2022-03-24 | Finding the Money to Run an Effective Security Program Matt Topper ConVerge 2018 | 41:47 | 0 | |
|
2022-03-24 | don't Fear the Cloud Secure Solutions at Lower Cost Matt Newell ConVerge 2018 | 42:51 | 0 | |
|
2022-03-24 | DevSecOps Security Testing with CICD Automation Servers Ed Arnold ConVerge 2018 | 28:46 | 0 | |
|
2022-03-24 | DADSEC 102 Richard Cassara ConVerge 2018 | 29:02 | 0 | |
|
2022-03-24 | Cryptocurrency The Internetwide Bug Bounty Program Brian Laskowski ConVerge 2018 | 42:47 | 2 | |
|
2022-03-24 | Backdooring With Metadata Itzik Kotler ConVerge 2018 | 37:08 | 0 | |
|
2022-03-24 | Automating Web App security in AWS Luther Hill ConVerge 2018 | 43:20 | 0 | |
|
2022-03-24 | The Emerging Product Security Leader Discipline Matthew Clapham ConVerge 2018 | 41:40 | 1 | |
|
2022-03-24 | ATT&CK Like an Adversary for Defense Hardening Steve Motts Christian Kopacsi ConVerge 2018 | 52:25 | 1 | |
|
2022-03-24 | Social Engineering for the Blue Team Timothy De Block ConVerge 2018 | 45:15 | 0 | |
|
2022-03-24 | Server Message Block Worms The gift that keeps on giving Matthew Aubert ConVerge 2018 | 45:11 | 1 | |
|
2022-03-24 | All the Bacon How Lesley Knope and Ron Swanson encourage community growth Kevin Jo ConVerge 2018 | 53:16 | 0 | |
|
2022-03-24 | Securing ASPNET Core Web Apps Dustin Kingen ConVerge 2018 | 46:26 | 1 | |
|
2022-03-24 | How to Conduct a Product Security Test And How it Fits Into the Larger Security St ConVerge 2018 | 50:53 | 1 | Guide |
|
2022-03-24 | Prowling Better Penetration Testing J Wolfgang Goerlich ConVerge 2018 | 48:11 | 0 | |
|
2022-03-24 | Held Hostage A Ransomware Primer Nick Hyatt ConVerge 2018 | 29:34 | 0 | |
|
2022-03-24 | Winning the cybers by measuring all the things Jim Beechey ConVerge 2018 | 50:46 | 0 | |
|
2022-03-24 | Hacking Identity A Pen Testers Guide to IAM Jerod Brennen ConVerge 2018 | 1:01:32 | 0 | Guide |
|
2022-03-24 | The Things You Should Be Doing Defensively Right Now Joel Cardella ConVerge 2018 | 53:04 | 4 | |
|
2022-03-24 | Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin ConVerge 2018 | 55:59 | 1 | |
|
2022-03-24 | Threat Modeling 101 Matt Clapham ConVerge 2017 | 48:41 | 4 | |
|
2022-03-24 | The 4 Eyes of Information Security Fernando Montenegro ConVerge 2017 | 25:37 | 4 | Guide |
|
2022-03-24 | That Escalated Quickly Shaun Bertrand ConVerge 2017 | 48:48 | 0 | |
|
2022-03-24 | Tarnished Silver Bullets Wolfgang Goerlich ConVerge 2017 | 54:01 | 0 | |
|
2022-03-24 | Stories through Logging It was the best of logs it was the worst of logs Tom Kopch ConVerge 2017 | 46:04 | 0 | Vlog |
|
2022-03-24 | Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John ConVerge 2017 | 46:11 | 2 | |
|
2022-03-24 | Prioritize Vulnerability Remediation Amol Sarwate ConVerge 2017 | 47:37 | 1 | |
|
2022-03-24 | How to kick start an application security program Timothy De Block ConVerge 2017 | 50:28 | 0 | Guide |
|
2022-03-24 | Predicting Exploitability Michael Roytam ConVerge 2017 | 44:19 | 0 | |
|
2022-03-22 | who watches the watchers michael roytman ConVerge 2015 | 42:50 | 3 | |
|
2022-03-22 | Weaving Security into the SDLC Bill Sempf ConVerge 2015 | 47:42 | 2 | |
|
2022-03-22 | Under the Unfluence the Dark Side of Influence Ron Woerner ConVerge 2015 | 54:12 | 1 | |
|
2022-03-22 | Threat Intelligence A Program Strategy Approach Jenn Black ConVerge 2015 | 37:04 | 0 | |
|
2022-03-22 | If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski ConVerge 2015 | 23:55 | 0 | |
|
2022-03-22 | How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas ConVerge 2015 | 1:00:44 | 1 | Guide |
|
2022-03-22 | Homebrew Censorship Detection by Analysis of BGP Data Zach Julian ConVerge 2015 | 23:31 | 0 | |
|
2022-03-22 | Hiding in the ShaDOS Richard Cassara ConVerge 2015 | 28:23 | 1 | |
|
2022-03-22 | Process The Salvation of Incident Response Charles Herring ConVerge 2015 | 38:56 | 0 | |
|
2022-03-22 | On Defending Against Doxxing Benjamin Brown ConVerge 2015 | 57:19 | 3 | |
|
2022-03-22 | keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street ConVerge 2015 | 1:03:37 | 0 | |
|
2022-03-22 | keynote raphael mudge hacking to get caught ConVerge 2015 | 52:20 | 1 | |
|
2022-03-22 | Excuse me while I BURP Steve Motts ConVerge 2015 | 44:00 | 1 | |
|
2022-03-22 | Don Warnecke building the team for a successful SOC ConVerge 2015 | 54:44 | 3 | |
|
2022-03-22 | Cymon New Cyber Monitoring Tool Roy Firestein ConVerge 2015 | 48:43 | 1 | |
|
2022-03-22 | Cracking and fixing REST services Bill Sempf ConVerge 2015 | 38:17 | 0 | |
|
2022-03-22 | Clientless Android Malware Control David Schwartzberg ConVerge 2015 | 52:00 | 1 | |
|
2022-03-22 | Application Security Awareness Building an Effective and Entertaining Security Training Program Chr | 47:36 | 0 | |
|
2022-03-22 | Adventures in Communication Taming the C Suite and Board Jim Beechey ConVerge 2015 | 45:44 | 0 | |
|
2022-03-22 | Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock ConVerge 2015 | 52:18 | 0 | |
|
2022-03-22 | 10 Reasons Your Security Education Program Sucks Kris French Jr ConVerge 2015 | 41:34 | 0 | |
|
2022-03-22 | Four Pillars Passion Vision Communication Execution Edgar Rojas ConVerge 2015 | 41:28 | 1 | |
|
2022-03-22 | Food Fight J Wolfgang Goerlich ConVerge 2016 | 30:36 | 0 | |
|
2022-03-22 | Expanding Your Toolbox the DIY Way Chris Maddalena ConVerge 2016 | 31:05 | 0 | |
|
2022-03-22 | Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring ConVerge 2016 | 43:40 | 0 | |
|
2022-03-22 | Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer | 52:53 | 0 | |
|
2022-03-22 | MySQL 57 Security Dave Stokes | 30:24 | 0 | |
|
2022-03-22 | Enterprise Class Threat Management Like A Boss Rockie Brockway ConVerge 2016 | 54:25 | 0 | |
|
2022-03-22 | Security Compliance Simple Pick 2 Joshua Marpet ConVerge 2016 | 2:39:05 | 0 | |
|
2022-03-22 | Building a better user Developing a security fluent society Rich Cassara ConVerge 2016 | 28:53 | 0 | |
|
2022-03-22 | Maneuvering Management Madness Andrew Hay | 57:39 | 0 | |
|
2022-03-22 | Haking the Next Generation David Schwartzberg | 57:37 | 1 | |
|
2022-03-22 | AppSec Awareness A Blue Print for Security Culture Change Chris Romeo ConVerge 2016 | 51:23 | 0 | |
|
2022-03-22 | Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz | 1:00:23 | 1 | Walkthrough |
|
2022-03-22 | Game of Hacks Play Hack and Track Joshua Clark | 45:38 | 1 | |
|
2022-03-22 | Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie ConVerg | 56:47 | 0 | |
|
2022-03-22 | Food Fight J Wolfgang Goerlich | 30:36 | 0 | |
|
2022-03-22 | Keynote 1 Steve Werby | 52:02 | 0 | |
|
2022-03-22 | Expanding Your Toolbox the DIY Way Chris Maddalena | 31:05 | 0 | |
|
2022-03-22 | Violating Trust Social Engineering Past and Present Paul Blonsky | 29:13 | 1 | |
|
2022-03-22 | Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring | 43:40 | 4 | |
|
2022-03-22 | Threat Modeling for Secure Software Design Robert Hurlbut | 48:07 | 0 | |
|
2022-03-22 | Enterprise Class Threat Management Like A Boss Rockie Brockway | 54:25 | 1 | |
|
2022-03-22 | Surreal Paradigms Automotive Culture Crash Dave Schaefer | 48:11 | 0 | |
|
2022-03-22 | Building a better user Developing a security fluent society Rich Cassara | 28:53 | 0 | |
|
2022-03-22 | Still broken after all these years aka Utility Security for Smarties Doug Nibbelink | 46:26 | 1 | |
|
2022-03-22 | AppSec Awareness A Blue Print for Security Culture Change Chris Romeo | 51:23 | 0 | |
|
2022-03-22 | Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer ConVerge 2016 | 52:53 | 0 | |
|
2022-03-22 | So Youve Inherited a Security Department Now What Amanda Berlin | 50:07 | 0 | |
|
2022-03-22 | Violating Trust Social Engineering Past and Present Paul Blonsky ConVerge 2016 | 29:13 | 0 | |
|
2022-03-22 | MySQL 57 Security Dave Stokes ConVerge 2016 | 30:24 | 0 | |
|
2022-03-22 | Sentry on the Wall Reid Brosko | 44:41 | 4 | |
|
2022-03-22 | Threat Modeling for Secure Software Design Robert Hurlbut ConVerge 2016 | 48:07 | 0 | |
|
2022-03-22 | Maneuvering Management Madness Andrew Hay ConVerge 2016 | 57:39 | 0 | |
|
2022-03-22 | Surreal Paradigms Automotive Culture Crash Dave Schaefer ConVerge 2016 | 48:11 | 0 | |
|
2022-03-22 | Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz ConVerge 2016 | 1:00:23 | 2 | Walkthrough |
|
2022-03-22 | Still broken after all these years aka Utility Security for Smarties Doug Nibbelink ConVerge 2016 | 46:26 | 0 | |
|
2022-03-22 | Keynote 1 Steve Werby ConVerge 2016 | 52:02 | 0 | |
|
2022-03-22 | So Youve Inherited a Security Department Now What Amanda Berlin ConVerge 2016 | 50:07 | 0 | |
|
2022-03-22 | Haking the Next Generation David Schwartzberg ConVerge 2016 | 57:37 | 0 | |
|
2022-03-22 | Security Compliance Simple Pick 2 Joshua Marpet | 2:39:05 | 1 | |
|
2022-03-22 | Sentry on the Wall Reid Brosko ConVerge 2016 | 44:41 | 0 | |
|
2022-03-22 | Game of Hacks Play Hack and Track Joshua Clark ConVerge 2016 | 45:38 | 0 | |
|
2022-03-22 | Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie | 56:47 | 0 | |
|
2022-03-22 | ComfyCon AU 2020 Summer 28th November | 9:38:29 | 24 | |
|
2022-03-22 | ComfyCon AU 2020 Summer 29th November | 9:52:01 | 27 | |
|
2022-03-22 | How to keep kickass women in tech take a lesson from snowboarding Toni James ComfyCon AU 2020 | 23:26 | 6 | Guide |
|
2022-03-22 | How to Fight a Virus with a Spreadsheet Allen Baranov ComfyCon AU 2020 Winter | 31:46 | 4 | Guide |
|
2022-03-22 | Hanging on the Telephone Hacking VoIP Sarah Young ComfyCon AU 2020 Winter | 36:02 | 5 | |
|
2022-03-22 | Good Incident Response More Than Just Tech Stuff Ryan Janosevic ComfyCon AU 2020 Winter | 22:13 | 3 | |
|
2022-03-22 | Zero Trust it is not just about infrastructure TM Ching ComfyCon AU 2020 Winter | 15:38 | 1 | |
|