 | 2 | |
|
2022-07-28 | Mobile App Moolah Profit taking with Mobile Malware Jimmy Shah | 0:00 | 4 | |
|
2022-07-28 | Characteristics of a Highly Effective Information Security Executive Bob West | 0:00 | 2 | |
|
2022-07-28 | Panel Discussion Cloud Data Security and Privacy How to leverage the Cloud safely | 0:00 | 0 | |
|
2022-07-28 | Chris Roberts Planes, Trains and Automobiles | 0:00 | 1 | |
|
2022-07-28 | SmartMeters Are they a gateway drug Robert Former | 0:00 | 2 | |
|
2022-07-28 | Cyber Vigilantes Rob Rachwald | 0:00 | 6 | |
|
2022-07-28 | sploit me if u can atlas 0f d00m | 0:00 | 0 | |
|
2022-07-28 | Dear Pentesters, Get Bent Duncan Manuts | 0:00 | 0 | |
|
2022-07-28 | The future of Authenticity Moxie Marlinspike | 0:00 | 81 | |
|
2022-07-28 | Defcon CTF Why even Losers Always Win Jarod DeMott | 0:00 | 4 | |
|
2022-07-28 | Dispelling Cloud Security Hype Johnathan Norman | 0:00 | 0 | |
|
2022-07-28 | Hacking Trust Steven Fox | 0:00 | 3 | |
|
2022-07-28 | Hook, Line and Syncer A Liar for Hire s Ultimate Tackle Box Chris Silvers & Pat McCoy | 0:00 | 0 | |
|
2022-07-28 | How asteroids falling from the sky improve security J Wolfgang Goerlich | 0:00 | 1 | |
|