Ya tenemos acceso a los vídeos de las charlas de GrrCON 2016, celebrada en Michigan los pasados 6 y 7 de octubre.
116 Security Guards LOL Brent White Tim Roberts 115 Attacking the Hospitality and Gaming Industries Tracking an Attacker Around the World in 7 Years 318 Welcome to The World of Yesterday Tomorrow Joel Cardella 317 On being an Eeyore in Infosec Stefan Edwards 217 Phish your employees for fun Kristoffer Marshall 216 Binary Ninja Jared Demott 316 Piercing the Air Gap Network Steganography for Everyone John Ventura 315 So Youve Inherited a Security Department Now What Amanda Berlin 215 Whats in your Top Ten Intelligent Application Security Prioritization Tony Miller 214 Tales from the Cryptanalyst Jeff Man 114 Breaking Android Apps for Fun and Profit Bill Sempf 113 Back to the Future Understanding our future but following the past Kevin Johnson 313 Alignment of business and IT Security Shane Harsch 213 Money Fame Power Build your success as a security professional Nathan Dragun 212 Machine Duping Pwning Deep Learning Systems Clarence Chio 211 Magnetic Stripes 101 Tyler Keeton 112 Guarding Lunch J Wolfgang Goerlich 111 Predator to Prey Tracking Criminals with Trojans and Data Mining for Fun and Profit Ken Westin 110 and bad mistakes Ive made a few Jayson Street 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman 312 Contracting Privacy Security and 3rd Party Nathan Steed Kenneth Coleman 110 and bad mistakes Ive made a few Jayson Street (only first 30 min or so) 210 Encryption Mobility Cloud Oh My Bill Harmer 209 Using Virus Total Intelligence to track the latest Phishing Document campaigns Wyatt Roersma 311 Stop attacking your mothers car Charles Parker II 208 Cruise Ship Pentesting OR Hacking the High Seas Chad M Dewey 207 Quick and Easy Windows Timelines with Pyhon MySQL and Shell Scripting Dr Phil Polstra 310 How to Implement Crypto Poorly Sean Cassidy 309 Reality Checking Your AppSec Program Darren Meyer 308 Bad Guys Look Just Like You Justin Beard 205 Threat Detection Response with Hipara J Brett Cunningham 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 108 Secure Dicks Michael Kemp 206 still broken after all these years aka utility security for smarties doug nibbelink 307 Getting to the Root of Advanced Threats Before Impact Josh Fazio 306 Fighting the Enemy Within Matt Crowe 305 How Do You Secure What You Dont Control Dimitri Vlachos 304 Pentester to customerI will 0wn your network Customer to pentesterNo I will make you cry David F 303 Make STEHM Great Again David HealWHans Schwartzberg 205 Threat Detection Response with Hipara J Brett Cunningham 204 Reversing and Exploiting Embedded Devices Walking the software and hardware stack Elvis Collado 203 Surreal Paradigms Automotive Culture Crash D0xt0r Z3r0 105 Abnormal Behavior Detection in Large Environments Dave Kennedy 302 Five Nights At Freddys What We Can Learn About Security From Possessed Bears Nick Jacob 300 Securing Trust Defending Against Next generation Attacks John Muirhead Gould 202 What do you mean Im pwnd I turned on automatic updates Scott Thomas Jeff Baruth 201 So You Want to Be a Pentester Absolute0x0 200 Internet of Things IoT radio frequency RF Analysis With Software Defined Radio Kevin Bong 103 Becoming a Cyborg The First Step Into Implantable Technology Michael Vieau 102 Weaponizing Nanotechnology and hacking humans defining the boundaries Chris Roberts 100 Act Three The Evolution of Privacy Finux
Leer más