FileMood

Download CircleCityCon

CircleCityCon

Name

CircleCityCon

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

13.2 GB

Total Files

415

Hash

0FC6FA9C0DE50C34294243A23EADE705EC587D21

/

CircleCityCon 4 logo.jpg

26.9 KB

CircleCityCon 7 logo.jpg

30.2 KB

CircleCityCon 8 logo.jpg

66.8 KB

CircleCityCon 9 logo.jpg

56.2 KB

CircleCityCon 9 logo.png

53.8 KB

CircleCityCon thank you.txt

0.9 KB

/CircleCityCon 1 2014/

3 is a magic number or your reality check is about to bounce edward mccabe.mp4

39.3 MB

active directory real defense for domain admins jason lang.mp4

31.4 MB

ain t no half steppin martin bos.mp4

37.7 MB

are you a janitor or a cleaner john stauffacher matt hoy.mp4

31.2 MB

blurred lines when digital attacks get physical phil grimes.mp4

39.6 MB

challenge of natural security systems rockie brockway.mp4

33.4 MB

circlecitycon closing.mp4

44.8 MB

circlecitycon closing.srt

48.1 KB

cognitive bias and critical thinking in open source intelligence osint benjamin br.mp4

43.0 MB

competitive hacking why you should capture the flag steve vittitoe.mp4

36.8 MB

conference opening.mp4

10.4 MB

containing privileged processes with selinux and pax and attacking hardened system.mp4

44.0 MB

decrypting communication getting your point across to the masses katherine cook fr.mp4

18.1 MB

developing a open source threat intelligence program edward mccabe.mp4

47.6 MB

doge safes very electronic much fail wow jeff popio.mp4

20.0 MB

Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan.mp4

125.7 MB

exploring the target exfiltration malware with sandbox tools adam hogan.mp4

44.7 MB

eyes on izon surveilling ip camera security mark stanislav.mp4

41.9 MB

eyes on izon surveilling ip camera security mark stanislav.srt

87.0 KB

from grunt to operator tom gorup.mp4

32.9 MB

gitdigger creating useful wordlists and hashes from github repositories jaime fils.mp4

16.3 MB

hackers are people too amanda berlin.mp4

29.6 MB

hackers attack anatomy and security trends ted harrington.mp4

47.4 MB

how hackers for charity possibly saved me a lot of money branden miller & emily mi.mp4

25.7 MB

how hackers for charity possibly saved me a lot of money branden miller & emily mi.srt

37.3 KB

how often should you perform a penetration test jason samide.mp4

10.8 MB

how to create an attack path threat model wolfgang goerlich.mp4

40.4 MB

human trafficking in the digital age chris jenks.mp4

14.4 MB

keynote beau woods fixed.mp4

40.8 MB

keys that go bump in the night loak.mp4

14.1 MB

moving the industry forward the purple team david kennedy.mp4

47.3 MB

openappid open source next gen firewall with snort adam hogan.mp4

43.5 MB

owasp top 10 of 2013 it s still a thing and we re still not getting it barry schat.mp4

35.9 MB

proactive defense eliminating the low hanging fruit matt kelly.mp4

41.9 MB

profiling campus crime chris j jason j katelyn c alex h.mp4

31.6 MB

proper seasoning improves taste james siegel.mp4

41.4 MB

retrocomputing and you machines that made the net pete friedman.mp4

16.5 MB

seeing purple hybrid security teams for the enterprise mark kikta beltface.mp4

32.1 MB

software assurance marketplace swamp von welch.mp4

42.9 MB

tape loops for industrial control protocols k reid wightman.mp4

36.1 MB

ten commandments of incident response for hackers lesley carhart full.mp4

35.9 MB

the truecrypt audit how it happened and what we found kenneth white.mp4

38.4 MB

threat modeling fear fun and operational james robinson.mp4

27.6 MB

whitelist is the new black damian profancik.mp4

39.6 MB

/CircleCityCon 2 2015/

1993 BC Before Cellphones Johnny Xmas.mp4

49.3 MB

Actionable Threat Intelligence ISIS and the SuperBall Ian Amit.mp4

41.2 MB

An Inconvenient Truth Security Monitoring vs Privacy in the Workplace Ana Orozco.mp4

14.6 MB

Analyzing the Entropy of Document Hidden Code Adam Hogan.mp4

40.7 MB

Building a Comprehensive Incident Management Program Owen Creger.mp4

43.1 MB

Building an Incident Response Program Lesley Carhart.mp4

197.4 MB

CircleCity Con lock picking class irongeek.mp4

120.9 MB

Clear as FUD A look at how confusing jargon and technology can create fear uncertainty and doubt Chris Maddalena.mp4

37.9 MB

Closing.mp4

54.6 MB

Configure your assets save your butt Caspian Kilkelly.mp4

25.6 MB

Data Loss Prevention Where do I start Jason Samide.mp4

18.8 MB

Departmentalizing Your SecOps Tom Gorup.mp4

39.0 MB

Deploying Honeypots To Gather Actionable Threat Intelligence James Taliento.mp4

33.0 MB

Digital Supply Chain Security The Exposed Flank Dave Lewis.mp4

37.9 MB

Do We Still Need Pen Testing Jeff Man.mp4

62.8 MB

Does anyone remember Enterprise Security Architecture Rockie Brockway.mp4

45.5 MB

Findings to date Cameron Maerz.mp4

34.9 MB

From Blue To Red What Matters and What Really Doesnt Jason Lang.mp4

41.1 MB

From Parking Lot to Pwnage Brent White Tim Roberts.mp4

54.8 MB

Hacking IIS and NET Kevin Miller.mp4

43.1 MB

Hacking the Jolla An Intro to Assessing A Mobile Device Vitaly McLain Drew Suarez.mp4

29.8 MB

How not to Infosec Dan Tentler.mp4

33.5 MB

How to Budget for IDS Brian Heitzman.mp4

39.0 MB

I Amateur Radio And So Can You Kat Sweet.mp4

27.5 MB

Is that a psvsvc in your pocket Jake Williams.mp4

57.0 MB

Keynote SpaceRogue.mp4

38.4 MB

Lessons Learned from Implementing Software Security Programs Todd Grotenhuis.mp4

33.9 MB

Making Androids Bootable Recovery Work For You Drew Suarez.mp4

44.2 MB

Malware Armor Tyler Halfpop.mp4

42.1 MB

Nepenthes Netpens With Less Pain Andy Schmitz.mp4

29.7 MB

OBAMAS CYBER SECURITY PLAN DISSECTED Jonathan Thompson.mp4

34.0 MB

Opening Ceremonies.mp4

22.4 MB

Operationalizing Yara Chad Robertson.mp4

19.9 MB

PlagueScanner An Open Source Multiple AV Scanner Framework Robert Simmons.mp4

40.4 MB

Reducing Your Organizations Social Engineering Attack Surface Jen Fox.mp4

30.9 MB

Rethinking the Trust Chain Auditing OpenSSL and Beyond Kenneth White.mp4

39.5 MB

Reverse Engineering Windows AFDsys Steven Vittitoe.mp4

32.1 MB

Ruby Not just for hipster Carl Sampson.mp4

10.9 MB

Running Away from Security Web App Vulnerabilities and OSINT Collide Micah Hoffman.mp4

51.1 MB

Security Auditing Android Apps Sam Bowne.mp4

53.8 MB

Security Culture in Development Wolfgang Goerlich.mp4

49.9 MB

Shooting Phish in a Barrel and Other Terrible Fish Related Puns Amanda Berlin.mp4

41.7 MB

Simulating Cyber Operations Do you want to play a game Bryan Fite.mp4

30.7 MB

Smuggling Plums Using Active Defnse techniques to hide your web apps from your attackers and their scanners John Stauffacher.mp4

48.0 MB

Square Peg Round Hole Developing a Security Culture Within an Enterprise Jeff Pergal Stuart McIntosh.mp4

43.0 MB

Surfing the Sea and Drowning in Tabs An Introduction to Cross Site Request Forgery Barry Schatz.mp4

47.7 MB

The Answer is 42 InfoSec Data Visualization Making Metric Magic Business Decisions Edward McCabe.mp4

48.9 MB

The Hacker Community is Dead Long Live the Hacker Community Bruce Potter.mp4

44.5 MB

Turn Your Head And Cough Why Architecture Risk Assessments Are Like Being A General Physician Nathaniel Husted.mp4

50.3 MB

User Awareness Were Doing It Wrong Arlie Hartman.mp4

36.6 MB

Using Evernote as an Threat Intelligence Management Platform Grecs part2.mp4

55.8 MB

Using Evernote as an Threat Intelligence Management Platform Grecs.mp4

56.6 MB

Wireless Intrusion Detection System with Raspberry Pi Chris Jenks.mp4

33.2 MB

Your Own Worst Enemy Landing Your First Infosec Gig Despite Yourself Johnny Xmas.mp4

258.9 MB

ZitMo NoM Clientless Android Malware Control David Schwartzberg.mp4

47.9 MB

/CircleCityCon 3 2016/

Attacking OSX for fun and profit Toolset Limitations Frustration and Table Flipping Viss Tentler.mp4

39.1 MB

Binary Defense Without Privilege Steve Vittitoe.mp4

38.8 MB

Bootstrapping A Security Research Project Andrew Hay.mp4

40.3 MB

Break on Through to the Other Side Grape Ape.mp4

46.9 MB

Closing Ceremony CircleCityCon Staff.mp4

40.1 MB

Contextual Threat Intelligence Building a Data Science Capability into the Hunt Team Brian Genz.mp4

44.0 MB

Creating a Successful Collegiate Security Club Adam Ringwood and Chris Spehn.mp4

26.6 MB

Exfil and Reverse Shells in a Whitelisted World.mp4

24.3 MB

Fantastic OSINT and where to find it Tony Robinson da667.mp4

50.3 MB

Food Fight Wolfgang Goerlich.mp4

42.7 MB

Hacking Our Way Into Hacking Kat Sweet.mp4

41.2 MB

Haking the Next Generation David Schwartzberg.mp4

38.0 MB

Head in the Sand Defence or A Stuxnet for Mainframes Haydn Johnson Cheryl Biswas.mp4

38.6 MB

Intro to Mobile Device Testing Damian Profancik.mp4

21.1 MB

IoT on Easy Mode Reversing and Exploiting Embedded Devices Elvis Collado.mp4

40.7 MB

Keynote Dave Lewis.mp4

32.0 MB

Killing you softly Josh Bressers.mp4

29.5 MB

Now You See Me Now You don't Leaving your Digital Footprint Aamir Lakhani.mp4

33.0 MB

Open Source Malware Lab Robert Simmons.mp4

53.5 MB

Opening Ceremony - CircleCityCon Staff.mp4

25.7 MB

Planes Trains and Automobiles The Internet of Deadly Things Bryan K Fite.mp4

35.3 MB

Playing Doctor Lessons the Blue Team Can Learn from Patient Engagement Wolfgang Goerlich.mp4

37.3 MB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nielson.mp4

41.6 MB

SIEM Supersized Walleed Aljony.mp4

20.9 MB

So you want to be a CISO Von Welch.mp4

24.5 MB

Title You want to put whatwhere John Stauffacher.mp4

16.7 MB

Top 10 Mistakes in Security Operations Centers Incident Handling Response Paul R Jorgensen.mp4

56.2 MB

Untrusted Onions Is Tor Broken Joshua Galloway.mp4

21.1 MB

Where to Start When Your Environment is FK3d InfoSystir Amanda Berlin.mp4

47.8 MB

Why its all snake oil and that may be ok Pablo Breuer.mp4

35.0 MB

Your Password Policy Still Sucks Martin Bos.mp4

49.9 MB

/CircleCityCon 4 2017/

And the Clouds Break Continuity in the 21st Century Wolfgang Goerlich.mp4

46.6 MB

Application Security Metrics Caroline Wong.mp4

42.2 MB

Changing our future with 3D Printing Emily Peed.mp4

43.6 MB

Closing Ceremonies.mp4

50.1 MB

Closing Keynote Lectures or Life Experiences Awareness Training that Works Tottenkoph Cindy Jones.mp4

46.0 MB

Creating Your Own Customized Metamorphic Algorithm Raul Alvarez.mp4

32.7 MB

Cybersecurity for real life Using the NIST Framework to protect your critical infrastructure Ryan Koop.mp4

52.8 MB

Detecting DNS Anomalies with Statistics Jamie Buening.mp4

50.1 MB

DNS Dark Matter Discovery Theres Evil In Those Queries Jim Nitterauer.mp4

35.6 MB

Effective Report Writing for Security Practitioners Benjamin Robinson.mp4

39.3 MB

Everything is Not Awesome How to Overcome Barriers to Proper Network Segmentation Jason Beatty.mp4

53.9 MB

Fuzzing with AFL Adam DC949.mp4

49.9 MB

How To Be Curious Bret Mattingly.mp4

29.1 MB

Ichthyology Phishing as a Science Karla Burnett.mp4

26.4 MB

Its A Disaster Cheryl Biswas.mp4

32.3 MB

Network manipulation on video games Alex Kot.mp4

39.3 MB

Network Security What About The Data 0ddj0bb 0ddj0bb.mp4

39.9 MB

Of Flags Frogs 4chan OPSec vs Weaponized Autism Adrian Crenshaw.mp4

28.1 MB

Open Sesamee Max Power.mp4

28.9 MB

Opening Ceremonies.mp4

37.1 MB

Opening Keynote Words Have Meanings Dan Tentler.mp4

32.4 MB

OSINT And Your World A Love Story Michael James.mp4

43.5 MB

Peakaboo I own you Owning hundreds of thousands of devices with a broken HTTP packet Amit Serper.mp4

35.2 MB

Phing Phishers JAe .mp4

48.3 MB

Security Training Making Your Weakest Link The Strongest Aaron Hnatiw.mp4

48.2 MB

See beyond the veil Automating malicious javascript deobfuscation Chad Robertson.mp4

36.7 MB

Tales from the Cryptanalyst Jeff Man.mp4

50.4 MB

Talky Horror Picture Show Overcoming CFP Fears Kat Sweet.mp4

25.5 MB

The Decision Makers Guide To Managing Risk Joel Cardella.mp4

45.0 MB

The Kids Arent Alright Security and K 12 Education in America Vivienne Pustell.mp4

53.1 MB

The State of Security in the Medical Industry Cannibal billy.mp4

40.6 MB

Threat Intelligence Zero to Basics Chris J.mp4

59.1 MB

Trials and Tribulations of setting up a Phishing Campaign Insight into the how Haydn Johnson.mp4

47.3 MB

We don't Always Go Lights and Sirens Kendra Cooley.mp4

31.0 MB

Why is the Internet still working James Troutman.mp4

51.5 MB

Ye Olde Hacking Johnny Xmas.mp4

84.1 MB

Youre not old enough for that A TLS extension to put the past behind us Falcon Darkstar Momot.mp4

46.6 MB

/CircleCityCon 5 2018/

A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.eng.srt

100.0 KB

A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.mp4

40.5 MB

Abuse Case Testing in DevOps Stephen Deck.eng.srt

157.7 KB

Abuse Case Testing in DevOps Stephen Deck.mp4

60.6 MB

Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.eng.srt

80.8 KB

Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.mp4

32.4 MB

Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.eng.srt

138.5 KB

Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.mp4

47.5 MB

Backdooring with Metadata Itzik Kotler.eng.srt

111.9 KB

Backdooring with Metadata Itzik Kotler.mp4

45.5 MB

Carrot vs Stick Motivation Metrics and Awareness Magen Wu.eng.srt

104.4 KB

Carrot vs Stick Motivation Metrics and Awareness Magen Wu.mp4

45.9 MB

Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.eng.srt

164.6 KB

Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.mp4

52.2 MB

Closing.eng.srt

84.1 KB

Closing.mp4

49.1 MB

Containers Exploits Surprises and Security Elissa Shevinsky.eng.srt

80.8 KB

Containers Exploits Surprises and Security Elissa Shevinsky.mp4

50.4 MB

CTF Tips and Tricks Aaron Lintile.eng.srt

136.3 KB

CTF Tips and Tricks Aaron Lintile.mp4

49.3 MB

Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.eng.srt

137.5 KB

Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.mp4

73.1 MB

Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.eng.srt

76.7 KB

Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.mp4

45.6 MB

Enterprise Vulnerability Management Assessing Implementing and Maintaining De.eng.srt

172.5 KB

Enterprise Vulnerability Management Assessing Implementing and Maintaining De.mp4

57.8 MB

Espionage In The Modern Age of Information Warfare Scot Terban.eng.srt

147.9 KB

Espionage In The Modern Age of Information Warfare Scot Terban.mp4

65.9 MB

global00 GreatSCT Gotta Catch Em AWL Chris Spehn.eng.srt

138.9 KB

global00 GreatSCT Gotta Catch Em AWL Chris Spehn.mp4

43.4 MB

How to Lie with Statistics Information Security Edition Tony Martin Vegue.eng.srt

107.9 KB

How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4

50.4 MB

IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.eng.srt

128.0 KB

IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.mp4

53.0 MB

Opening Ceremonies Circle City Con Staff.eng.srt

67.5 KB

Opening Ceremonies Circle City Con Staff.mp4

24.9 MB

Operator The Well Rounded Hacker Matthew Curtin.eng.srt

139.5 KB

Operator The Well Rounded Hacker Matthew Curtin.mp4

63.0 MB

Patching Its Complicated Cheryl Biswas.eng.srt

89.5 KB

Patching Its Complicated Cheryl Biswas.mp4

50.6 MB

Playing Russian Troll Whack a Mole Courtney Falk.eng.srt

115.8 KB

Playing Russian Troll Whack a Mole Courtney Falk.mp4

45.5 MB

Quick Retooling in Net for Red Teams Dimitry Snezhkov.eng.srt

119.9 KB

Quick Retooling in Net for Red Teams Dimitry Snezhkov.mp4

53.9 MB

Ransomware Robbed with a Toy Gun Brian Baskin.eng.srt

156.6 KB

Ransomware Robbed with a Toy Gun Brian Baskin.mp4

55.9 MB

ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.eng.srt

117.1 KB

ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.mp4

48.3 MB

Rise of the Machines Aamir Lakhani.mp4

40.6 MB

SAEDY Subversion and Espionage Directed Against You Judy Towers.eng.srt

178.8 KB

Securing without Slowing DevOps Wolfgang Goerlich.eng.srt

161.9 KB

Securing without Slowing DevOps Wolfgang Goerlich.mp4

50.5 MB

Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.eng.srt

128.0 KB

Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.mp4

39.4 MB

Shaver Phone.eng.srt

2.5 KB

Shaver Phone.mp4

4.5 MB

Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.eng.srt

149.1 KB

Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.mp4

59.1 MB

The consequences of lack of security in the Healthcare and how to handle it J.mp4

56.2 MB

The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.eng.srt

153.6 KB

The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.mp4

59.0 MB

The Network Night Watch Eric Rand Lesley Carhart.eng.srt

135.2 KB

The Network Night Watch Eric Rand Lesley Carhart.mp4

51.3 MB

The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.eng.srt

127.7 KB

The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.mp4

41.8 MB

/CircleCityCon 6 2019/

Access Rights Exploits under New Privacy Laws Amber Welch.eng.srt

90.4 KB

Access Rights Exploits under New Privacy Laws Amber Welch.mp4

41.6 MB

behind the scenes.eng.srt

14.2 KB

behind the scenes.mp4

16.8 MB

Careers Steven Bernstein.eng.srt

97.7 KB

Careers Steven Bernstein.mp4

44.6 MB

Closing Cermonies.eng.srt

140.2 KB

Closing Cermonies.mp4

102.3 MB

Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.eng.srt

34.1 KB

Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.mp4

28.8 MB

How the video rig works.eng.srt

12.7 KB

How the video rig works.mp4

28.3 MB

How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.eng.srt

75.3 KB

How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.mp4

37.7 MB

Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.eng.srt

82.5 KB

Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.mp4

35.8 MB

inting canister launchable drones for city scale wardriving Glytch Tech.eng.srt

44.6 KB

inting canister launchable drones for city scale wardriving Glytch Tech.mp4

27.0 MB

ity lessons from the Woofmutt Chris Roberts.eng.srt

82.4 KB

ity lessons from the Woofmutt Chris Roberts.mp4

45.2 MB

Opening.eng.srt

37.9 KB

Opening.mp4

23.3 MB

Tales from the CryptAnalyst Jeff Man.eng.srt

107.7 KB

Tales from the CryptAnalyst Jeff Man.mp4

61.0 MB

Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.eng.srt

51.1 KB

Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.mp4

35.9 MB

/CircleCityCon 7 2020/

. senua -v The Swiftly Sneaky C2 - Zach Zenner.eng.srt

85.8 KB

. senua -v The Swiftly Sneaky C2 - Zach Zenner.mp4

72.1 MB

0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.eng.srt

84.9 KB

0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.mp4

39.2 MB

[In]secure deserialization, and how [not] to do it - Alexei Kojenov.eng.srt

64.8 KB

[In]secure deserialization, and how [not] to do it - Alexei Kojenov.mp4

53.5 MB

A Pitmasters Guide To Security Design - Alyssa Miller.eng.srt

93.4 KB

A Pitmasters Guide To Security Design - Alyssa Miller.mp4

91.2 MB

Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.eng.srt

62.3 KB

Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.mp4

31.0 MB

Between a SOC and a Hard Place - Shawn Thomas.eng.srt

81.4 KB

Between a SOC and a Hard Place - Shawn Thomas.mp4

34.8 MB

Break crypto like a pro - Alexei Kojenov.eng.srt

74.6 KB

Break crypto like a pro - Alexei Kojenov.mp4

52.7 MB

Closing Ceremonies - Circle City staff.eng.srt

53.1 KB

Closing Ceremonies - Circle City staff.mp4

68.1 MB

Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.eng.srt

41.7 KB

Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.mp4

47.5 MB

Creating APT targeted threat feeds for your industry - Keith Chapman.eng.srt

29.6 KB

Creating APT targeted threat feeds for your industry - Keith Chapman.mp4

35.4 MB

CTF Wrapup Starring Lintile.eng.srt

79.1 KB

CTF Wrapup Starring Lintile.mp4

127.9 MB

Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.eng.srt

44.2 KB

Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.mp4

37.1 MB

CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.eng.srt

83.7 KB

CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.mp4

75.5 MB

DDoS Mitigation Fundamentals - Krassimir Tzvetanov.eng.srt

86.6 KB

DDoS Mitigation Fundamentals - Krassimir Tzvetanov.mp4

51.2 MB

Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.eng.srt

77.9 KB

Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.mp4

36.8 MB

Doing ‘Simple’ at scale - Micah Brown.eng.srt

87.9 KB

Doing ‘Simple’ at scale - Micah Brown.mp4

83.9 MB

Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.eng.srt

85.4 KB

Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.mp4

47.3 MB

Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.eng.srt

72.4 KB

Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.mp4

104.5 MB

Flex Seal your CICD Pipeline - Ochaun Marshall.eng.srt

59.7 KB

Flex Seal your CICD Pipeline - Ochaun Marshall.mp4

72.3 MB

Hacking While Blind - Joe B.eng.srt

88.2 KB

Hacking While Blind - Joe B.mp4

39.0 MB

Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.eng.srt

47.0 KB

Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.mp4

40.0 MB

Harvesting Botnets for Unusual Data - Alex Holden.eng.srt

67.9 KB

Harvesting Botnets for Unusual Data - Alex Holden.mp4

69.6 MB

I Want My EIP Buffer Overflow 101- Mike Saunders.eng.srt

75.8 KB

I Want My EIP Buffer Overflow 101- Mike Saunders.mp4

40.7 MB

Intel for Threat Intel - JJ Josing and Matthew Hoerger.eng.srt

67.0 KB

Intel for Threat Intel - JJ Josing and Matthew Hoerger.mp4

31.0 MB

Its the end of Critical Infrastructure and I don't feel fine - Steven Briggs.eng.srt

108.8 KB

Its the end of Critical Infrastructure and I don't feel fine - Steven Briggs.mp4

48.2 MB

Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.eng.srt

98.7 KB

Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.mp4

92.5 MB

Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.eng.srt

125.4 KB

Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.mp4

82.6 MB

Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.eng.srt

91.4 KB

Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.mp4

92.6 MB

No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.eng.srt

111.0 KB

No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.mp4

40.5 MB

Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.eng.srt

63.9 KB

Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.mp4

73.6 MB

So You Are Comparing RASP and WAF - David Lindner.eng.srt

97.3 KB

So You Are Comparing RASP and WAF - David Lindner.mp4

42.4 MB

Stop buying blinkey boxes - Anthony Coggins.eng.srt

33.4 KB

Stop buying blinkey boxes - Anthony Coggins.mp4

40.1 MB

What the CISO is really looking for - Mitchell Parker.eng.srt

87.9 KB

What the CISO is really looking for - Mitchell Parker.mp4

36.5 MB

When a Plan Comes Together Building a SOC A-Team - Mark Orlando.eng.srt

104.8 KB

When a Plan Comes Together Building a SOC A-Team - Mark Orlando.mp4

72.1 MB

Working Remote Is Isolating Notifications are Overwhelming What Is Going On - Suzanne Pereira.mp4

36.3 MB

/CircleCityCon 8 2022/

Applied Purple Teaming.eng.srt

75.8 KB

Applied Purple Teaming.mp4

52.5 MB

AWS WAF Deployment Odyssey.eng.srt

98.0 KB

AWS WAF Deployment Odyssey.mp4

55.2 MB

Battle Stories From the Trenches MSP SOC Life.eng.srt

79.5 KB

Battle Stories From the Trenches MSP SOC Life.mp4

47.7 MB

Between the Chair and Keyboard Creating Security Culture.eng.srt

102.7 KB

Between the Chair and Keyboard Creating Security Culture.mp4

63.2 MB

Burnout Destabalizing Retention.eng.srt

86.4 KB

Burnout Destabalizing Retention.mp4

61.3 MB

Closing Ceremony.eng.srt

48.8 KB

Closing Ceremony.mp4

32.8 MB

COVID-19 Tracing Apps The Proliferation of Rushed Development.eng.srt

74.1 KB

COVID-19 Tracing Apps The Proliferation of Rushed Development.mp4

38.1 MB

CTF Wrap Up.eng.srt

20.7 KB

CTF Wrap Up.mp4

15.6 MB

Do Your Devs Write Super Secure Code.eng.srt

70.4 KB

Do Your Devs Write Super Secure Code.mp4

59.6 MB

Enterprise Monitoring Security Onion.eng.srt

98.8 KB

Enterprise Monitoring Security Onion.mp4

64.4 MB

How Do We Get RightsFinally.eng.srt

108.6 KB

How Do We Get RightsFinally.mp4

54.1 MB

How to Build Rapport Between InfoSec and Underserved BIPOC and LGBTQ Members.eng.srt

95.2 KB

How to Build Rapport Between InfoSec and Underserved BIPOC and LGBTQ Members.mp4

62.4 MB

How to Roll Your Own InfoSec Training.eng.srt

113.1 KB

How to Roll Your Own InfoSec Training.mp4

77.9 MB

In Space, No One Can Hear You Hack.eng.srt

111.3 KB

In Space, No One Can Hear You Hack.mp4

79.3 MB

Incident Communications 101 - Breaking the - Bad News.eng.srt

86.0 KB

Incident Communications 101 - Breaking the - Bad News.mp4

49.9 MB

Interview Field Manual Hack the Interview.eng.srt

121.9 KB

Interview Field Manual Hack the Interview.mp4

61.3 MB

Javascript Obfuscation - It's All About the P-a-c-k-e-r-s.eng.srt

83.2 KB

Javascript Obfuscation - It's All About the P-a-c-k-e-r-s.mp4

59.5 MB

Opening Ceremony.eng.srt

54.0 KB

Opening Ceremony.mp4

28.9 MB

Opening Keynote Ray REDACTED.eng.srt

118.2 KB

Opening Keynote Ray REDACTED.mp4

77.1 MB

Pasta Octive and Stride.eng.srt

98.1 KB

Pasta Octive and Stride.mp4

48.7 MB

Powershell for Security Nerds.eng.srt

91.0 KB

Powershell for Security Nerds.mp4

53.1 MB

Reveal Risk - Process Improvement.eng.srt

105.8 KB

Reveal Risk - Process Improvement.mp4

61.6 MB

So Happy Together - Making DevOps a Reality.eng.srt

103.8 KB

So Happy Together - Making DevOps a Reality.mp4

70.7 MB

Static Analysis for Real AppSec.eng.srt

44.5 KB

Static Analysis for Real AppSec.mp4

28.7 MB

The Resilience Business Case.eng.srt

102.7 KB

The Resilience Business Case.mp4

57.8 MB

Using Faucet SDN Coprocessing for Monitoring and Active Defense.eng.srt

87.5 KB

Using Faucet SDN Coprocessing for Monitoring and Active Defense.mp4

70.6 MB

/CircleCityCon 9 2023/

Alex Martirosyan - Emulating Adversaries for Auditors and the Business.eng.srt

99.7 KB

Alex Martirosyan - Emulating Adversaries for Auditors and the Business.mp4

49.7 MB

Alyssa Miller - Making the Case for SCA.eng.srt

92.1 KB

Alyssa Miller - Making the Case for SCA.mp4

53.0 MB

Amélie Koran who'se Job Is It Anyway - Opening Keynote.eng.srt

136.3 KB

Amélie Koran who'se Job Is It Anyway - Opening Keynote.mp4

61.4 MB

Caitlin Kiska - Don't Drown IR Combatting the Dangers of Alert Fatigue.eng.srt

74.4 KB

Caitlin Kiska - Don't Drown IR Combatting the Dangers of Alert Fatigue.mp4

42.8 MB

CircleCityCon Board Panel.eng.srt

102.0 KB

CircleCityCon Board Panel.mp4

85.9 MB

Damian Profancik - I Hope No One Finds Out I'm a Fraud.eng.srt

47.1 KB

Damian Profancik - I Hope No One Finds Out I'm a Fraud.mp4

22.1 MB

Doug Kras - The Adventures of IoT Hacking.eng.srt

80.1 KB

Doug Kras - The Adventures of IoT Hacking.mp4

42.3 MB

Dr. Catherine Ullman - EHLO is That You.eng.srt

81.1 KB

Dr. Catherine Ullman - EHLO is That You.mp4

60.9 MB

Jeff Man - Hackers are Neither Created Nor Destroyed.eng.srt

109.9 KB

Jeff Man - Hackers are Neither Created Nor Destroyed.mp4

61.7 MB

Joe Sarkisian - Whatever Happened Last Time, it Wasn't a Penetration Test.eng.srt

95.1 KB

Joe Sarkisian - Whatever Happened Last Time, it Wasn't a Penetration Test.mp4

41.7 MB

Kevin Jackson - The Case for Outcome-Based Cybersecurity.eng.srt

108.1 KB

Kevin Jackson - The Case for Outcome-Based Cybersecurity.mp4

60.0 MB

Nader Zaveri - A Golden Ticket to the Cloud.eng.srt

104.2 KB

Nader Zaveri - A Golden Ticket to the Cloud.mp4

49.7 MB

Ray Davidson PhD We're Not From the Government, but We're Here to Help Them H.eng.srt

98.6 KB

Ray Davidson PhD We're Not From the Government, but We're Here to Help Them H.mp4

52.8 MB

Ryan Thompson - Keys to Staying Hidden.eng.srt

94.9 KB

Ryan Thompson - Keys to Staying Hidden.mp4

58.5 MB

woland - Password Attacks (to Take Over the World).eng.srt

83.1 KB

woland - Password Attacks (to Take Over the World).mp4

49.8 MB

 

Total files 415


Copyright © 2025 FileMood.com