Material de SecTor 2015

sector2015.png

Ya está disponible el material (vídeos y diapositivas) de SecTor 2015.

  • Maturing InfoSec: Lessons from Aviation on Information Sharing - Slides
  • Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Video
  • Breaking Access Controls with BLEKey - Video
  • Breaking and Fixing Python Applications - Video Slides Tools
  • Complete Application Ownage via Multi-POST XSRF - Video
  • Confessions of a Professional Cyber Stalker - Video
  • Cymon - An Open Threat Intelligence System - Video
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Slides
  • Hijacking Arbitrary .NET Application Control Flow - Video Slides
  • Malware Activity in Mobile Networks – An Insider View - Video Slides
  • Software Defined Networking / Attacker Defined Networking - Video
  • Stealth Attack From The Produce Aisle - Slides
  • Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Video Slides
  • UNMASKING MALWARE - Video
  • Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Video
  • Bulletproofing Your Incident Response Plan: Effective Tabletops - Video
  • CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Slides
  • Make Metrics Matter - Slides
  • The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Video
  • There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Video
  • Building an Effective Vulnerability & Remediation Management Program - Video
  • Ground Zero Financial Services: Targeted Attacks from the Darknet - Video
  • Peeling The Layers Of Vawtrak - Slides
  • Preventing Home Automation Security Disasters - Video Slides
  • Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Video
  • Security for non-Unicorns - Video
  • Certifi-gate: Has your Android device been Pwned? - Video
  • Effective Ways to Tackle Vulnerability Remediation - Video
  • Knowing what happened is only half the battle. - Video
  • SIEM and the Art of Log Management - Video Slides