Application Real time Monitoring to Hunt Malicious Injections Pedro Fortuna

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=FelulDdombY



Duration: 46:56
0 views
0


CONFidence - 2018 - London
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CONFidence

http://confidenceconference.com/

Life is about making choices that eventually put us somewhere between ‘ordinary’ and ‘legendary’. We started CONFidence 17 years ago hoping it would eventually grow into one of the most valued events for security experts and enthusiasts worldwide.

Finally we can announce that CONFidence 2022 will be OFFLINE again! Let’s meet at the Krakow Aviation Museum with hackers, security experts, and IT specialists from different backgrounds and regions. Book June 6th - 7th and buy your ticket now so you don't miss the best conference!

It’s 2022 and CONFidence is proud to be ever more ambitious in spreading awareness about cyber threats among European IT sec specialists, developers, managers, bankers and governmental representatives.

One of our top priorities has always been to deliver practical, relevant, and diverse content across the different fields of IT security. Thanks to our cooperation with experts representing a great variety of backgrounds, as well as active, security-focused IT communities, we know what it takes to offer our attendees both highly technical and state-of-the-art expertise.

- practical presentations packed with case studies and hands-on experiences,
- great workshops allowing you to test newly-acquired skills,
- solutions immediately applicable to your professional routine
- discussions with international experts focused on recent events (covering burning questions and timely challenges).

The best of the best from all over the world come to CONFidence every year to share their knowledge
Get to know new problems and solutions in cybersec.
Finally you will be able to talk with everyone, discuss new technology and enjoy time with other participants.
Prepare yourself for a whole night of networking and fun.
It will allow you to apply for points necessary for an expert certificate in the field of ICT security.




Other Videos By All Hacking Cons


2022-01-27Cloud Security Panel
2022-01-27Olivier Bilodeau Lessons Learned Hunting IoT Malware
2022-01-27Randy Purse Patching Human Vulnerabilities in Cyber Security
2022-01-27Peter Goodman Trail of Bits Cyberdyne Automatic Bug Finding At Scale
2022-01-27Paul Davis Phantom Measuring the Ability to Respond to the Unexpected
2022-01-27Katie Moussouris Security Eat, Pray, Love
2022-01-27Chris Eng, Veracode Counterproductive Security Behaviors That Must End
2022-01-27Tyler Shields Signal Sciences Changing How We Do Security To Match A Modern World
2022-01-27Does it take AI to break your AI Jakub Kaluzny
2022-01-27Detecting Man In The Browser banking malware in practice Adam Lange
2022-01-27Application Real time Monitoring to Hunt Malicious Injections Pedro Fortuna
2022-01-27Insecure HTTP Headers web application vulnerabilities Marcin Szydłowski
2022-01-27Modern Cyber Warfare Against Crypto Currency Exchanges Dani Goland, Ido Naor
2022-01-27Meet Me in the Middle Threat Indications & Warning to enable Joe Slowik
2022-01-27Playing in the Sandbox Adobe Flash Exploitation Tales Björn Ruytenberg
2022-01-27New Tales of Wireless Input Devices Matthias Deeg, Gerhard Klostermeier
2022-01-27Inside Cybercrime Groups Harvesting Active Directory for Fun Vitali Kremez
2022-01-27Vulnerabilities for Sale The Good, the Bad and the Ugly Udo Schneider
2022-01-27How Neurodiversity can be Leveraged for an Excellent ROI Megan Roddie
2022-01-27Gdy umiera framework… Studium przypadku CVE 2018 12533 Daniel Kalinowski
2022-01-27Day One



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering