Ya está disponible el material (vídeos y diapositivas) de SecTor 2015.
- Maturing InfoSec: Lessons from Aviation on Information Sharing - Slides
- Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Video
- Breaking Access Controls with BLEKey - Video
- Breaking and Fixing Python Applications - Video Slides Tools
- Complete Application Ownage via Multi-POST XSRF - Video
- Confessions of a Professional Cyber Stalker - Video
- Cymon - An Open Threat Intelligence System - Video
- Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Slides
- Hijacking Arbitrary .NET Application Control Flow - Video Slides
- Malware Activity in Mobile Networks – An Insider View - Video Slides
- Software Defined Networking / Attacker Defined Networking - Video
- Stealth Attack From The Produce Aisle - Slides
- Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Video Slides
- UNMASKING MALWARE - Video
- Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Video
- Bulletproofing Your Incident Response Plan: Effective Tabletops - Video
- CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Slides
- Make Metrics Matter - Slides
- The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Video
- There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Video
- Building an Effective Vulnerability & Remediation Management Program - Video
- Ground Zero Financial Services: Targeted Attacks from the Darknet - Video
- Peeling The Layers Of Vawtrak - Slides
- Preventing Home Automation Security Disasters - Video Slides
- Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Video
- Security for non-Unicorns - Video
- Certifi-gate: Has your Android device been Pwned? - Video
- Effective Ways to Tackle Vulnerability Remediation - Video
- Knowing what happened is only half the battle. - Video
- SIEM and the Art of Log Management - Video Slides