2023-05-24 | Secret In me Florian Gaultier | 37:31 | 0 | |
|
2023-05-24 | Quantum Cyber Blochain IoT Jean Philippe Aumasson | 51:22 | 1 | |
|
2023-05-24 | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 58:09 | 1 | |
|
2023-05-24 | Reducing the Cyber Exposure Gap from Cloud to Containers Thomas Cueni, Tenable | 49:23 | 1 | |
|
2023-05-24 | Ph0wn smart devices CTF Behind the Scenes Axelle Apvrille & Philippe Paget | 57:25 | 0 | |
|
2023-05-24 | 5G Machine Learning Craig Gibson, Trend Micro | 58:26 | 1 | |
|
2023-05-24 | l0ss Liar, Liar a first timer red teaming under unusual restrictions | 15:49 | 0 | |
|
2023-05-24 | Laura Bell How can I help you | 27:07 | 2 | |
|
2023-05-24 | Matt Daley Access Control on Sesame Street Gallagher Cardax access control system research | 58:12 | 3 | |
|
2023-05-24 | Matthew Garrett Letting Bird scooters fly free | 15:21 | 4 | |
|
2023-05-24 | Matthew Ruffell The story of the Uncrackable Lockbox, and Why Hackers Need to Work Alongside D | 15:06 | 1 | |
|
2023-05-24 | Adel Karimi Seeing the Invisible Finding Fingerprints on Encrypted Traffic | 14:16 | 2 | |
|
2023-05-24 | Aliz Hammond Hunting for Gargoyles | 22:48 | 0 | |
|
2023-05-24 | Birk Kauer and Dennis Mantz Decrypt everything, everywhere | 14:17 | 1 | |
|
2023-05-24 | Courtney Eckhardt The mechanics of being good to each other | 28:34 | 2 | |
|
2023-05-24 | Fobski A security tale | 18:36 | 0 | |
|
2023-05-24 | Purple Keynote by Ray Redacted | 57:27 | 0 | |
|
2023-05-24 | The Beer Farmers' Infosec Pub Quiz | 54:24 | 1 | |
|
2023-05-24 | Purple TJ Null From Mantra to Mindset Preparing for the OSCP Journey | 54:22 | 3 | |
|
2023-05-24 | Red Lisa Forte Why staying silent will always keep you secure | 53:25 | 0 | |
|
2023-05-24 | Red Mike Gervais Hacking Universities in 20 Seconds | 31:34 | 0 | |
|
2023-05-24 | Red Charles Wroth I Recruit Hackers | 41:10 | 0 | |
|
2023-05-24 | Red Osku Building Your First Home Lab | 26:53 | 1 | |
|
2023-05-24 | Red DomDom Social Engineering for Red Team Attack Vectors | 38:46 | 0 | |
|
2023-05-24 | Red TheCyberViking Thrill of the Hunt | 49:13 | 0 | |
|
2023-05-24 | Red Keynote by Dave Kennedy | 53:51 | 0 | |
|
2023-05-24 | Blue AlanTheBlank Somebody's Watching Me | 25:49 | 0 | |
|
2023-05-24 | Lessons Learned Building a Software Supply Chain Security Team Josh Wallace | 55:31 | 5 | |
|
2023-05-24 | Working through your trust issues Niclas Kjellin | 49:40 | 0 | |
|
2023-05-24 | No, We Won't Be Threat Modeling Izar Tarandach | 1:01:57 | 0 | |
|
2023-05-24 | No Code No Risk What Happens When We Leave No Code up for Grabs Michael Bargury | 46:10 | 1 | |
|
2023-05-24 | Invited Dan Cornell Drivers for Software Supply Chain Security Programs | 50:34 | 4 | |
|
2023-05-24 | Social Engineering Your Metrics Using Data Science to Provide Value in Reporting Joe Gray | 44:07 | 0 | |
|
2023-05-24 | Spies, Saboteurs & ScoundrelsHow Russia, China & Nefarious Actors Are Hacking IOT, John Vecchi | 1:02:53 | 4 | |
|
2023-05-24 | Invited Garrett Gross 10lbs of tacos in a 5lb bag Lessons Learned from Security Operations | 55:15 | 1 | |
|
2023-05-24 | Invited James Wickett DevSecOps Warning Signs and What to Do About Them | 33:31 | 0 | |
|
2023-05-24 | The DevSecOps Playbook A step by step guide to implementing DevSecOps Paul McCarty | 54:25 | 0 | Guide |
|
2023-05-24 | Invited Jeff Williams The Case for Runtime Protection | 51:29 | 1 | |
|
2023-05-24 | Tips and Tactics for Creating Your Own CTF Event Adam Schaal | 51:18 | 0 | |
|
2023-05-24 | Invited Josh Sokol The Security Practitioner’s Guide to Going from No to Whoa | 44:47 | 0 | Guide |
|
2023-05-24 | Using your API Specs to attack your APIs Jason Kent | 56:54 | 2 | |
|
2023-05-24 | Invited Marcus J Carey Hacking Blockchain & Hacking Blockchain | 52:09 | 2 | |
|
2023-05-24 | 'Who allowed you to do that' Detecting and Controlling Rogue Third Party Scripts Brad Burkle | 48:48 | 0 | |
|
2023-05-24 | Invited Rafal Los Irrational by Effective Applying Parenthood Lessons to Cybersecurity | 39:53 | 0 | |
|
2023-05-24 | Invited Robert Hansen Infosec is Sick | 46:08 | 0 | |
|
2023-05-24 | Who watches the watchers Including ITSM, ITOM, APM, and CMDB in your audits Joseph Konieczka | 31:36 | 0 | |
|
2023-05-24 | Invited Theresa Lanowitz Securing the Edge | 43:22 | 0 | |
|
2023-05-24 | Keynote Adrian Sanabria Indistinguishable from Magic How the Cybersecurity Market Reached | 56:05 | 1 | |
|
2023-05-24 | Keynote Jim Manico The Abridged History of Application Security | 38:35 | 1 | |
|
2023-05-24 | Knowing What Risks Matter And Don’t In Your Open Source Naomi Buckwalter | 41:41 | 1 | |
|
2023-05-24 | LASCON 2022 Video Introduction | 0:47 | 0 | |
|
2023-05-24 | The Great Casino Heist Key Takeaways From My First Big Social Engineering Engagement Nick Doerner | 23:38 | 0 | |
|
2023-05-24 | #Psybersecurity The Signs and Symptoms of a Mental Health Attack Surface Dr Ryan Louie | 28:09 | 0 | |
|
2023-05-24 | Beyond Influence Techniques Christina Lekati | 1:05:41 | 2 | |
|
2023-05-24 | From The Dumpster To The Front Page Matt Malone | 42:47 | 1 | |
|
2023-05-24 | Genealogy OSINT and Social Engineering potential Inês Narciso | 48:12 | 0 | Vlog |
|
2023-05-24 | Hoarding the web Capturing information in 2021 Roelof Temmingh | 26:05 | 0 | Guide |
|
2023-05-24 | HUMINT phrases to identify background characteristics Dr Grigorios Fragkos | 14:52 | 0 | |
|
2023-05-24 | Illuminating Maritime Supply Chain Threats using OSINT A Suez Canal Post Mortem Rae Baker | 31:12 | 7 | |
|
2023-05-24 | Impetuous Investigations Samantha Gamble | 15:00 | 1 | |
|
2023-05-24 | Pattern Interrupts in Social Engineering Brandon Becker | 24:39 | 1 | |
|
2023-05-24 | PERSINT How to build a rapid communication profile using OSINT Richard Davy | 40:09 | 0 | Guide |
|
2023-05-24 | Pivot, Pivot, Pivot Mishaal Khan | 27:04 | 1 | |
|
2023-05-24 | Recon Done Right Physical Edition Zlata Pavlova & Rob CurtinSeufert | 51:43 | 0 | |
|
2023-05-24 | Social Engineering the Interview Ursula Cowan | 41:28 | 0 | |
|
2023-05-24 | Valkyrie & Meee Ninja the Regs | 1:03:34 | 0 | |
|
2023-05-24 | Andrew Immerman Digital Forensics | 51:34 | 1 | |
|
2023-05-24 | Billy Hoffman Covert Crawling | 1:20:35 | 2 | |
|
2023-05-24 | Charles Edge OSX Security | 1:03:34 | 0 | |
|
2023-05-24 | Datagram Intro to Lockpicking | 1:00:04 | 0 | |
|
2023-05-24 | David Hulton & Johnny Cache Breaking WiFi | 1:06:34 | 2 | |
|
2023-05-24 | Dr Kaos AnonymOS | 1:06:34 | 0 | |
|
2023-05-24 | Enno Rey MPLS & VPLS Security | 57:34 | 1 | |
|
2023-05-24 | Ken Caruso Seattle Wireless | 55:34 | 2 | |
|
2023-05-24 | Paul Henry Anti Forensics | 52:33 | 0 | |
|
2023-05-24 | Strom Carlson Breaking the SLE4442 | 1:01:04 | 0 | |
|
2023-05-24 | Zac Franken Access Control | 57:04 | 4 | |
|
2023-05-24 | Adam Laurie RFIDiots | 1:04:04 | 1 | |
|
2023-05-24 | Alexander Muentz Script Kids or Lawyers | 58:04 | 0 | |
|
2023-05-24 | Datagram Shellcoding 101 | 44:33 | 1 | |
|
2023-05-24 | Ganesh Devarajan SCADA Systems | 52:04 | 0 | |
|
2023-05-24 | John Benson Technology and the Law | 44:33 | 0 | Vlog |
|
2023-05-24 | John Heasman BIOS Rootkits | 1:06:04 | 0 | |
|
2023-05-24 | Luiz Eduardo Online Banking and Phishing | 1:03:34 | 0 | |
|
2023-05-24 | Michael Kemp Responsible Disclosure | 1:07:34 | 4 | |
|
2023-05-24 | Michael Weiss Windows Vista Security | 48:33 | 3 | |
|
2023-05-24 | Rodney Thayer VoIP | 1:10:35 | 1 | |
|
2023-05-24 | Rooster Evolutionary Algorithms | 1:03:04 | 1 | |
|
2023-05-24 | Strom Carlson The Talk Talk | 54:04 | 0 | |
|
2023-05-24 | Adam Shostack SDL Threat Modeling | 1:00:34 | 1 | |
|
2023-05-24 | Dan Sinclair Exploit Me | 32:02 | 2 | |
|
2023-05-24 | Datagram and Vidiot Memory Forensics | 38:33 | 1 | |
|
2023-05-24 | David Bryan VoIP Vulnerabilities | 41:33 | 0 | |
|
2023-05-24 | David Hulton Intercepting Mobile Phone GSM | 52:34 | 1 | |
|
2023-05-24 | DC949 Mixed Bag of Fun | 40:33 | 0 | |
|
2023-05-24 | Diane Barrett Virtual Traces | 55:34 | 0 | |
|
2023-05-24 | G Mark Hardy A Hacker Looks at 50 | 1:03:48 | 0 | |
|
2023-05-24 | John Benson When Lawyers Attack | 55:34 | 0 | |
|
2023-05-24 | Luis Eduardo Echo WiFi Location | 32:02 | 0 | |
|
2023-05-24 | Ryan Sherstobitoff Stopping Malware | 49:03 | 0 | |
|