/
|
CircleCityCon 4 logo.jpg
|
26.9 KB
|
CircleCityCon 7 logo.jpg
|
30.2 KB
|
CircleCityCon 8 logo.jpg
|
66.8 KB
|
CircleCityCon 9 logo.jpg
|
56.2 KB
|
CircleCityCon 9 logo.png
|
53.8 KB
|
CircleCityCon thank you.txt
|
0.9 KB
|
/CircleCityCon 1 2014/
|
3 is a magic number or your reality check is about to bounce edward mccabe.mp4
|
39.3 MB
|
active directory real defense for domain admins jason lang.mp4
|
31.4 MB
|
ain t no half steppin martin bos.mp4
|
37.7 MB
|
are you a janitor or a cleaner john stauffacher matt hoy.mp4
|
31.2 MB
|
blurred lines when digital attacks get physical phil grimes.mp4
|
39.6 MB
|
challenge of natural security systems rockie brockway.mp4
|
33.4 MB
|
circlecitycon closing.mp4
|
44.8 MB
|
circlecitycon closing.srt
|
48.1 KB
|
cognitive bias and critical thinking in open source intelligence osint benjamin br.mp4
|
43.0 MB
|
competitive hacking why you should capture the flag steve vittitoe.mp4
|
36.8 MB
|
conference opening.mp4
|
10.4 MB
|
containing privileged processes with selinux and pax and attacking hardened system.mp4
|
44.0 MB
|
decrypting communication getting your point across to the masses katherine cook fr.mp4
|
18.1 MB
|
developing a open source threat intelligence program edward mccabe.mp4
|
47.6 MB
|
doge safes very electronic much fail wow jeff popio.mp4
|
20.0 MB
|
Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan.mp4
|
125.7 MB
|
exploring the target exfiltration malware with sandbox tools adam hogan.mp4
|
44.7 MB
|
eyes on izon surveilling ip camera security mark stanislav.mp4
|
41.9 MB
|
eyes on izon surveilling ip camera security mark stanislav.srt
|
87.0 KB
|
from grunt to operator tom gorup.mp4
|
32.9 MB
|
gitdigger creating useful wordlists and hashes from github repositories jaime fils.mp4
|
16.3 MB
|
hackers are people too amanda berlin.mp4
|
29.6 MB
|
hackers attack anatomy and security trends ted harrington.mp4
|
47.4 MB
|
how hackers for charity possibly saved me a lot of money branden miller & emily mi.mp4
|
25.7 MB
|
how hackers for charity possibly saved me a lot of money branden miller & emily mi.srt
|
37.3 KB
|
how often should you perform a penetration test jason samide.mp4
|
10.8 MB
|
how to create an attack path threat model wolfgang goerlich.mp4
|
40.4 MB
|
human trafficking in the digital age chris jenks.mp4
|
14.4 MB
|
keynote beau woods fixed.mp4
|
40.8 MB
|
keys that go bump in the night loak.mp4
|
14.1 MB
|
moving the industry forward the purple team david kennedy.mp4
|
47.3 MB
|
openappid open source next gen firewall with snort adam hogan.mp4
|
43.5 MB
|
owasp top 10 of 2013 it s still a thing and we re still not getting it barry schat.mp4
|
35.9 MB
|
proactive defense eliminating the low hanging fruit matt kelly.mp4
|
41.9 MB
|
profiling campus crime chris j jason j katelyn c alex h.mp4
|
31.6 MB
|
proper seasoning improves taste james siegel.mp4
|
41.4 MB
|
retrocomputing and you machines that made the net pete friedman.mp4
|
16.5 MB
|
seeing purple hybrid security teams for the enterprise mark kikta beltface.mp4
|
32.1 MB
|
software assurance marketplace swamp von welch.mp4
|
42.9 MB
|
tape loops for industrial control protocols k reid wightman.mp4
|
36.1 MB
|
ten commandments of incident response for hackers lesley carhart full.mp4
|
35.9 MB
|
the truecrypt audit how it happened and what we found kenneth white.mp4
|
38.4 MB
|
threat modeling fear fun and operational james robinson.mp4
|
27.6 MB
|
whitelist is the new black damian profancik.mp4
|
39.6 MB
|
/CircleCityCon 2 2015/
|
1993 BC Before Cellphones Johnny Xmas.mp4
|
49.3 MB
|
Actionable Threat Intelligence ISIS and the SuperBall Ian Amit.mp4
|
41.2 MB
|
An Inconvenient Truth Security Monitoring vs Privacy in the Workplace Ana Orozco.mp4
|
14.6 MB
|
Analyzing the Entropy of Document Hidden Code Adam Hogan.mp4
|
40.7 MB
|
Building a Comprehensive Incident Management Program Owen Creger.mp4
|
43.1 MB
|
Building an Incident Response Program Lesley Carhart.mp4
|
197.4 MB
|
CircleCity Con lock picking class irongeek.mp4
|
120.9 MB
|
Clear as FUD A look at how confusing jargon and technology can create fear uncertainty and doubt Chris Maddalena.mp4
|
37.9 MB
|
Closing.mp4
|
54.6 MB
|
Configure your assets save your butt Caspian Kilkelly.mp4
|
25.6 MB
|
Data Loss Prevention Where do I start Jason Samide.mp4
|
18.8 MB
|
Departmentalizing Your SecOps Tom Gorup.mp4
|
39.0 MB
|
Deploying Honeypots To Gather Actionable Threat Intelligence James Taliento.mp4
|
33.0 MB
|
Digital Supply Chain Security The Exposed Flank Dave Lewis.mp4
|
37.9 MB
|
Do We Still Need Pen Testing Jeff Man.mp4
|
62.8 MB
|
Does anyone remember Enterprise Security Architecture Rockie Brockway.mp4
|
45.5 MB
|
Findings to date Cameron Maerz.mp4
|
34.9 MB
|
From Blue To Red What Matters and What Really Doesnt Jason Lang.mp4
|
41.1 MB
|
From Parking Lot to Pwnage Brent White Tim Roberts.mp4
|
54.8 MB
|
Hacking IIS and NET Kevin Miller.mp4
|
43.1 MB
|
Hacking the Jolla An Intro to Assessing A Mobile Device Vitaly McLain Drew Suarez.mp4
|
29.8 MB
|
How not to Infosec Dan Tentler.mp4
|
33.5 MB
|
How to Budget for IDS Brian Heitzman.mp4
|
39.0 MB
|
I Amateur Radio And So Can You Kat Sweet.mp4
|
27.5 MB
|
Is that a psvsvc in your pocket Jake Williams.mp4
|
57.0 MB
|
Keynote SpaceRogue.mp4
|
38.4 MB
|
Lessons Learned from Implementing Software Security Programs Todd Grotenhuis.mp4
|
33.9 MB
|
Making Androids Bootable Recovery Work For You Drew Suarez.mp4
|
44.2 MB
|
Malware Armor Tyler Halfpop.mp4
|
42.1 MB
|
Nepenthes Netpens With Less Pain Andy Schmitz.mp4
|
29.7 MB
|
OBAMAS CYBER SECURITY PLAN DISSECTED Jonathan Thompson.mp4
|
34.0 MB
|
Opening Ceremonies.mp4
|
22.4 MB
|
Operationalizing Yara Chad Robertson.mp4
|
19.9 MB
|
PlagueScanner An Open Source Multiple AV Scanner Framework Robert Simmons.mp4
|
40.4 MB
|
Reducing Your Organizations Social Engineering Attack Surface Jen Fox.mp4
|
30.9 MB
|
Rethinking the Trust Chain Auditing OpenSSL and Beyond Kenneth White.mp4
|
39.5 MB
|
Reverse Engineering Windows AFDsys Steven Vittitoe.mp4
|
32.1 MB
|
Ruby Not just for hipster Carl Sampson.mp4
|
10.9 MB
|
Running Away from Security Web App Vulnerabilities and OSINT Collide Micah Hoffman.mp4
|
51.1 MB
|
Security Auditing Android Apps Sam Bowne.mp4
|
53.8 MB
|
Security Culture in Development Wolfgang Goerlich.mp4
|
49.9 MB
|
Shooting Phish in a Barrel and Other Terrible Fish Related Puns Amanda Berlin.mp4
|
41.7 MB
|
Simulating Cyber Operations Do you want to play a game Bryan Fite.mp4
|
30.7 MB
|
Smuggling Plums Using Active Defnse techniques to hide your web apps from your attackers and their scanners John Stauffacher.mp4
|
48.0 MB
|
Square Peg Round Hole Developing a Security Culture Within an Enterprise Jeff Pergal Stuart McIntosh.mp4
|
43.0 MB
|
Surfing the Sea and Drowning in Tabs An Introduction to Cross Site Request Forgery Barry Schatz.mp4
|
47.7 MB
|
The Answer is 42 InfoSec Data Visualization Making Metric Magic Business Decisions Edward McCabe.mp4
|
48.9 MB
|
The Hacker Community is Dead Long Live the Hacker Community Bruce Potter.mp4
|
44.5 MB
|
Turn Your Head And Cough Why Architecture Risk Assessments Are Like Being A General Physician Nathaniel Husted.mp4
|
50.3 MB
|
User Awareness Were Doing It Wrong Arlie Hartman.mp4
|
36.6 MB
|
Using Evernote as an Threat Intelligence Management Platform Grecs part2.mp4
|
55.8 MB
|
Using Evernote as an Threat Intelligence Management Platform Grecs.mp4
|
56.6 MB
|
Wireless Intrusion Detection System with Raspberry Pi Chris Jenks.mp4
|
33.2 MB
|
Your Own Worst Enemy Landing Your First Infosec Gig Despite Yourself Johnny Xmas.mp4
|
258.9 MB
|
ZitMo NoM Clientless Android Malware Control David Schwartzberg.mp4
|
47.9 MB
|
/CircleCityCon 3 2016/
|
Attacking OSX for fun and profit Toolset Limitations Frustration and Table Flipping Viss Tentler.mp4
|
39.1 MB
|
Binary Defense Without Privilege Steve Vittitoe.mp4
|
38.8 MB
|
Bootstrapping A Security Research Project Andrew Hay.mp4
|
40.3 MB
|
Break on Through to the Other Side Grape Ape.mp4
|
46.9 MB
|
Closing Ceremony CircleCityCon Staff.mp4
|
40.1 MB
|
Contextual Threat Intelligence Building a Data Science Capability into the Hunt Team Brian Genz.mp4
|
44.0 MB
|
Creating a Successful Collegiate Security Club Adam Ringwood and Chris Spehn.mp4
|
26.6 MB
|
Exfil and Reverse Shells in a Whitelisted World.mp4
|
24.3 MB
|
Fantastic OSINT and where to find it Tony Robinson da667.mp4
|
50.3 MB
|
Food Fight Wolfgang Goerlich.mp4
|
42.7 MB
|
Hacking Our Way Into Hacking Kat Sweet.mp4
|
41.2 MB
|
Haking the Next Generation David Schwartzberg.mp4
|
38.0 MB
|
Head in the Sand Defence or A Stuxnet for Mainframes Haydn Johnson Cheryl Biswas.mp4
|
38.6 MB
|
Intro to Mobile Device Testing Damian Profancik.mp4
|
21.1 MB
|
IoT on Easy Mode Reversing and Exploiting Embedded Devices Elvis Collado.mp4
|
40.7 MB
|
Keynote Dave Lewis.mp4
|
32.0 MB
|
Killing you softly Josh Bressers.mp4
|
29.5 MB
|
Now You See Me Now You don't Leaving your Digital Footprint Aamir Lakhani.mp4
|
33.0 MB
|
Open Source Malware Lab Robert Simmons.mp4
|
53.5 MB
|
Opening Ceremony - CircleCityCon Staff.mp4
|
25.7 MB
|
Planes Trains and Automobiles The Internet of Deadly Things Bryan K Fite.mp4
|
35.3 MB
|
Playing Doctor Lessons the Blue Team Can Learn from Patient Engagement Wolfgang Goerlich.mp4
|
37.3 MB
|
Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nielson.mp4
|
41.6 MB
|
SIEM Supersized Walleed Aljony.mp4
|
20.9 MB
|
So you want to be a CISO Von Welch.mp4
|
24.5 MB
|
Title You want to put whatwhere John Stauffacher.mp4
|
16.7 MB
|
Top 10 Mistakes in Security Operations Centers Incident Handling Response Paul R Jorgensen.mp4
|
56.2 MB
|
Untrusted Onions Is Tor Broken Joshua Galloway.mp4
|
21.1 MB
|
Where to Start When Your Environment is FK3d InfoSystir Amanda Berlin.mp4
|
47.8 MB
|
Why its all snake oil and that may be ok Pablo Breuer.mp4
|
35.0 MB
|
Your Password Policy Still Sucks Martin Bos.mp4
|
49.9 MB
|
/CircleCityCon 4 2017/
|
And the Clouds Break Continuity in the 21st Century Wolfgang Goerlich.mp4
|
46.6 MB
|
Application Security Metrics Caroline Wong.mp4
|
42.2 MB
|
Changing our future with 3D Printing Emily Peed.mp4
|
43.6 MB
|
Closing Ceremonies.mp4
|
50.1 MB
|
Closing Keynote Lectures or Life Experiences Awareness Training that Works Tottenkoph Cindy Jones.mp4
|
46.0 MB
|
Creating Your Own Customized Metamorphic Algorithm Raul Alvarez.mp4
|
32.7 MB
|
Cybersecurity for real life Using the NIST Framework to protect your critical infrastructure Ryan Koop.mp4
|
52.8 MB
|
Detecting DNS Anomalies with Statistics Jamie Buening.mp4
|
50.1 MB
|
DNS Dark Matter Discovery Theres Evil In Those Queries Jim Nitterauer.mp4
|
35.6 MB
|
Effective Report Writing for Security Practitioners Benjamin Robinson.mp4
|
39.3 MB
|
Everything is Not Awesome How to Overcome Barriers to Proper Network Segmentation Jason Beatty.mp4
|
53.9 MB
|
Fuzzing with AFL Adam DC949.mp4
|
49.9 MB
|
How To Be Curious Bret Mattingly.mp4
|
29.1 MB
|
Ichthyology Phishing as a Science Karla Burnett.mp4
|
26.4 MB
|
Its A Disaster Cheryl Biswas.mp4
|
32.3 MB
|
Network manipulation on video games Alex Kot.mp4
|
39.3 MB
|
Network Security What About The Data 0ddj0bb 0ddj0bb.mp4
|
39.9 MB
|
Of Flags Frogs 4chan OPSec vs Weaponized Autism Adrian Crenshaw.mp4
|
28.1 MB
|
Open Sesamee Max Power.mp4
|
28.9 MB
|
Opening Ceremonies.mp4
|
37.1 MB
|
Opening Keynote Words Have Meanings Dan Tentler.mp4
|
32.4 MB
|
OSINT And Your World A Love Story Michael James.mp4
|
43.5 MB
|
Peakaboo I own you Owning hundreds of thousands of devices with a broken HTTP packet Amit Serper.mp4
|
35.2 MB
|
Phing Phishers JAe .mp4
|
48.3 MB
|
Security Training Making Your Weakest Link The Strongest Aaron Hnatiw.mp4
|
48.2 MB
|
See beyond the veil Automating malicious javascript deobfuscation Chad Robertson.mp4
|
36.7 MB
|
Tales from the Cryptanalyst Jeff Man.mp4
|
50.4 MB
|
Talky Horror Picture Show Overcoming CFP Fears Kat Sweet.mp4
|
25.5 MB
|
The Decision Makers Guide To Managing Risk Joel Cardella.mp4
|
45.0 MB
|
The Kids Arent Alright Security and K 12 Education in America Vivienne Pustell.mp4
|
53.1 MB
|
The State of Security in the Medical Industry Cannibal billy.mp4
|
40.6 MB
|
Threat Intelligence Zero to Basics Chris J.mp4
|
59.1 MB
|
Trials and Tribulations of setting up a Phishing Campaign Insight into the how Haydn Johnson.mp4
|
47.3 MB
|
We don't Always Go Lights and Sirens Kendra Cooley.mp4
|
31.0 MB
|
Why is the Internet still working James Troutman.mp4
|
51.5 MB
|
Ye Olde Hacking Johnny Xmas.mp4
|
84.1 MB
|
Youre not old enough for that A TLS extension to put the past behind us Falcon Darkstar Momot.mp4
|
46.6 MB
|
/CircleCityCon 5 2018/
|
A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.eng.srt
|
100.0 KB
|
A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.mp4
|
40.5 MB
|
Abuse Case Testing in DevOps Stephen Deck.eng.srt
|
157.7 KB
|
Abuse Case Testing in DevOps Stephen Deck.mp4
|
60.6 MB
|
Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.eng.srt
|
80.8 KB
|
Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.mp4
|
32.4 MB
|
Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.eng.srt
|
138.5 KB
|
Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.mp4
|
47.5 MB
|
Backdooring with Metadata Itzik Kotler.eng.srt
|
111.9 KB
|
Backdooring with Metadata Itzik Kotler.mp4
|
45.5 MB
|
Carrot vs Stick Motivation Metrics and Awareness Magen Wu.eng.srt
|
104.4 KB
|
Carrot vs Stick Motivation Metrics and Awareness Magen Wu.mp4
|
45.9 MB
|
Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.eng.srt
|
164.6 KB
|
Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.mp4
|
52.2 MB
|
Closing.eng.srt
|
84.1 KB
|
Closing.mp4
|
49.1 MB
|
Containers Exploits Surprises and Security Elissa Shevinsky.eng.srt
|
80.8 KB
|
Containers Exploits Surprises and Security Elissa Shevinsky.mp4
|
50.4 MB
|
CTF Tips and Tricks Aaron Lintile.eng.srt
|
136.3 KB
|
CTF Tips and Tricks Aaron Lintile.mp4
|
49.3 MB
|
Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.eng.srt
|
137.5 KB
|
Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.mp4
|
73.1 MB
|
Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.eng.srt
|
76.7 KB
|
Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.mp4
|
45.6 MB
|
Enterprise Vulnerability Management Assessing Implementing and Maintaining De.eng.srt
|
172.5 KB
|
Enterprise Vulnerability Management Assessing Implementing and Maintaining De.mp4
|
57.8 MB
|
Espionage In The Modern Age of Information Warfare Scot Terban.eng.srt
|
147.9 KB
|
Espionage In The Modern Age of Information Warfare Scot Terban.mp4
|
65.9 MB
|
global00 GreatSCT Gotta Catch Em AWL Chris Spehn.eng.srt
|
138.9 KB
|
global00 GreatSCT Gotta Catch Em AWL Chris Spehn.mp4
|
43.4 MB
|
How to Lie with Statistics Information Security Edition Tony Martin Vegue.eng.srt
|
107.9 KB
|
How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4
|
50.4 MB
|
IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.eng.srt
|
128.0 KB
|
IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.mp4
|
53.0 MB
|
Opening Ceremonies Circle City Con Staff.eng.srt
|
67.5 KB
|
Opening Ceremonies Circle City Con Staff.mp4
|
24.9 MB
|
Operator The Well Rounded Hacker Matthew Curtin.eng.srt
|
139.5 KB
|
Operator The Well Rounded Hacker Matthew Curtin.mp4
|
63.0 MB
|
Patching Its Complicated Cheryl Biswas.eng.srt
|
89.5 KB
|
Patching Its Complicated Cheryl Biswas.mp4
|
50.6 MB
|
Playing Russian Troll Whack a Mole Courtney Falk.eng.srt
|
115.8 KB
|
Playing Russian Troll Whack a Mole Courtney Falk.mp4
|
45.5 MB
|
Quick Retooling in Net for Red Teams Dimitry Snezhkov.eng.srt
|
119.9 KB
|
Quick Retooling in Net for Red Teams Dimitry Snezhkov.mp4
|
53.9 MB
|
Ransomware Robbed with a Toy Gun Brian Baskin.eng.srt
|
156.6 KB
|
Ransomware Robbed with a Toy Gun Brian Baskin.mp4
|
55.9 MB
|
ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.eng.srt
|
117.1 KB
|
ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.mp4
|
48.3 MB
|
Rise of the Machines Aamir Lakhani.mp4
|
40.6 MB
|
SAEDY Subversion and Espionage Directed Against You Judy Towers.eng.srt
|
178.8 KB
|
Securing without Slowing DevOps Wolfgang Goerlich.eng.srt
|
161.9 KB
|
Securing without Slowing DevOps Wolfgang Goerlich.mp4
|
50.5 MB
|
Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.eng.srt
|
128.0 KB
|
Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.mp4
|
39.4 MB
|
Shaver Phone.eng.srt
|
2.5 KB
|
Shaver Phone.mp4
|
4.5 MB
|
Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.eng.srt
|
149.1 KB
|
Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.mp4
|
59.1 MB
|
The consequences of lack of security in the Healthcare and how to handle it J.mp4
|
56.2 MB
|
The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.eng.srt
|
153.6 KB
|
The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.mp4
|
59.0 MB
|
The Network Night Watch Eric Rand Lesley Carhart.eng.srt
|
135.2 KB
|
The Network Night Watch Eric Rand Lesley Carhart.mp4
|
51.3 MB
|
The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.eng.srt
|
127.7 KB
|
The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.mp4
|
41.8 MB
|
/CircleCityCon 6 2019/
|
Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt
|
90.4 KB
|
Access Rights Exploits under New Privacy Laws Amber Welch.mp4
|
41.6 MB
|
behind the scenes.eng.srt
|
14.2 KB
|
behind the scenes.mp4
|
16.8 MB
|
Careers Steven Bernstein.eng.srt
|
97.7 KB
|
Careers Steven Bernstein.mp4
|
44.6 MB
|
Closing Cermonies.eng.srt
|
140.2 KB
|
Closing Cermonies.mp4
|
102.3 MB
|
Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.eng.srt
|
34.1 KB
|
Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.mp4
|
28.8 MB
|
How the video rig works.eng.srt
|
12.7 KB
|
How the video rig works.mp4
|
28.3 MB
|
How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.eng.srt
|
75.3 KB
|
How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.mp4
|
37.7 MB
|
Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.eng.srt
|
82.5 KB
|
Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.mp4
|
35.8 MB
|
inting canister launchable drones for city scale wardriving Glytch Tech.eng.srt
|
44.6 KB
|
inting canister launchable drones for city scale wardriving Glytch Tech.mp4
|
27.0 MB
|
ity lessons from the Woofmutt Chris Roberts.eng.srt
|
82.4 KB
|
ity lessons from the Woofmutt Chris Roberts.mp4
|
45.2 MB
|
Opening.eng.srt
|
37.9 KB
|
Opening.mp4
|
23.3 MB
|
Tales from the CryptAnalyst Jeff Man.eng.srt
|
107.7 KB
|
Tales from the CryptAnalyst Jeff Man.mp4
|
61.0 MB
|
Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.eng.srt
|
51.1 KB
|
Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.mp4
|
35.9 MB
|
/CircleCityCon 7 2020/
|
. senua -v The Swiftly Sneaky C2 - Zach Zenner.eng.srt
|
85.8 KB
|
. senua -v The Swiftly Sneaky C2 - Zach Zenner.mp4
|
72.1 MB
|
0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.eng.srt
|
84.9 KB
|
0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.mp4
|
39.2 MB
|
[In]secure deserialization, and how [not] to do it - Alexei Kojenov.eng.srt
|
64.8 KB
|
[In]secure deserialization, and how [not] to do it - Alexei Kojenov.mp4
|
53.5 MB
|
A Pitmasters Guide To Security Design - Alyssa Miller.eng.srt
|
93.4 KB
|
A Pitmasters Guide To Security Design - Alyssa Miller.mp4
|
91.2 MB
|
Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.eng.srt
|
62.3 KB
|
Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.mp4
|
31.0 MB
|
Between a SOC and a Hard Place - Shawn Thomas.eng.srt
|
81.4 KB
|
Between a SOC and a Hard Place - Shawn Thomas.mp4
|
34.8 MB
|
Break crypto like a pro - Alexei Kojenov.eng.srt
|
74.6 KB
|
Break crypto like a pro - Alexei Kojenov.mp4
|
52.7 MB
|
Closing Ceremonies - Circle City staff.eng.srt
|
53.1 KB
|
Closing Ceremonies - Circle City staff.mp4
|
68.1 MB
|
Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.eng.srt
|
41.7 KB
|
Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.mp4
|
47.5 MB
|
Creating APT targeted threat feeds for your industry - Keith Chapman.eng.srt
|
29.6 KB
|
Creating APT targeted threat feeds for your industry - Keith Chapman.mp4
|
35.4 MB
|
CTF Wrapup Starring Lintile.eng.srt
|
79.1 KB
|
CTF Wrapup Starring Lintile.mp4
|
127.9 MB
|
Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.eng.srt
|
44.2 KB
|
Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.mp4
|
37.1 MB
|
CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.eng.srt
|
83.7 KB
|
CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.mp4
|
75.5 MB
|
DDoS Mitigation Fundamentals - Krassimir Tzvetanov.eng.srt
|
86.6 KB
|
DDoS Mitigation Fundamentals - Krassimir Tzvetanov.mp4
|
51.2 MB
|
Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.eng.srt
|
77.9 KB
|
Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.mp4
|
36.8 MB
|
Doing ‘Simple’ at scale - Micah Brown.eng.srt
|
87.9 KB
|
Doing ‘Simple’ at scale - Micah Brown.mp4
|
83.9 MB
|
Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.eng.srt
|
85.4 KB
|
Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.mp4
|
47.3 MB
|
Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.eng.srt
|
72.4 KB
|
Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.mp4
|
104.5 MB
|
Flex Seal your CICD Pipeline - Ochaun Marshall.eng.srt
|
59.7 KB
|
Flex Seal your CICD Pipeline - Ochaun Marshall.mp4
|
72.3 MB
|
Hacking While Blind - Joe B.eng.srt
|
88.2 KB
|
Hacking While Blind - Joe B.mp4
|
39.0 MB
|
Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.eng.srt
|
47.0 KB
|
Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.mp4
|
40.0 MB
|
Harvesting Botnets for Unusual Data - Alex Holden.eng.srt
|
67.9 KB
|
Harvesting Botnets for Unusual Data - Alex Holden.mp4
|
69.6 MB
|
I Want My EIP Buffer Overflow 101- Mike Saunders.eng.srt
|
75.8 KB
|
I Want My EIP Buffer Overflow 101- Mike Saunders.mp4
|
40.7 MB
|
Intel for Threat Intel - JJ Josing and Matthew Hoerger.eng.srt
|
67.0 KB
|
Intel for Threat Intel - JJ Josing and Matthew Hoerger.mp4
|
31.0 MB
|
Its the end of Critical Infrastructure and I don't feel fine - Steven Briggs.eng.srt
|
108.8 KB
|
Its the end of Critical Infrastructure and I don't feel fine - Steven Briggs.mp4
|
48.2 MB
|
Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.eng.srt
|
98.7 KB
|
Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.mp4
|
92.5 MB
|
Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.eng.srt
|
125.4 KB
|
Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.mp4
|
82.6 MB
|
Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.eng.srt
|
91.4 KB
|
Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.mp4
|
92.6 MB
|
No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.eng.srt
|
111.0 KB
|
No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.mp4
|
40.5 MB
|
Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.eng.srt
|
63.9 KB
|
Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.mp4
|
73.6 MB
|
So You Are Comparing RASP and WAF - David Lindner.eng.srt
|
97.3 KB
|
So You Are Comparing RASP and WAF - David Lindner.mp4
|
42.4 MB
|
Stop buying blinkey boxes - Anthony Coggins.eng.srt
|
33.4 KB
|
Stop buying blinkey boxes - Anthony Coggins.mp4
|
40.1 MB
|
What the CISO is really looking for - Mitchell Parker.eng.srt
|
87.9 KB
|
What the CISO is really looking for - Mitchell Parker.mp4
|
36.5 MB
|
When a Plan Comes Together Building a SOC A-Team - Mark Orlando.eng.srt
|
104.8 KB
|
When a Plan Comes Together Building a SOC A-Team - Mark Orlando.mp4
|
72.1 MB
|
Working Remote Is Isolating Notifications are Overwhelming What Is Going On - Suzanne Pereira.mp4
|
36.3 MB
|
/CircleCityCon 8 2022/
|
Applied Purple Teaming.eng.srt
|
75.8 KB
|
Applied Purple Teaming.mp4
|
52.5 MB
|
AWS WAF Deployment Odyssey.eng.srt
|
98.0 KB
|
AWS WAF Deployment Odyssey.mp4
|
55.2 MB
|
Battle Stories From the Trenches MSP SOC Life.eng.srt
|
79.5 KB
|
Battle Stories From the Trenches MSP SOC Life.mp4
|
47.7 MB
|
Between the Chair and Keyboard Creating Security Culture.eng.srt
|
102.7 KB
|
Between the Chair and Keyboard Creating Security Culture.mp4
|
63.2 MB
|
Burnout Destabalizing Retention.eng.srt
|
86.4 KB
|
Burnout Destabalizing Retention.mp4
|
61.3 MB
|
Closing Ceremony.eng.srt
|
48.8 KB
|
Closing Ceremony.mp4
|
32.8 MB
|
COVID-19 Tracing Apps The Proliferation of Rushed Development.eng.srt
|
74.1 KB
|
COVID-19 Tracing Apps The Proliferation of Rushed Development.mp4
|
38.1 MB
|
CTF Wrap Up.eng.srt
|
20.7 KB
|
CTF Wrap Up.mp4
|
15.6 MB
|
Do Your Devs Write Super Secure Code.eng.srt
|
70.4 KB
|
Do Your Devs Write Super Secure Code.mp4
|
59.6 MB
|
Enterprise Monitoring Security Onion.eng.srt
|
98.8 KB
|
Enterprise Monitoring Security Onion.mp4
|
64.4 MB
|
How Do We Get RightsFinally.eng.srt
|
108.6 KB
|
How Do We Get RightsFinally.mp4
|
54.1 MB
|
How to Build Rapport Between InfoSec and Underserved BIPOC and LGBTQ Members.eng.srt
|
95.2 KB
|
How to Build Rapport Between InfoSec and Underserved BIPOC and LGBTQ Members.mp4
|
62.4 MB
|
How to Roll Your Own InfoSec Training.eng.srt
|
113.1 KB
|
How to Roll Your Own InfoSec Training.mp4
|
77.9 MB
|
In Space, No One Can Hear You Hack.eng.srt
|
111.3 KB
|
In Space, No One Can Hear You Hack.mp4
|
79.3 MB
|
Incident Communications 101 - Breaking the - Bad News.eng.srt
|
86.0 KB
|
Incident Communications 101 - Breaking the - Bad News.mp4
|
49.9 MB
|
Interview Field Manual Hack the Interview.eng.srt
|
121.9 KB
|
Interview Field Manual Hack the Interview.mp4
|
61.3 MB
|
Javascript Obfuscation - It's All About the P-a-c-k-e-r-s.eng.srt
|
83.2 KB
|
Javascript Obfuscation - It's All About the P-a-c-k-e-r-s.mp4
|
59.5 MB
|
Opening Ceremony.eng.srt
|
54.0 KB
|
Opening Ceremony.mp4
|
28.9 MB
|
Opening Keynote Ray REDACTED.eng.srt
|
118.2 KB
|
Opening Keynote Ray REDACTED.mp4
|
77.1 MB
|
Pasta Octive and Stride.eng.srt
|
98.1 KB
|
Pasta Octive and Stride.mp4
|
48.7 MB
|
Powershell for Security Nerds.eng.srt
|
91.0 KB
|
Powershell for Security Nerds.mp4
|
53.1 MB
|
Reveal Risk - Process Improvement.eng.srt
|
105.8 KB
|
Reveal Risk - Process Improvement.mp4
|
61.6 MB
|
So Happy Together - Making DevOps a Reality.eng.srt
|
103.8 KB
|
So Happy Together - Making DevOps a Reality.mp4
|
70.7 MB
|
Static Analysis for Real AppSec.eng.srt
|
44.5 KB
|
Static Analysis for Real AppSec.mp4
|
28.7 MB
|
The Resilience Business Case.eng.srt
|
102.7 KB
|
The Resilience Business Case.mp4
|
57.8 MB
|
Using Faucet SDN Coprocessing for Monitoring and Active Defense.eng.srt
|
87.5 KB
|
Using Faucet SDN Coprocessing for Monitoring and Active Defense.mp4
|
70.6 MB
|
/CircleCityCon 9 2023/
|
Alex Martirosyan - Emulating Adversaries for Auditors and the Business.eng.srt
|
99.7 KB
|
Alex Martirosyan - Emulating Adversaries for Auditors and the Business.mp4
|
49.7 MB
|
Alyssa Miller - Making the Case for SCA.eng.srt
|
92.1 KB
|
Alyssa Miller - Making the Case for SCA.mp4
|
53.0 MB
|
Amélie Koran who'se Job Is It Anyway - Opening Keynote.eng.srt
|
136.3 KB
|
Amélie Koran who'se Job Is It Anyway - Opening Keynote.mp4
|
61.4 MB
|
Caitlin Kiska - Don't Drown IR Combatting the Dangers of Alert Fatigue.eng.srt
|
74.4 KB
|
Caitlin Kiska - Don't Drown IR Combatting the Dangers of Alert Fatigue.mp4
|
42.8 MB
|
CircleCityCon Board Panel.eng.srt
|
102.0 KB
|
CircleCityCon Board Panel.mp4
|
85.9 MB
|
Damian Profancik - I Hope No One Finds Out I'm a Fraud.eng.srt
|
47.1 KB
|
Damian Profancik - I Hope No One Finds Out I'm a Fraud.mp4
|
22.1 MB
|
Doug Kras - The Adventures of IoT Hacking.eng.srt
|
80.1 KB
|
Doug Kras - The Adventures of IoT Hacking.mp4
|
42.3 MB
|
Dr. Catherine Ullman - EHLO is That You.eng.srt
|
81.1 KB
|
Dr. Catherine Ullman - EHLO is That You.mp4
|
60.9 MB
|
Jeff Man - Hackers are Neither Created Nor Destroyed.eng.srt
|
109.9 KB
|
Jeff Man - Hackers are Neither Created Nor Destroyed.mp4
|
61.7 MB
|
Joe Sarkisian - Whatever Happened Last Time, it Wasn't a Penetration Test.eng.srt
|
95.1 KB
|
Joe Sarkisian - Whatever Happened Last Time, it Wasn't a Penetration Test.mp4
|
41.7 MB
|
Kevin Jackson - The Case for Outcome-Based Cybersecurity.eng.srt
|
108.1 KB
|
Kevin Jackson - The Case for Outcome-Based Cybersecurity.mp4
|
60.0 MB
|
Nader Zaveri - A Golden Ticket to the Cloud.eng.srt
|
104.2 KB
|
Nader Zaveri - A Golden Ticket to the Cloud.mp4
|
49.7 MB
|
Ray Davidson PhD We're Not From the Government, but We're Here to Help Them H.eng.srt
|
98.6 KB
|
Ray Davidson PhD We're Not From the Government, but We're Here to Help Them H.mp4
|
52.8 MB
|
Ryan Thompson - Keys to Staying Hidden.eng.srt
|
94.9 KB
|
Ryan Thompson - Keys to Staying Hidden.mp4
|
58.5 MB
|
woland - Password Attacks (to Take Over the World).eng.srt
|
83.1 KB
|
woland - Password Attacks (to Take Over the World).mp4
|
49.8 MB
|
Total files 415
|