Parent directory/ | - | - |
1993 BC Before Cellphones Johnny Xmas.mp4 | 47.0 MiB | 2021 May 19 06:45 |
Actionable Threat Intelligence ISIS and the SuperBall Ian Amit.mp4 | 39.3 MiB | 2021 May 19 06:45 |
An Inconvenient Truth Security Monitoring vs Privacy in the Workplace Ana Orozco.mp4 | 13.9 MiB | 2021 May 19 06:45 |
Analyzing the Entropy of Document Hidden Code Adam Hogan.mp4 | 38.8 MiB | 2021 May 19 06:45 |
Building a Comprehensive Incident Management Program Owen Creger.mp4 | 41.1 MiB | 2021 May 19 06:45 |
Building an Incident Response Program Lesley Carhart.mp4 | 188.3 MiB | 2021 May 19 06:45 |
CircleCity Con lock picking class irongeek.mp4 | 115.3 MiB | 2021 May 19 06:45 |
Clear as FUD A look at how confusing jargon and technology can create fear uncertainty and doubt Chris Maddalena.mp4 | 36.1 MiB | 2021 May 19 06:45 |
Closing.mp4 | 52.1 MiB | 2021 May 19 06:45 |
Configure your assets save your butt Caspian Kilkelly.mp4 | 24.5 MiB | 2021 May 19 06:45 |
Data Loss Prevention Where do I start Jason Samide.mp4 | 17.9 MiB | 2021 May 19 06:45 |
Departmentalizing Your SecOps Tom Gorup.mp4 | 37.2 MiB | 2021 May 19 06:45 |
Deploying Honeypots To Gather Actionable Threat Intelligence James Taliento.mp4 | 31.5 MiB | 2021 May 19 06:45 |
Digital Supply Chain Security The Exposed Flank Dave Lewis.mp4 | 36.1 MiB | 2021 May 19 06:45 |
Do We Still Need Pen Testing Jeff Man.mp4 | 59.9 MiB | 2021 May 19 06:45 |
Does anyone remember Enterprise Security Architecture Rockie Brockway.mp4 | 43.4 MiB | 2021 May 19 06:45 |
Findings to date Cameron Maerz.mp4 | 33.3 MiB | 2021 May 19 06:45 |
From Blue To Red What Matters and What Really Doesnt Jason Lang.mp4 | 39.2 MiB | 2021 May 19 06:45 |
From Parking Lot to Pwnage Brent White Tim Roberts.mp4 | 52.3 MiB | 2021 May 19 06:45 |
Hacking IIS and NET Kevin Miller.mp4 | 41.1 MiB | 2021 May 19 06:45 |
Hacking the Jolla An Intro to Assessing A Mobile Device Vitaly McLain Drew Suarez.mp4 | 28.4 MiB | 2021 May 19 06:45 |
How not to Infosec Dan Tentler.mp4 | 31.9 MiB | 2021 May 19 06:45 |
How to Budget for IDS Brian Heitzman.mp4 | 37.2 MiB | 2021 May 19 06:45 |
I Amateur Radio And So Can You Kat Sweet.mp4 | 26.2 MiB | 2021 May 19 06:45 |
Is that a psvsvc in your pocket Jake Williams.mp4 | 54.4 MiB | 2021 May 19 06:45 |
Keynote SpaceRogue.mp4 | 36.7 MiB | 2021 May 19 06:45 |
Lessons Learned from Implementing Software Security Programs Todd Grotenhuis.mp4 | 32.4 MiB | 2021 May 19 06:45 |
Making Androids Bootable Recovery Work For You Drew Suarez.mp4 | 42.1 MiB | 2021 May 19 06:45 |
Malware Armor Tyler Halfpop.mp4 | 40.1 MiB | 2021 May 19 06:45 |
Nepenthes Netpens With Less Pain Andy Schmitz.mp4 | 28.3 MiB | 2021 May 19 06:45 |
OBAMAS CYBER SECURITY PLAN DISSECTED Jonathan Thompson.mp4 | 32.4 MiB | 2021 May 19 06:45 |
Opening Ceremonies.mp4 | 21.4 MiB | 2021 May 19 06:45 |
Operationalizing Yara Chad Robertson.mp4 | 19.0 MiB | 2021 May 19 06:45 |
PlagueScanner An Open Source Multiple AV Scanner Framework Robert Simmons.mp4 | 38.5 MiB | 2021 May 19 06:45 |
Reducing Your Organizations Social Engineering Attack Surface Jen Fox.mp4 | 29.5 MiB | 2021 May 19 06:45 |
Rethinking the Trust Chain Auditing OpenSSL and Beyond Kenneth White.mp4 | 37.7 MiB | 2021 May 19 06:45 |
Reverse Engineering Windows AFDsys Steven Vittitoe.mp4 | 30.6 MiB | 2021 May 19 06:45 |
Ruby Not just for hipster Carl Sampson.mp4 | 10.4 MiB | 2021 May 19 06:45 |
Running Away from Security Web App Vulnerabilities and OSINT Collide Micah Hoffman.mp4 | 48.7 MiB | 2021 May 19 06:45 |
Security Auditing Android Apps Sam Bowne.mp4 | 51.3 MiB | 2021 May 19 06:45 |
Security Culture in Development Wolfgang Goerlich.mp4 | 47.6 MiB | 2021 May 19 06:45 |
Shooting Phish in a Barrel and Other Terrible Fish Related Puns Amanda Berlin.mp4 | 39.7 MiB | 2021 May 19 06:45 |
Simulating Cyber Operations Do you want to play a game Bryan Fite.mp4 | 29.3 MiB | 2021 May 19 06:45 |
Smuggling Plums Using Active Defnse techniques to hide your web apps from your attackers and their scanners John Stauffacher.mp4 | 45.8 MiB | 2021 May 19 06:45 |
Square Peg Round Hole Developing a Security Culture Within an Enterprise Jeff Pergal Stuart McIntosh.mp4 | 41.0 MiB | 2021 May 19 06:45 |
Surfing the Sea and Drowning in Tabs An Introduction to Cross Site Request Forgery Barry Schatz.mp4 | 45.5 MiB | 2021 May 19 06:45 |
The Answer is 42 InfoSec Data Visualization Making Metric Magic Business Decisions Edward McCabe.mp4 | 46.7 MiB | 2021 May 19 06:45 |
The Hacker Community is Dead Long Live the Hacker Community Bruce Potter.mp4 | 42.5 MiB | 2021 May 19 06:45 |
Turn Your Head And Cough Why Architecture Risk Assessments Are Like Being A General Physician Nathaniel Husted.mp4 | 48.0 MiB | 2021 May 19 06:45 |
User Awareness Were Doing It Wrong Arlie Hartman.mp4 | 34.9 MiB | 2021 May 19 06:45 |
Using Evernote as an Threat Intelligence Management Platform Grecs part2.mp4 | 53.2 MiB | 2021 May 19 06:45 |
Using Evernote as an Threat Intelligence Management Platform Grecs.mp4 | 54.0 MiB | 2021 May 19 06:45 |
Wireless Intrusion Detection System with Raspberry Pi Chris Jenks.mp4 | 31.6 MiB | 2021 May 19 06:45 |
Your Own Worst Enemy Landing Your First Infosec Gig Despite Yourself Johnny Xmas.mp4 | 246.9 MiB | 2021 May 19 06:45 |
ZitMo NoM Clientless Android Malware Control David Schwartzberg.mp4 | 45.7 MiB | 2021 May 19 06:45 |