Vídeos de la SECTOR 2011
Ya podemos acceder a los vídeos de la SECTOR 2011, conferencia sobre seguridad celebrada en Toronto, Canadá. Ésta se celebro el pasado 17-19 de Octubre. Las presentaciones, aunque faltan bastantes también están disponibles desde la web oficial.
- Trust_me-I_am_a_cloud_vendor-Bruce_Cowper.wmv
- Thinking_Differently-Bringing_the_Hacker_Mindset_to_the_Corporate_Environment-Joe_Grand.wmv
- Online Espionage - Mikko Hypponen.wmv
- TheBizarre_Business_of_Rogue_Internet_Pharmacies-Brian_Krebs.wmv
- Near Field Communications (NFC) mobile security for those with No F'ing Clue - Corey Benninger and Max Sobell.wmv
- FireShark - A Tool to Link the Malicious Web - Stephan Chenette.wmv
- Finding Evil in Live Memory - Michael J Graven.wmv
- What is an APT without a sensationalist name - Seth Hardy.wmv
- Time and Place - Finding Evil with Atemporal Time Line Analysis - Dave Hull.wmv
- A Replicant by Any Other Name - A Security Analysis of the BlackBerry PlayBook - Zach Lanier and Ben Nell.wmv
- I'm Your MAC(b)Daddy - Grayson Lenik.wmv
- HTTP Header Hunter - Looking for malicious behavior into your http header traffic - Rodrigo Montoro.wmv
- A Technical View on Cloud Security - How Not To Get Your Undies In A Bunch aka Please Don't Squeeze The Charmin - David Mortman.wmv
- Targeted and Opportunistic Botnet Building - Gunter Ollmann.wmv
- Malware FreakShow - Nicholas J Percoco and Jibran Ilyas.wmv
- Sniper Forensics v3.0 - Hunt - Chris Pogue.wmv
- Bust a Cap in an Android App - Patrick Szeto and Maxim Veytsman.wmv
- Wireless Hacking Techniques and Tips - Kent Woodruff.wmv
- FACEROUTE - Mapping and Harvesting Social Media Sites - Rob VandenBrink.wmv
- Security When Nanoseconds Count - James Arlen.wmv
- It's Not About the Warm Fuzzy – How to Plan for a Comprehensive Penetration Exercise - Kai Axford.wmv
- The Search for Intelligent Life - Ed Bellis.wmv
- Built What - Why The Bad Guys Do It Better - Sean Bodmer.wmv
- Change Happens - CISO Survival Through Adaptation - Jack Daniel, David Mortman, Gal Shpantzer, Michael Smith and Stacy Thayer.wmv
- Binary Risk Analysis - Ben Sapiro.wmv
- Cubical Warfare - The next Arms Race - Jason Kendall.wmv
- Incident Response Kung fu - Tree Style - Jason Kendall.wmv
- Disc Detainer Locks - Schuyler Towne.wmv
- Best Practices in Network Security Testing - Areg Alimian.wmv
- Walking on the Crocs back – when security measures fail - Travis Barlow.wmv
- Mapping The Penetration Tester's Mind – An introduction to a pentester's approach to security audits - Nicholas Donarski.wmv
- Detecting The Insider Threat – Finding The Needle in Stack of Needles - Omar Garcia.wmv
- Earth vs. The Giant Spider - Amazingly True Stories of Real Penetration Tests - Nick Percoco.wmv
- Be Ready for IPv6 Migration and Beyond - Cricket Liu.wmv
- Evolution of Digital Forensics - Jason Mical.wmv
- Anatomy of a Data Breach - Exploring the Current Threat Landscape - Paul Pinkney.wmv
- Think outside the enterprise security box - John Trollinger.wmv
- Information Security and Risk pertaining to smart phone and mobile devices - Nicholas Wetton.wmv
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec