2023-06-07 | Taking Action against SLAPPs in Europe | 48:29 | 0 | |
|
2023-06-07 | IRMA and Verifiable Credentials | 30:48 | 0 | |
|
2023-06-07 | Finding 0days in Enterprise Web Applications | 41:10 | 0 | |
|
2023-06-07 | Hacking with Microbes | 52:46 | 0 | |
|
2023-06-07 | Reproducible Builds for Trustworthy Binaries | 31:05 | 0 | |
|
2023-06-07 | IRMA's Idemix core Understanding the crypto behind selective, unlinkable attribute disclosu | 50:33 | 1 | |
|
2023-06-07 | Meta Press es Decentralized search engine for press reviews | 49:18 | 0 | Review |
|
2023-06-07 | First Privacy, Now Safety An Anthology of Tales from the Front Lines of Cyber Physical Secu | 42:53 | 0 | Vlog |
|
2023-06-07 | Reverse engineering the Albert Heijn app for fun and profit | 29:11 | 0 | |
|
2023-06-07 | TASBot OoT ACE How to get the Triforce on an N64 via controller input | 48:29 | 0 | Guide |
|
2023-06-07 | Heuristic Park why we can fake it until we make it | 48:28 | 0 | |
|
2023-06-07 | It's not just stalkerware | 25:58 | 1 | |
|
2023-06-07 | Modernizing the Tor Ecosystem for the Future | 49:20 | 0 | |
|
2023-06-07 | RE VoLTE Should we stop the shutdown of 2G 3G to save lives | 29:24 | 0 | |
|
2023-06-07 | Keep Ukraine Connected | 32:16 | 0 | |
|
2023-06-07 | Free children from the digital stranglehold | 49:57 | 0 | |
|
2023-06-07 | HomeComputerMuseum, the making, the challenges and the importance | 51:28 | 0 | |
|
2023-06-07 | Rocking the Web Bloat Modern Gopher, Gemini and the Small Internet | 47:34 | 0 | |
|
2023-06-07 | How to charge your car the open source way with EVerest | 21:50 | 0 | Guide |
|
2023-06-07 | Plotting the Pandemic or Any Other Catastrophe Movie | 50:59 | 0 | |
|
2023-06-07 | How to Secure the Software Supply Chain | 47:17 | 0 | Guide |
|
2023-06-07 | Hacking COVID Hackers helping the government | 48:32 | 1 | |
|
2023-06-07 | The War in Ukraine Cyberfront | 1:24:25 | 3 | |
|
2023-06-07 | Signal you were the chosen one | 31:30 | 1 | |
|
2023-06-07 | Literally Hacking the Planet How Earth Systems Models Work | 48:25 | 0 | |
|
2023-06-07 | How to sneak past the Blue Team of your nightmares | 45:26 | 1 | Guide |
|
2023-06-07 | PolyCoin A game played across MCH How it works and what is inside it | 36:57 | 1 | |
|
2023-06-07 | Hacking the genome how does it work, and should we | 49:08 | 2 | |
|
2023-06-07 | ICS stands for Insecure Control Systems | 43:40 | 0 | |
|
2023-06-07 | Threat modeling mechanical locking systems, by analyzing puzzles | 35:19 | 2 | |
|
2023-06-07 | illumos SmartOS, specialized Type 1 Hypervisor | 27:05 | 3 | |
|
2023-06-07 | TIC 80 byte jam | 1:29:31 | 1 | |
|
2023-06-03 | The path to code provenance at uber Matt Finifter, Debosmit Ray, Tony Ngo | 36:34 | 9 | |
|
2023-06-03 | Who wants a thousand free puppies Michael Scovetta | 24:13 | 3 | |
|
2023-06-03 | A good first impression can work wonders creating AppSec training that developers Leif Dreizler | 25:09 | 2 | |
|
2023-06-03 | The seven habits of a highly effective DevSecOp James Wickett | 40:32 | 3 | |
|
2023-06-03 | Bug Bounty Botox Katie Moussouris | 40:34 | 6 | |
|
2023-06-03 | The truth about cookies, tokens and APIs Phillipe de Ryck | 38:43 | 8 | |
|
2023-06-03 | Bulletproof Shoes Fikrie Yunaz, Nikki Brandt | 34:56 | 1 | |
|
2023-06-03 | Tips and tricks for effective vulnerability management Pieter Okcers | 23:48 | 1 | |
|
2023-06-03 | Content Security Policy A successful mess between hardening and mitigation Spagnuolo Weichselbaum | 42:04 | 1 | |
|
2023-06-03 | Trust & Safety Engineering @ GitHub Lexi Galantino | 29:04 | 0 | |
|
2023-06-03 | Trusted types & the end of DOM XSS Krzysztof Kotowicz | 40:51 | 4 | |
|
2023-06-03 | Evolving beyond the vulnerability whack a mole game Jake Kouns | 28:33 | 0 | |
|
2023-06-03 | Upstreaming Security to Rails Neil Matatall | 30:56 | 1 | |
|
2023-06-03 | Hana Hou Panel | 1:05:00 | 2 | |
|
2023-06-03 | Visibility & Control Addressing supply chain challenges Bob Martin | 25:18 | 1 | |
|
2023-06-03 | Have you adapted your AppSec David Lindner | 39:20 | 0 | |
|
2023-06-03 | How not to use OAuth Dr Fett | 42:04 | 0 | |
|
2023-06-03 | JavaScript Supply Chain Security Adam Baldwin | 26:14 | 0 | |
|
2023-06-03 | Multi party vulnerability response in with OSS Jorge Lopez | 32:41 | 0 | |
|
2023-06-03 | s software bill of materials the looming format skirmish David nalley | 27:13 | 2 | |
|
2023-06-03 | SDL at scale growing security champions Ryan O'boyle | 29:38 | 0 | |
|
2023-06-03 | Security learns to sprint DevSecOps Tanya Janca | 39:48 | 2 | |
|
2023-06-03 | Shifting Product Security from FORCEFUL to RESOURCEFUL Christine Gadsby | 27:03 | 0 | |
|
2023-06-03 | The Current State of Memory Forensics John Hale YouTube | 46:19 | 4 | |
|
2023-06-03 | Pen Testing Red and Blue Working Together Martin Bos | 1:00:12 | 1 | |
|
2023-06-03 | The Domain Name System DNS Operation Threats and Security Intelligence Tom Kopchak | 36:05 | 1 | |
|
2023-06-03 | Securing Docker Containers Chris Huntington | 45:30 | 4 | |
|
2023-06-03 | Building Our Workforce Kristen Bell | 24:23 | 3 | |
|
2023-06-03 | The Transition Risk Assessment Risk Management Mike Neal | 26:46 | 0 | |
|
2023-06-03 | Cloud Access Security Broker 6 Steps To Addressing Your Cloud Risks Matt Bianco | 44:43 | 2 | |
|
2023-06-03 | The Use Of Covert Communications In Modern Cyber Attacks Chris Haley | 39:31 | 1 | |
|
2023-06-03 | Cloud Security Introduction To FedRAMP Sese Bennet | 44:51 | 2 | |
|
2023-06-03 | Darwinism vs Forensics Bill Dean | 52:58 | 0 | |
|
2023-06-03 | Data Loss Prevention Group Therapy Brandon Baker | 55:56 | 1 | |
|
2023-06-03 | Data Loss Prevention How to get the most for your buck Brandon Baker | 38:02 | 1 | Guide |
|
2023-06-03 | Emerging Governance Frameworks for Healthcare Security Max Aulakh | 33:54 | 1 | |
|
2023-06-03 | How to Talk to Executives about Security Harlen Compton | 40:55 | 0 | Guide |
|
2023-06-03 | Insiders are the New Malware Brian Vecci YouTube | 40:16 | 0 | |
|
2023-06-03 | Louisville InfoSec 2016 Closing | 14:49 | 0 | |
|
2023-06-03 | Lunch Keynote00 The Art of Offense and Defense Mark Loveless | 56:26 | 0 | |
|
2023-06-03 | Morning Keynote00 Chandler Howell Ryan Murphy John Pollack | 54:42 | 0 | |
|
2023-06-03 | Not One Thin Dime Just Say No to Ransomware Mick Douglas | 44:30 | 1 | |
|
2023-06-03 | The Enemy Within Detecting and Mitigating Insider Threats Justin Wilkins | 35:09 | 1 | |
|
2023-06-03 | A Needle in the Cloud Michael Leigh | 45:14 | 0 | |
|
2023-06-03 | Assessing POS Devices for Tampering Chris Gida | 39:50 | 0 | |
|
2023-06-03 | How to make your next less awful by Default Tom Kopchak | 31:06 | 1 | Guide |
|
2023-06-03 | Investigating Malware using Registry Forensics Jason Hale | 44:03 | 2 | |
|
2023-06-03 | Learning Crypto By Doing It Wrong Jeremy Druin | 39:12 | 1 | |
|
2023-06-03 | Measuring Cyber Risk with Open FAIR Apolonio Garcia and John Zuziak | 45:50 | 0 | |
|
2023-06-03 | Morning keynote00 Building an Infrastructure to Withstand David Kennedy | 1:06:48 | 1 | |
|
2023-06-03 | Of Flags Frogs 4chan OPSec Vs Weponized Autism Adrian Crenshaw | 33:19 | 1 | |
|
2023-06-03 | Or How I Learned to Stop Worrying and Love the Robert L Brown | 32:56 | 0 | |
|
2023-06-03 | Show me the Money Using the CIS Critical Security Controls to procure funding for | 48:28 | 1 | |
|
2023-06-03 | Strengthening the Human Firewall Alexandra Panaretos | 36:06 | 1 | |
|
2023-06-03 | The Edge of Normal Mark Loveless | 53:58 | 0 | |
|
2023-06-03 | Keynote 02 Surviving the Modern Minefield Harlen R Compton CISSP Attorney at Law | 47:31 | 0 | |
|
2023-06-03 | Weaponizing Statistics Jeremy Druin and Erich Jackson | 43:31 | 0 | |
|
2023-06-03 | Opening | 9:32 | 2 | |
|
2023-06-03 | Ransowmare Recovery Edward McCabe | 52:48 | 0 | |
|
2023-06-03 | Taking the Next Steps in Cyber Security Connie Matthews Reynolds | 55:21 | 0 | |
|
2023-06-03 | The Escape Map Pivoting to a New Life of InfoSec Erich Jackson | 48:36 | 0 | |
|
2023-06-03 | Understanding Why Breaches Occur John Survant Don Wolfe | 47:54 | 2 | |
|
2023-06-03 | A Gentle Introduction to Hacking Mainframes Dan Helton | 1:15:16 | 5 | |
|
2023-06-03 | Building Your IAM Program from Start to Finish Jerod Brennen | 51:37 | 1 | |
|
2023-06-03 | Common Observations from a Security Assessor Corey Shell | 47:03 | 0 | |
|
2023-06-03 | Data Loss Prevention Demystified Micah K Brown | 45:04 | 1 | |
|
2023-06-03 | Digital Transformation Means Security Transformation Allyn Crowe | 51:38 | 1 | |
|
2023-06-03 | Improv Comedy for Social Engineering Dave Mattingly | 55:02 | 0 | |
|