2021-11-12 | Nigel Phair Reporting to the Board | 36:14 | 0 | |
|
2021-11-12 | Zeke Vogts, Christian Unger Gaps in the Agreement | 30:51 | 2 | |
|
2021-11-12 | Garrett O'Hara Cyber Resiliency That Starts With Email | 34:44 | 2 | |
|
2021-11-12 | Eric Pinkerton Look Who's Talking AusCERT 2017 | 38:28 | 1 | |
|
2021-11-12 | Troy Hunt The Responsibility of Disclosure | 39:01 | 1 | |
|
2021-11-12 | Dix Dallas Northrop Grumman Support to the Department of Homeland Security | 40:45 | 4 | |
|
2021-11-12 | Frank Walsh Launch, Detect, Evolve | 46:57 | 0 | |
|
2021-11-12 | Todd Peterson Identity is the New Perimeter | 16:27 | 0 | |
|
2021-11-12 | David Jorm Penetration Testing Android Applications and Embedded Devices | 29:46 | 5 | |
|
2021-11-12 | Nick Savvides Combating Advanced Cybersecurity Threats with AI | 23:30 | 0 | |
|
2021-11-12 | Stephen Ginty Leveraging Global Datasets to Improve your Cyber Investigations | 37:31 | 1 | |
|
2021-11-12 | Michael Gianarakis Developing Secure iOS Applications | 37:34 | 4 | |
|
2021-11-12 | Meena Wahi Managing Cyber Risk, Governance and Compliance | 39:56 | 0 | |
|
2021-11-12 | Daniel Schell ASD Top 4 Compliance and what auditors look for - AusCERT 2017 | 36:53 | 50 | |
|
2021-11-12 | Speed Debate AusCERT 2017 | 52:51 | 2 | |
|
2021-11-12 | Mark Bruhn Information Sharing and CyberSecurity AusCERT 2017 | 40:39 | 2 | Guide |
|
2021-11-12 | ATT&CKcon Power Hour October 2020 Full Session | 1:31:38 | 0 | |
|
2021-11-12 | Farah Magrabi, Macquarie University | 39:42 | 12 | |
|
2021-11-12 | Eric Johansen, FireMon Security Analytics for Data Discovery | 23:41 | 1 | |
|
2021-11-12 | Edward Farrell, Mercury Information Security Services | 38:16 | 7 | Guide |
|
2021-11-12 | David Litchfield, Google Hackproofing Oracle eBusiness Suite | 41:31 | 4 | |
|
2021-11-12 | David Lacey, iDcare Identity Aftermath | 34:55 | 3 | |
|
2021-11-12 | Mick Stephens, FireMon Effective management of Information Security | 28:21 | 1 | Guide |
|
2021-11-12 | Chris Horsley, Cosive Maturing your security team haste makes waste | 45:22 | 0 | |
|
2021-11-12 | Keynote speaker Kayne Naughton, Cosive The Sorcerer's Apprentice | 47:15 | 3 | | Sorcerer's Apprentice
|
2021-11-12 | Keynote speaker Darren Kitchen, Hak5 | 40:46 | 47 | |
|
2021-11-12 | Zoltan Balazs, MRG Effitas Sandbox Detection Leak, Abuse, Test | 34:59 | 1 | |
|
2021-11-12 | William Caelli, International Information Security Consultants Cryptowars Redux | 39:54 | 0 | Guide |
|
2021-11-12 | Troy Hunt, troyhunt com Lessons from a quarter of a billion breached records | 39:00 | 2 | |
|
2021-11-12 | Tim Hudson, Cryptsoft OpenSSL after HeartBleed | 36:59 | 11 | |
|
2021-11-12 | Steve Wilson, Lockstep Technologies Blockchain The Hype Machine | 38:26 | 1 | Vlog |
|
2021-11-12 | Ashley Deuble, Griffith University The 6 stages of incident response | 37:33 | 1 | |
|
2021-11-12 | Andrew Jamieson, UL IOT Security It's in the Stars | 40:09 | 4 | |
|
2021-11-12 | Speed Debate & Closing Remarks AusCERT 2016 | 50:59 | 2 | |
|
2021-11-12 | Sanjay Aurora, Darktrace Gaining real time intelligence | 36:23 | 22 | |
|
2021-11-12 | Keynote speaker Bill Duane, RSA What breaches teach, and education the hard way | 46:37 | 0 | |
|
2021-11-12 | Plenary Kent Shuart, Dell AusCERT 2016 | 15:12 | 3 | |
|
2021-11-12 | Plenary Aamir Lakhani, Fortinet Spies, Geeks, and Tracking | 20:34 | 9 | |
|
2021-11-12 | Hanno Böck The burden of faulty TLS implementations | 38:48 | 4 | |
|
2021-11-12 | Nik Cubrilovic Stock Hacks AusCERT 2016 | 38:06 | 7 | |
|
2021-11-12 | Fraser Tweedale, Red Hat Network bound encryption with Tang and Clevis | 40:16 | 40 | |
|
2021-11-12 | Neal Wise, Assurance Threat modelling in higher education | 42:35 | 10 | |
|
2021-11-12 | Fatih Ozavci, Context Information Security Hardware Hacking Chronicles | 42:24 | 1 | Guide |
|
2021-11-12 | ATT&CKcon Power Hour November 2020 Full Session | 1:32:37 | 2 | |
|
2021-11-12 | ATT&CKing The Cloud Hopping Between The Matrices November 2020 | 27:38 | 0 | |
|
2021-11-12 | Putting the PRE into ATT&CK November 2020 | 10:11 | 0 | |
|
2021-11-12 | Mapping The Eventbot Mobile Banking Trojan With MITRE ATT&CK For Mobile November 2020 | 17:40 | 3 | |
|
2021-11-12 | Without Attacking Transforming Adversary Emulations Into A Data Analysis Question October 2020 | 16:45 | 1 | |
|
2021-11-12 | Whats A MITRE With Your Security November 2020 | 17:31 | 0 | |
|
2021-11-12 | Jen Burns ATT&CKcon Power Hour October 2020 | 9:33 | 1 | |
|
2021-11-12 | Detecting ATT&CKs With Dynamic Thresholds Using Tukey’s Test and Azure Sentinel October 2020 | 17:02 | 2 | |
|
2021-11-12 | Building Detections For Cloud With Kql and ATT&CK November 2020 | 16:57 | 2 | |
|
2021-11-12 | Using MITRE PRE ATT&CK and ATT&CK In Cybercrime Education and Research October 2020 | 14:45 | 2 | |
|
2021-11-12 | Ta505 A Study of High End Big Game Hunting In 2020 October 2020 | 11:51 | 5 | |
|
2021-11-12 | Starting Over with Sub Techniques Lessons Learned Remapping Detection Analytics October 2020 | 16:25 | 5 | |
|
2021-11-12 | Raiders of the MITRE Framework How to Build Your Own Threat Library | 25:11 | 5 | Guide |
|
2021-11-12 | Closing Remarks ATT&CKcon 2019 | 15:28 | 0 | |
|
2021-11-12 | attckr Toolkit of ATT&CK Incident Data for Service Providers & Organizations | 14:18 | 5 | |
|
2021-11-12 | ATT&CK Updates TRAM | 13:39 | 3 | Vlog |
|
2021-11-12 | ATT&CK Updates Sightings | 13:00 | 0 | Vlog |
|
2021-11-12 | ATT&CK Updates ICS | 13:14 | 0 | Vlog |
|
2021-11-12 | ATT&CK Updates Controls Mapping | 12:14 | 0 | Vlog |
|
2021-11-12 | ATT&CK Updates CAR and Analytics | 12:31 | 1 | Vlog |
|
2021-11-12 | AMITT ATT&CK based Standards for Misinformation Threat Sharing | 23:59 | 2 | Guide |
|
2021-11-12 | Prioritizing Data Sources for Minimum Viable Detection | 27:50 | 0 | |
|
2021-11-12 | Alertable Techniques for Linux Using ATT&CK | 25:05 | 2 | |
|
2021-11-12 | Prioritizing ATT&CK Informed Defenses the CIS Way | 24:24 | 1 | |
|
2021-11-12 | PRE ATT&CK Integration | 7:57 | 1 | |
|
2021-11-12 | MITRE Executive Welcome | 4:39 | 0 | |
|
2021-11-12 | Keynote Address The Friends We Made Along the Way | 36:38 | 1 | |
|
2021-11-12 | MITRE ATT&CK Assessment from a Data Perspective | 12:14 | 1 | |
|
2021-11-12 | How a Threat Hunting Team Has Upgraded Its Use of ATT&CK | 30:12 | 1 | |
|
2021-11-12 | Lightning Talks ATT&CKcon 2019 | 40:14 | 0 | |
|
2021-11-12 | From Susceptible to ATT&CK A Threat Hunting Story | 23:46 | 0 | |
|
2021-11-12 | Flashback with ATT&CK Exploring Malware History with ATT&CK 2003 2018 | 13:02 | 2 | |
|
2021-11-12 | Lessons in Purple Teaming with ATT&CK | 25:26 | 0 | |
|
2021-11-12 | Day One tagged | 15:43 | 0 | |
|
2021-11-12 | Using Threat Intelligence to Focus ATT&CK Activities | 26:22 | 1 | |
|
2021-11-12 | Threat Informed Defense Where do we go from here | 14:40 | 1 | |
|
2021-11-12 | The World's Most Dangerous ATT&CKers | 12:48 | 0 | |
|
2021-11-12 | The ATT&CKcon Couch highlights | 2:42 | 0 | |
|
2021-11-12 | Tell Tall Tales with ATT&CK | 12:42 | 0 | |
|
2021-11-12 | State of the ATT&CK | 28:41 | 0 | |
|
2021-11-12 | Ready to ATT&CK Bring Your Own Data BYOD and Validate Your Data Analytics | 27:10 | 1 | |
|
2021-11-12 | Welcome | 10:43 | 1 | |
|
2021-11-12 | Zeek based ATT&CK Metrics & Gap Analysis | 13:54 | 1 | |
|
2021-11-12 | Day 1 Highlights ATT&CKcon 2019 | 2:02 | 0 | |
|
2021-11-12 | From Automation to Analytics | 30:23 | 0 | |
|
2021-11-12 | Hunters ATT&CKing with the Data | 28:51 | 0 | |
|
2021-11-12 | 5 Ways to Screw Up Your Security Program with ATT&CK | 32:59 | 0 | |
|
2021-11-12 | Operationalizing ATT&CK | 5:10 | 0 | |
|
2021-11-12 | OSQuery = Love ATT&CKcon 2018 | 19:54 | 6 | |
|
2021-11-12 | Advancing Infosec, Keynote Presentation | 41:44 | 0 | |
|
2021-11-12 | Playing Devil’s Advocate to Security Initiatives with ATT&CK | 29:40 | 0 | |
|
2021-11-12 | Sofacy 2018 and the Adversary Playbook ATT&CKcon 2018 | 29:17 | 7 | |
|
2021-11-12 | Agile Continuous Improvement Using ATT&CK | 28:25 | 3 | |
|
2021-11-12 | All the Things ATT&CKcon 2018 | 29:22 | 0 | |
|
2021-11-12 | Summiting the Pyramid of Pain Operationalizing ATT&CK | 28:20 | 2 | |
|
2021-11-12 | The Use of Game Theory with MITRE ATT&CK | 6:13 | 1 | |
|
2021-11-12 | An ATT&CK Review of 200 Hybrid Analysis Submissions | 13:40 | 3 | Review |
|