2021-10-07 | Just Enough Asset Inventory | 10:43 | 2 | |
|
2021-10-07 | Hash SSH Client Server Profiling Ben Reardon | 20:08 | 1 | |
|
2021-10-07 | Forecasting, Browsers, and In The Wild Exploitation Ryan McGeehan | 29:00 | 3 | |
|
2021-10-07 | Welcome to ACoD | 4:21 | 2 | |
|
2021-10-07 | Zac Brown, Hidden Treasure Detecting Intrusions with ETW, Ops Track | 21:37 | 1 | |
|
2021-10-07 | Winn Schwartau, The Analogue Prism | 31:27 | 1 | Vlog |
|
2021-10-07 | Rich MacVarish, Structured Analytic Techniques Moving from Art to Science in Analysis | 30:11 | 3 | |
|
2021-10-07 | Pete Lindstrom, Applying Risk Reduced per Unit Cost to IT Adversarial Risk Management, Phils | 33:30 | 0 | |
|
2021-10-07 | Paul Simmonds, Fix digital identity, stop the bad guys | 28:15 | 9 | |
|
2021-10-07 | Max Kilger, Anticipating the Nature and LIkelihood of a Cyberterror Community | 30:02 | 0 | |
|
2021-10-07 | Kelly Shortridge, Know Thyself Optimizing Team Decision Making | 23:08 | 59 | |
|
2021-10-07 | Jonathan Spring,Forensics, decisions, and making the abstract concrete | 30:19 | 0 | |
|
2021-10-07 | John Brown, Drop packets really fast with BGP, uRPF and Exa BGP, Ops Track | 26:10 | 3 | |
|
2021-10-07 | Trenton Ivey, The Medium Makes the Art Vulnerabilities vs Tactics | 26:32 | 2 | |
|
2021-10-07 | Tom Ottoson, Finding the Grey Sheep before they go Baaaaad | 18:58 | 1 | |
|
2021-10-07 | Steve Crocker, The standards process | 21:19 | 0 | |
|
2021-10-07 | Sounil Yu, The Cyber Defense Matrix A Scientific Model for Cybersecurity | 33:05 | 40 | |
|
2021-10-07 | Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track | 13:22 | 1 | Guide |
|
2021-10-07 | Slack Announcement | 1:12 | 5 | |
|
2021-10-07 | Sacha Faust, Scaling Red Team, Ops Track | 28:51 | 1 | |
|
2021-10-07 | Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track | 33:52 | 1 | |
|
2021-10-07 | Ido Safruti, Abusing Google and Facebook login, Ops Track | 23:03 | 0 | Vlog |
|
2021-10-07 | Gadi Evron, Co evolutionary arms races with potentially highly adapted adversary | 34:36 | 1 | |
|
2021-10-07 | Falcon Darkstar Momot, How can a protocol be concise | 28:18 | 6 | |
|
2021-10-07 | Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track | 29:54 | 4 | |
|
2021-10-07 | Conference Intro feat Gadi Evron, Stop Putting Attackers on A Pedestal | 4:19 | 1 | |
|
2021-10-07 | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track | 32:00 | 8 | Vlog |
|
2021-10-07 | Art Manion, Desperately Seeking Severity | 31:35 | 0 | |
|
2021-10-07 | Alex Pinto, Beyond Matching Applying Data Science Techniques to IOC based Detection, Ops Track | 35:35 | 1 | |
|
2021-10-07 | Alban Diquet, TrustKit A defensive library to protect communication on mobile apps, Ops Track | 31:04 | 3 | |
|
2021-10-07 | Aaron Shelmire, Decreasing Dwell Time, Ops Track | 26:40 | 1 | |
|
2021-10-07 | John Althouse, Detection Bro, Ops Track | 25:20 | 1 | |
|
2021-10-07 | Joel Wilbanks and Steve Orrin, Adding Discipline to Information | 18:47 | 0 | Guide |
|
2021-10-07 | Joe Stewart feat Inbar Raz, Researcher Conferences Suck | 6:59 | 0 | |
|
2021-10-07 | Jesse Trucks, Future proof the InfoSec Arms Race | 30:54 | 1 | |
|
2021-10-07 | Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track | 28:04 | 0 | |
|
2021-10-07 | Sacha Faust, Scaling Red Team, Ops Track | 28:51 | 4 | |
|
2021-10-07 | Zac Brown, Hidden Treasure Detecting Intrusions with ETW, Ops Track | 21:37 | 1 | |
|
2021-10-07 | Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track | 13:22 | 6 | Guide |
|
2021-10-07 | Sam Wilson, Logging the next trillion events, Ops Track | 22:02 | 0 | Vlog |
|
2021-10-07 | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track | 32:00 | 27 | Vlog |
|
2021-10-07 | Carlos Sanchez, Apache Spot, Opa Track | 26:43 | 1 | |
|
2021-10-07 | Bryan Zimmer, Location Independent Security Approach LISA, Ops Track | 21:34 | 1 | |
|
2021-10-07 | Alex Pinto, Beyond Matching Applying Data Science Techniques to IOC based Detection, Ops Track | 35:35 | 0 | |
|
2021-10-07 | Alban Diquet, TrustKit A defensive library to protect communication on mobile apps, Ops Track | 31:04 | 14 | |
|
2021-10-07 | Aaron Shelmire, Decreasing Dwell Time, Ops Track | 26:40 | 0 | |
|
2021-10-07 | Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track | 33:52 | 0 | |
|
2021-10-07 | John Brown, Drop packets really fast with BGP, uRPF and Exa BGP, Ops Track | 26:10 | 7 | |
|
2021-10-07 | John Althouse, Detection Bro, Ops Track | 25:20 | 2 | |
|
2021-10-07 | Joe Stewart feat Inbar Raz, Researcher Conferences Suck | 6:59 | 0 | |
|
2021-10-07 | Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track | 28:04 | 0 | |
|
2021-10-07 | Ido Safruti, Abusing Google and Facebook login, Ops Track | 23:03 | 0 | Vlog |
|
2021-10-07 | Ido Safruti, Abusing Google and Facebook login On the risks in trusting , Ops Track | 11:40 | 0 | Vlog |
|
2021-10-07 | Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track | 29:54 | 3 | |
|
2021-10-07 | Conference Intro feat Gadi Evron, Stop Putting Attackers on A Pedestal | 4:19 | 1 | |
|
2021-10-06 | Holograma Seguridad Informática Rueda de Prensa ACK Security Conference | 17:34 | 0 | Vlog |
|
2021-10-06 | Jairo asistente al ACK Security Conference | 2:18 | 2 | |
|
2021-10-06 | Jeyson y Juan David asistentes al ACK Security Conference, nos dejan sus comentarios | 2:20 | 1 | |
|
2021-10-06 | Leonardo Pigñer nos deja sus comentarios sobre el ACK Security Conference | 1:17 | 2 | |
|
2021-10-06 | Lorenzo Martinez nos deja sus comentarios sobre el ACK Security Conference | 0:52 | 1 | |
|
2021-10-06 | Matias Katz nos deja sus comentarios sobre el ACK Security Conference | 1:27 | 2 | |
|
2021-10-06 | Alfonso Deluque nos deja sus comentarios sobre el ACK Security Conference | 0:18 | 8 | |
|
2021-10-06 | Alvaro Andrade nos hace su comentario sobre el ACK Security Conference | 1:04 | 1 | |
|
2021-10-06 | Andres Quintero, asistente al ACK Security Conference, nos deja sus comentarios | 0:38 | 1 | |
|
2021-10-06 | Armando Batun asistente al ACK Security Conference, nos deja sus comentarios | 0:56 | 1 | |
|
2021-10-06 | Congreso Internacional de Seguridad Informática ACK Security Conference | 4:00 | 1 | |
|
2021-10-06 | Daniel Correa HadeS nos deja sus comentarios sobre el ACK Security Conference | 1:16 | 1 | |
|
2021-10-06 | David Moreno nos deja sus comentarios sobre el ACK Security Conference | 2:07 | 2 | |
|
2021-10-06 | Giovanny Cruz nos deja sus comentarios sobre el ACK Security Conference | 1:07 | 1 | |
|
2021-10-06 | Demo con Rovio WowWee de Lorenzo Martinez en el ACK Security Conference 2012 | 4:24 | 18 | |
|
2021-10-06 | Lorenzo Martinez nos deja sus comentarios sobre el ACK Security Conference | 0:52 | 1 | |
|
2021-10-06 | Matias Katz nos deja sus comentarios sobre el ACK Security Conference | 1:27 | 2 | |
|
2021-10-06 | Maximus asistente al ACK Security Conference, nos deja sus comentarios | 1:01 | 1 | |
|
2021-10-06 | Pedro Joaquín nos deja sus comentarios sobre el ACK Security Conference | 1:08 | 1 | |
|
2021-10-06 | Quibdó presente en el ACK Security Conference 2012 | 2:56 | 1 | |
|
2021-10-06 | RIC Red Informatica Colombiana nos cuentan sobre el CTF y el ACK Security Conference | 1:51 | 1 | |
|
2021-10-06 | Sebastian Bortnik nos deja sus comentarios sobre el ACK Security Conference | 0:45 | 1 | |
|
2021-10-06 | W32 HOLOGRAF LawWait | 0:30 | 1 | Vlog |
|
2021-10-06 | Giovanny Cruz nos deja sus comentarios sobre el ACK Security Conference | 1:07 | 2 | |
|
2021-10-06 | Holograma Seguridad Informática Rueda de Prensa ACK Security Conference | 17:34 | 1 | Vlog |
|
2021-10-06 | Jairo asistente al ACK Security Conference | 2:18 | 1 | |
|
2021-10-06 | Jeyson y Juan David asistentes al ACK Security Conference, nos dejan sus comentarios | 2:20 | 1 | |
|
2021-10-06 | Leonardo Pigñer nos deja sus comentarios sobre el ACK Security Conference | 1:17 | 4 | |
|
2021-10-06 | Scout Suite A Multi Cloud Security Auditing Tool Xavier Garceau Aranda | 42:02 | 70 | |
|
2021-10-06 | Rebalance Every 10,000 Kilometers J Wolfgang Goerlich | 55:47 | 3 | |
|
2021-10-06 | Playbook On How To Be The First Security Engineer At A Company Kashish Mittal | 45:31 | 3 | Guide |
|
2021-10-06 | Owning The Cloud Through SSRF Cody Brocious | 30:38 | 9 | |
|
2021-10-06 | Outsourcing Global Cyber Norms Katharina Sommer | 42:46 | 6 | |
|
2021-10-06 | Opening Adrian and Steve | 11:32 | 1 | |
|
2021-10-06 | Office Equipment The Front Door To Persistence On Enterprise Networks D Romero and M Rivas | 47:28 | 2 | |
|
2021-10-06 | Making Something Out Of Something Chris Wade | 25:25 | 3 | |
|
2021-10-06 | Throw Open The Gates Trading Control For Visibility Kyle Tobener and Alessandro Lapucci | 42:57 | 2 | |
|
2021-10-06 | The Frugal Girl's Guide to Threat Intelligence Presented By Rebekah Brown | 54:49 | 3 | Guide |
|
2021-10-06 | The CISO's Dilemma Saumil Shah | 39:40 | 2 | |
|
2021-10-06 | The Billion Dollar IoT Attack No One Knows About Tony Gee and Vangelis Stykas | 54:05 | 8 | |
|
2021-10-06 | Spyware, Ransomware And Worms How To Prevent The Next SAP Tragedy Jordan Santarsieri | 54:58 | 4 | Guide |
|
2021-10-06 | Day 2 Opening Sam | 1:29 | 13 | |
|
2021-10-06 | Community Evening Opening Adrian and Steve | 13:52 | 6 | |
|
2021-10-06 | Cold War Cryptography Klaus Schmeh | 48:36 | 7 | |
|
2021-10-06 | Closing Ceremony Adrian and Steve | 27:50 | 1 | |
|