Parent directory/ | - | - |
6 Critical Criteria For Cloud Workload Security Sam Herath.mp4 | 23.5 MiB | 2021 May 15 18:43 |
6 Critical Criteria For Cloud Workload Security Sam Herath.srt | 32.1 KiB | 2019 Sep 30 20:23 |
All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4 | 45.5 MiB | 2021 May 15 18:43 |
All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt | 64.5 KiB | 2019 Sep 30 20:23 |
AppSec without additional tools Jason Kent.mp4 | 26.7 MiB | 2021 May 15 18:43 |
AppSec without additional tools Jason Kent.srt | 58.4 KiB | 2019 Sep 30 20:23 |
Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4 | 35.2 MiB | 2021 May 15 18:43 |
Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt | 55.2 KiB | 2019 Sep 30 20:23 |
Artificial Intelligence Real Threat Prevention Art Hathaway.mp4 | 32.1 MiB | 2021 May 15 18:43 |
Artificial Intelligence Real Threat Prevention Art Hathaway.srt | 36.7 KiB | 2019 Sep 30 20:22 |
Building an Application Security Program Mike Spaulding.mp4 | 50.3 MiB | 2021 May 15 18:43 |
Building an Application Security Program Mike Spaulding.srt | 65.6 KiB | 2019 Sep 30 20:22 |
Building an OSS CICD Security Toolchain Kevin Glavin.mp4 | 34.4 MiB | 2021 May 15 18:43 |
Building an OSS CICD Security Toolchain Kevin Glavin.srt | 24.6 KiB | 2019 Sep 30 20:23 |
Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4 | 27.4 MiB | 2021 May 15 18:43 |
Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt | 38.4 KiB | 2019 Sep 30 20:22 |
CISO for an Hour Keith Fricke.mp4 | 44.1 MiB | 2021 May 15 18:43 |
CISO for an Hour Keith Fricke.srt | 65.8 KiB | 2019 Sep 30 20:22 |
Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4 | 66.1 MiB | 2021 May 15 18:43 |
Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt | 38.7 KiB | 2019 Sep 30 20:22 |
Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4 | 41.9 MiB | 2021 May 15 18:43 |
Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt | 44.5 KiB | 2019 Sep 30 20:22 |
Cross Industry Collaboration Helen Patton.mp4 | 37.4 MiB | 2021 May 15 18:43 |
Cross Industry Collaboration Helen Patton.srt | 37.6 KiB | 2019 Sep 30 20:22 |
Cyber Security Super Bowl 50 Jim Libersky.mp4 | 32.3 MiB | 2021 May 15 18:43 |
Cyber Security Super Bowl 50 Jim Libersky.srt | 36.4 KiB | 2019 Sep 30 20:22 |
Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4 | 37.8 MiB | 2021 May 15 18:43 |
Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt | 48.9 KiB | 2019 Sep 30 20:23 |
Datacenter Security Virtualized John Michealson.mp4 | 36.2 MiB | 2021 May 15 18:43 |
Datacenter Security Virtualized John Michealson.srt | 51.3 KiB | 2019 Sep 30 20:22 |
Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4 | 25.5 MiB | 2021 May 15 18:43 |
Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt | 45.2 KiB | 2019 Sep 30 20:22 |
Detecting the Undetectable - What You Need to Know About OSINT Jerod Brennen.mp4 | 43.0 MiB | 2021 May 15 18:43 |
Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4 | 33.3 MiB | 2021 May 15 18:43 |
Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt | 37.0 KiB | 2019 Sep 30 20:23 |
Don't try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4 | 37.3 MiB | 2021 May 15 18:43 |
Economically Justifying IT Security Initiatives Ruben Melendez.mp4 | 37.5 MiB | 2021 May 15 18:43 |
Economically Justifying IT Security Initiatives Ruben Melendez.srt | 38.4 KiB | 2019 Sep 30 20:23 |
Educating the Board of Directors Bob West.mp4 | 23.0 MiB | 2021 May 15 18:43 |
Educating the Board of Directors Bob West.srt | 48.7 KiB | 2019 Sep 30 20:22 |
Embracing the Cloud Lisa Guess.mp4 | 24.9 MiB | 2021 May 15 18:43 |
Embracing the Cloud Lisa Guess.srt | 46.8 KiB | 2019 Sep 30 20:23 |
Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.mp4 | 49.2 MiB | 2021 May 15 18:43 |
Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.srt | 80.7 KiB | 2019 Sep 30 20:23 |
Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4 | 35.3 MiB | 2021 May 15 18:43 |
Formal Verification of Secure Software Systems Aaron Bedra (2).mp4 | 19.5 MiB | 2021 May 15 18:43 |
Formal Verification of Secure Software Systems Aaron Bedra (2).srt | 54.1 KiB | 2019 Sep 30 20:23 |
Formal Verification of Secure Software Systems Aaron Bedra.mp4 | 24.0 MiB | 2021 May 15 18:43 |
Formal Verification of Secure Software Systems Aaron Bedra.srt | 41.9 KiB | 2019 Sep 30 20:23 |
Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4 | 39.9 MiB | 2021 May 15 18:43 |
Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4 | 39.6 MiB | 2021 May 15 18:43 |
Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt | 34.3 KiB | 2019 Sep 30 20:22 |
Have you tied together your IAM and Information Security Incident Management Program Josep.mp4 | 48.7 MiB | 2021 May 15 18:43 |
Have you tied together your IAM and Information Security Incident Management Program Josep.srt | 61.7 KiB | 2019 Sep 30 20:22 |
How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4 | 31.4 MiB | 2021 May 15 18:43 |
How Experts Undermine Your Forensic Evidence Matthew Curtin.srt | 45.6 KiB | 2019 Sep 30 20:23 |
How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4 | 38.9 MiB | 2021 May 15 18:43 |
How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt | 16.5 KiB | 2019 Sep 30 20:22 |
IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4 | 30.5 MiB | 2021 May 15 18:43 |
IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt | 56.2 KiB | 2019 Sep 30 20:23 |
IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4 | 55.0 MiB | 2021 May 15 18:43 |
Incident Response No Pain No Gain Jim Wojno.mp4 | 36.7 MiB | 2021 May 15 18:43 |
Incident Response No Pain No Gain Jim Wojno.srt | 41.8 KiB | 2019 Sep 30 20:22 |
InfoSec Productization David Kennedy.mp4 | 43.5 MiB | 2021 May 15 18:43 |
InfoSec Productization David Kennedy.srt | 83.8 KiB | 2019 Sep 30 20:23 |
Information Security Metrics Practical Security Metrics Jack Nichelson.mp4 | 42.9 MiB | 2021 May 15 18:43 |
Information Security Metrics Practical Security Metrics Jack Nichelson.srt | 28.7 KiB | 2019 Sep 30 20:22 |
Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4 | 31.3 MiB | 2021 May 15 18:43 |
Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt | 42.8 KiB | 2019 Sep 30 20:22 |
It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4 | 25.0 MiB | 2021 May 15 18:43 |
It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt | 44.8 KiB | 2019 Sep 30 20:23 |
Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4 | 33.9 MiB | 2021 May 15 18:43 |
Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt | 62.8 KiB | 2019 Sep 30 20:23 |
Myths of Cloud Security Debunked Bil Harmer.mp4 | 33.6 MiB | 2021 May 15 18:43 |
Myths of Cloud Security Debunked Bil Harmer.srt | 49.1 KiB | 2019 Sep 30 20:22 |
Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4 | 42.3 MiB | 2021 May 15 18:43 |
No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.mp4 | 27.7 MiB | 2021 May 15 18:43 |
No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.srt | 37.5 KiB | 2019 Sep 30 20:23 |
PKI Do You Know Your Exposure Kent King.mp4 | 28.7 MiB | 2021 May 15 18:43 |
Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4 | 27.0 MiB | 2021 May 15 18:43 |
Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt | 32.2 KiB | 2019 Sep 30 20:22 |
Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4 | 27.8 MiB | 2021 May 15 18:43 |
Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt | 60.6 KiB | 2019 Sep 30 20:22 |
Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4 | 31.4 MiB | 2021 May 15 18:43 |
Putting the Intelligence back in Threat Intelligence Edward McCabe.srt | 39.7 KiB | 2019 Sep 30 20:22 |
Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4 | 33.5 MiB | 2021 May 15 18:43 |
Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt | 13.7 KiB | 2019 Sep 30 20:22 |
SecOps Innovating Security in Innovative Organizations Warner Moore.mp4 | 29.0 MiB | 2021 May 15 18:43 |
SecOps Innovating Security in Innovative Organizations Warner Moore.srt | 29.2 KiB | 2019 Sep 30 20:23 |
Securing our Future Lessons From the Human Immune System Gavin Hill.mp4 | 36.4 MiB | 2021 May 15 18:43 |
Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4 | 27.4 MiB | 2021 May 15 18:43 |
Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt | 43.0 KiB | 2019 Sep 30 20:23 |
Security Certifications are they worth it and which ones are right for you William Diederi.mp4 | 37.4 MiB | 2021 May 15 18:43 |
Security analytics journey a years lesson learned Mike Schiebel.mp4 | 32.3 MiB | 2021 May 15 18:43 |
Security vs Compliance in Healthcare.mp4 | 42.6 MiB | 2021 May 15 18:43 |
Security vs Compliance in Healthcare.srt | 44.0 KiB | 2019 Sep 30 20:23 |
State of Security and 2016 Predictions Jason Samide.mp4 | 26.1 MiB | 2021 May 15 18:43 |
State of Security and 2016 Predictions Jason Samide.srt | 12.9 KiB | 2019 Sep 30 20:23 |
The CONfidence of Things John Robinson.mp4 | 40.4 MiB | 2021 May 15 18:43 |
The Humanity of Phishing Attack and Defense Aaron Higbee.mp4 | 44.5 MiB | 2021 May 15 18:43 |
The Humanity of Phishing Attack and Defense Aaron Higbee.srt | 70.3 KiB | 2019 Sep 30 20:22 |
The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4 | 29.6 MiB | 2021 May 15 18:43 |
The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt | 55.6 KiB | 2019 Sep 30 20:22 |
The node js highway attacks are at full throttle jJoshua Clark.mp4 | 27.5 MiB | 2021 May 15 18:43 |
The node js highway attacks are at full throttle jJoshua Clark.srt | 44.1 KiB | 2019 Sep 30 20:22 |
Third Party Risk Governance Why and How Jeffrey Sweet.mp4 | 31.1 MiB | 2021 May 15 18:43 |
Third Party Risk Governance Why and How Jeffrey Sweet.srt | 54.6 KiB | 2019 Sep 30 20:23 |
Threat Modeling for Secure Software Design Robert Hurlbut.mp4 | 28.9 MiB | 2021 May 15 18:43 |
Threat Modeling for Secure Software Design Robert Hurlbut.srt | 60.8 KiB | 2019 Sep 30 20:23 |
Todays Threat Landscape Dean Shroll.mp4 | 36.3 MiB | 2021 May 15 18:43 |
Todays Threat Landscape Dean Shroll.srt | 42.5 KiB | 2019 Sep 30 20:22 |
Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4 | 27.2 MiB | 2021 May 15 18:43 |
TouchID of iOS Security James Jamie Bowser.mp4 | 32.7 MiB | 2021 May 15 18:43 |
Understanding Attackers use of Covert Communications Chris Haley.mp4 | 28.9 MiB | 2021 May 15 18:43 |
Understanding Attackers use of Covert Communications Chris Haley.srt | 34.3 KiB | 2019 Sep 30 20:22 |
Vendors and business associates friends or foes Robert Brzezinski.mp4 | 49.4 MiB | 2021 May 15 18:43 |
Who is Winning Gary Sheehan.mp4 | 40.2 MiB | 2021 May 15 18:43 |
Who is Winning Gary Sheehan.srt | 39.8 KiB | 2019 Sep 30 20:22 |
Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4 | 23.8 MiB | 2021 May 15 18:43 |
Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt | 22.4 KiB | 2019 Sep 30 20:23 |
Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4 | 19.1 MiB | 2021 May 15 18:43 |
Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt | 34.0 KiB | 2019 Sep 30 20:23 |
YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4 | 35.8 MiB | 2021 May 15 18:43 |
YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt | 57.5 KiB | 2019 Sep 30 20:22 |
You're measuring all the wrong things information security metrics Shawn Sines.mp4 | 25.1 MiB | 2021 May 15 18:43 |