2021-10-07 | Just Enough Asset Inventory |
2021-10-07 | Hash SSH Client Server Profiling Ben Reardon |
2021-10-07 | Forecasting, Browsers, and In The Wild Exploitation Ryan McGeehan |
2021-10-07 | Welcome to ACoD |
2021-10-07 | Zac Brown, Hidden Treasure Detecting Intrusions with ETW, Ops Track |
2021-10-07 | Winn Schwartau, The Analogue Prism |
2021-10-07 | Rich MacVarish, Structured Analytic Techniques Moving from Art to Science in Analysis |
2021-10-07 | Pete Lindstrom, Applying Risk Reduced per Unit Cost to IT Adversarial Risk Management, Phils |
2021-10-07 | Paul Simmonds, Fix digital identity, stop the bad guys |
2021-10-07 | Max Kilger, Anticipating the Nature and LIkelihood of a Cyberterror Community |
2021-10-07 | Kelly Shortridge, Know Thyself Optimizing Team Decision Making |
2021-10-07 | Jonathan Spring,Forensics, decisions, and making the abstract concrete |
2021-10-07 | John Brown, Drop packets really fast with BGP, uRPF and Exa BGP, Ops Track |
2021-10-07 | Trenton Ivey, The Medium Makes the Art Vulnerabilities vs Tactics |
2021-10-07 | Tom Ottoson, Finding the Grey Sheep before they go Baaaaad |
2021-10-07 | Steve Crocker, The standards process |
2021-10-07 | Sounil Yu, The Cyber Defense Matrix A Scientific Model for Cybersecurity |
2021-10-07 | Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track |
2021-10-07 | Slack Announcement |
2021-10-07 | Sacha Faust, Scaling Red Team, Ops Track |
2021-10-07 | Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track |