Material de SecTor 2015
Ya está disponible el material (vídeos y diapositivas) de SecTor 2015.
- Maturing InfoSec: Lessons from Aviation on Information Sharing - Slides
- Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Video
- Breaking Access Controls with BLEKey - Video
- Breaking and Fixing Python Applications - Video Slides Tools
- Complete Application Ownage via Multi-POST XSRF - Video
- Confessions of a Professional Cyber Stalker - Video
- Cymon - An Open Threat Intelligence System - Video
- Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Slides
- Hijacking Arbitrary .NET Application Control Flow - Video Slides
- Malware Activity in Mobile Networks – An Insider View - Video Slides
- Software Defined Networking / Attacker Defined Networking - Video
- Stealth Attack From The Produce Aisle - Slides
- Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Video Slides
- UNMASKING MALWARE - Video
- Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Video
- Bulletproofing Your Incident Response Plan: Effective Tabletops - Video
- CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Slides
- Make Metrics Matter - Slides
- The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Video
- There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Video
- Building an Effective Vulnerability & Remediation Management Program - Video
- Ground Zero Financial Services: Targeted Attacks from the Darknet - Video
- Peeling The Layers Of Vawtrak - Slides
- Preventing Home Automation Security Disasters - Video Slides
- Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Video
- Security for non-Unicorns - Video
- Certifi-gate: Has your Android device been Pwned? - Video
- Effective Ways to Tackle Vulnerability Remediation - Video
- Knowing what happened is only half the battle. - Video
- SIEM and the Art of Log Management - Video Slides
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec