Vídeos de GrrCON 2015
Una vez más desde la web de IronGeek podemos ver los vídeos que se han publicado de la edición de este año de GrrCON, conferencia anual sobre seguridad celebrada en Michigan los pasados 9 y 10 de octubre.
- Subject matter to be determined by the number of federal agents present in the audience Chris Roberts
- Breaking in Bad (I,m The One Who Doesn,t Knock) Jayson Street
- Process The Salvation of Incident Response - Charles Herring
- But Can They Hack?: Examining Technological Proficiency in the US Far Right Tom Holt
- The wrong side of history - everything that is old is new again Arron Finnon
- Poking The Bear Mike Kemp
- The Hitch Hikers Guide to Information Security Kellman Meghu
- Backdooring Git John Menerick
- Spanking the Monkey (or how pentesters can do it better!) Justin Whithead, Chester Bishop
- Adding +10 Security to Your Scrum Agile Environment tehEx0dus
- How I Got Network Creds Without Even Asking: A Social Engineering Case Study Jen Fox
- Shooting Phish in a Barrel and Other Terrible Fish Related Puns infosystir
- This Is All Your Fault Duncan Manuts
- The Safety You Think You Have is Only a Masquerade Nathan Dragun
- Security Incident Response Derek Milroy
- Hacking the Next Generation HealWHans
- Findings Needles in a Needlestack: Enterprise Mass Triage Keven Murphy
- Punch and Counter-punch Part Deux: Web Applications J Wolfgang Goerlich, NerdyBeardo
- Application Recon - The Lost Art Tony Miller
- The Hand That Rocks the Cradle: Hacking Baby Monitors Mark Stanislav
- Software Security IWR Thomas "G13" Richards
- Cyber 101 - Upstaring your career in a leading industry Johnny Deutsch
- Understanding and Improving the Military Cyber Culture Dariusz Mikulski
- Harness the Force for Better Penetration Testing Patrick Fussell
- Targeted Attacks and the Privileged Pivot Mark Nafe
- Shell scripting live Linux Forensics Dr. Phil Polstra
- Can you patch a cloud? Scott Thomas
- Is it EVIL? Chaoticflaws
- Ticking me off: From Threat Intel to Reversing Juan Cortes
- Securing Todays Enterprise WAN Andy Mansfield
- Footprints of This Year's Top Attack Vectors Kerstyn Clover
- Phones and Privacy for Consumers Matt Hoy (mattrix) and David Khudaverdyan (deltaflyer)
- Path Well-Traveled: Common Mistakes with SIEM Nick Jacob
- How compliance doesn't have to suck….at least totally Robert Carson & Bradley Stine
- What is a cloud access broker and do I need one? Tom Doane
- Security Frameworks: What was once old is new again Brian Wrozek
- Attacks Against Critical Infrastructures Weakest Links Jonathan Curtis
- Wireless Intrusion Detection Systems with the Raspberry Pi Chris J
- No One Cares About Your Data Breach Except You ... And Why Should They? Joel Cardella
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec