FileMood

Download CircleCityCon

CircleCityCon

Name

CircleCityCon

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

21.1 GB

Total Files

332

Hash

E76DFAD7D83202786FECC424E93A8741D856A616

/CircleCityCon 2014/

Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan.mp4

402.3 MB

circlecitycon 101 conference opening 35.mp4

36.0 MB

circlecitycon 101 conference opening.mp4

40.2 MB

circlecitycon 102 keynote beau woods fixed.mp4

190.7 MB

circlecitycon 103 containing privileged processes with selinux and pax and attacking hardened system.mp4

146.3 MB

circlecitycon 104 whitelist is the new black damian profancik.mp4

170.0 MB

circlecitycon 105 developing a open source threat intelligence program edward mccabe.mp4

194.3 MB

circlecitycon 106 blurred lines when digital attacks get physical phil grimes.mp4

160.8 MB

circlecitycon 107 hackers attack anatomy and security trends ted harrington.mp4

185.6 MB

circlecitycon 108 exploring the target exfiltration malware with sandbox tools adam hogan.mp4

185.7 MB

circlecitycon 109 from grunt to operator tom gorup.mp4

125.3 MB

circlecitycon 110 moving the industry forward the purple team david kennedy.mp4

158.4 MB

circlecitycon 111 software assurance marketplace swamp von welch.mp4

168.4 MB

circlecitycon 112 owasp top 10 of 2013 it s still a thing and we re still not getting it barry schat.mp4

141.1 MB

circlecitycon 113 tape loops for industrial control protocols k reid wightman.mp4

149.3 MB

circlecitycon 114 openappid open source next gen firewall with snort adam hogan.mp4

175.4 MB

circlecitycon 115 challenge of natural security systems rockie brockway.mp4

169.7 MB

circlecitycon 117 how to create an attack path threat model wolfgang goerlich.mp4

162.8 MB

circlecitycon 119 are you a janitor or a cleaner john stauffacher matt hoy.mp4

124.2 MB

circlecitycon 120 ain t no half steppin martin bos.mp4

145.1 MB

circlecitycon 201 competitive hacking why you should capture the flag steve vittitoe.mp4

147.7 MB

circlecitycon 202 3 is a magic number or your reality check is about to bounce edward mccabe.mp4

150.1 MB

circlecitycon 203 the truecrypt audit how it happened and what we found kenneth white.mp4

180.4 MB

circlecitycon 204 seeing purple hybrid security teams for the enterprise mark kikta beltface.mp4

134.3 MB

circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.mp4

149.7 MB

circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.srt

87.0 KB

circlecitycon 206 cognitive bias and critical thinking in open source intelligence osint benjamin br.mp4

171.0 MB

circlecitycon 208 hackers are people too amanda berlin.mp4

116.3 MB

circlecitycon 209 gitdigger creating useful wordlists and hashes from github repositories jaime fils.mp4

67.3 MB

circlecitycon 210 retrocomputing and you machines that made the net pete friedman.mp4

59.4 MB

circlecitycon 211 doge safes very electronic much fail wow jeff popio.mp4

76.0 MB

circlecitycon 212 human trafficking in the digital age chris jenks.mp4

34.2 MB

circlecitycon 213 keys that go bump in the night loak.mp4

59.1 MB

circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.mp4

96.8 MB

circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.srt

37.3 KB

circlecitycon 215 ten commandments of incident response for hackers lesley carhart full.mp4

129.0 MB

circlecitycon 216 threat modeling fear fun and operational james robinson.mp4

118.9 MB

circlecitycon 217 decrypting communication getting your point across to the masses katherine cook fr.mp4

68.6 MB

circlecitycon 218 how often should you perform a penetration test jason samide.mp4

40.9 MB

circlecitycon 219 proactive defense eliminating the low hanging fruit matt kelly.mp4

157.4 MB

circlecitycon 220 active directory real defense for domain admins jason lang.mp4

128.3 MB

circlecitycon 222 profiling campus crime chris j jason j katelyn c alex h.mp4

114.4 MB

circlecitycon 223 proper seasoning improves taste james siegel.mp4

155.3 MB

circlecitycon closing.mp4

155.0 MB

circlecitycon closing.srt

48.1 KB

/CircleCityCon 2015/

100-Opening-Ceremonies.mp4

42.9 MB

102-Keynote-SpaceRogue.mp4

157.7 MB

103-Rethinking-the-Trust-Chain-Auditing-OpenSSL-and-Beyond-Kenneth-White.mp4

84.1 MB

104-Actionable-Threat-Intelligence-ISIS-and-the-SuperBall-Ian-Amit.mp4

82.2 MB

105-Security-Culture-in-Development-Wolfgang-Goerlich.mp4

97.9 MB

106-Simulating-Cyber-Operations-Do-you-want-to-play-a-game-Bryan-Fite.mp4

67.0 MB

107-Hacking-IIS-and-NET-Kevin-Miller.mp4

85.8 MB

108-User-Awareness-Were-Doing-It-Wrong-Arlie-Hartman.mp4

73.8 MB

109-Departmentalizing-Your-SecOps-Tom-Gorup.mp4

90.0 MB

110-Shooting-Phish-in-a-Barrel-and-Other-Terrible-Fish-Related-Puns-Amanda-Berlin.mp4

105.4 MB

111-ZitMo-NoM-Clientless-Android-Malware-Control-David-Schwartzberg.mp4

98.1 MB

112-Data-Loss-Prevention-Where-do-I-start-Jason-Samide.mp4

34.5 MB

113-Reducing-Your-Organizations-Social-Engineering-Attack-Surface-Jen-Fox.mp4

67.4 MB

114-1993-BC-Before-Cellphones-Johnny-Xmas.mp4

115.0 MB

115-Building-a-Comprehensive-Incident-Management-Program-Owen-Creger.mp4

104.9 MB

115-Is-that-a-psvsvc-in-your-pocket-Jake-Williams.mp4

112.0 MB

116-Analyzing-the-Entropy-of-Document-Hidden-Code-Adam-Hogan.mp4

85.5 MB

117-Making-Androids-Bootable-Recovery-Work-For-You-Drew-Suarez.mp4

89.7 MB

118-Does-anyone-remember-Enterprise-Security-Architecture-Rockie-Brockway.mp4

79.9 MB

119-Malware-Armor-Tyler-Halfpop.mp4

75.5 MB

200-Ruby-Not-just-for-hipster-Carl-Sampson.mp4

21.0 MB

201-Configure-your-assets-save-your-butt-Caspian-Kilkelly.mp4

47.3 MB

202-Digital-Supply-Chain-Security-The-Exposed-Flank-Dave-Lewis.mp4

67.9 MB

203-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4

56.9 MB

204-Wireless-Intrusion-Detection-System-with-Raspberry-Pi-Chris-Jenks.mp4

69.2 MB

205-The-Answer-is-42-InfoSec-Data-Visualization-Making-Metric-Magic-Business-Decisions-Edward-McCabe.mp4

99.1 MB

206-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4

92.1 MB

207-Lessons-Learned-from-Implementing-Software-Security-Programs-Todd-Grotenhuis.mp4

65.9 MB

209-Findings-to-date-Cameron-Maerz.mp4

62.8 MB

211-From-Parking-Lot-to-Pwnage-Brent-White-Tim-Roberts.mp4

103.7 MB

212-PlagueScanner-An-Open-Source-Multiple-AV-Scanner-Framework-Robert-Simmons.mp4

73.9 MB

213-How-not-to-Infosec-Dan-Tentler.mp4

62.8 MB

215-Hacking-the-Jolla-An-Intro-to-Assessing-A-Mobile-Device-Vitaly-McLain-Drew-Suarez.mp4

58.2 MB

300-Operationalizing-Yara-Chad-Robertson.mp4

40.4 MB

301-An-Inconvenient-Truth-Security-Monitoring-vs-Privacy-in-the-Workplace-Ana-Orozco.mp4

28.3 MB

302-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4

94.7 MB

303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs-part2.mp4

101.4 MB

303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs.mp4

101.6 MB

304-Surfing-the-Sea-and-Drowning-in-Tabs-An-Introduction-to-Cross-Site-Request-Forgery-Barry-Schatz.mp4

85.9 MB

305-Turn-Your-Head-And-Cough-Why-Architecture-Risk-Assessments-Are-Like-Being-A-General-Physician-Nathaniel-Husted.mp4

88.7 MB

306-OBAMAS-CYBER-SECURITY-PLAN-DISSECTED-Jonathan-Thompson.mp4

65.0 MB

307-The-Hacker-Community-is-Dead-Long-Live-the-Hacker-Community-Bruce-Potter.mp4

81.7 MB

308-Square-Peg-Round-Hole-Developing-a-Security-Culture-Within-an-Enterprise-Jeff-Pergal-Stuart-McIntosh.mp4

85.7 MB

309-Smuggling-Plums-Using-Active-Defnse-techniques-to-hide-your-web-apps-from-your-attackers-and-their-scanners-John-Stauffacher.mp4

89.3 MB

310-Deploying-Honeypots-To-Gather-Actionable-Threat-Intelligence-James-Taliento.mp4

68.4 MB

311-Clear-as-FUD-A-look-at-how-confusing-jargon-and-technology-can-create-fear-uncertainty-and-doubt-Chris-Maddalena.mp4

70.0 MB

312-How-to-Budget-for-IDS-Brian-Heitzman.mp4

75.8 MB

313-Reverse-Engineering-Windows-AFDsys-Steven-Vittitoe.mp4

58.0 MB

314-Nepenthes-Netpens-With-Less-Pain-Andy-Schmitz.mp4

64.0 MB

315-Do-We-Still-Need-Pen-Testing-Jeff-Man.mp4

116.8 MB

Building-an-Incident-Response-Program-Lesley-Carhart.mp4

364.6 MB

CircleCity-Con-lock-picking-class-irongeek.mp4

284.0 MB

Closing.mp4

115.7 MB

Security-Auditing-Android-Apps-Sam-Bowne.mp4

96.3 MB

Your-Own-Worst-Enemy-Landing-Your-First-Infosec-Gig-Despite-Yourself-Johnny-Xmas.mp4

296.5 MB

/CircleCityCon 2016/

101-Keynote-Dave-Lewis-Dave-Lewis.mp4

70.2 MB

102-Food-Fight-Wolfgang-Goerlich.mp4

91.5 MB

103-IoT-on-Easy-Mode-Reversing-and-Exploiting-Embedded-Devices-Elvis-Collado.mp4

77.0 MB

105-Break-on-Through-to-the-Other-Side-Grape-Ape.mp4

114.2 MB

106-Creating-a-Successful-Collegiate-Security-Club-Adam-Ringwood-and-Chris-Spehn.mp4

56.8 MB

107-Now-You-See-Me-Now-You-Dont-Leaving-your-Digital-Footprint-Aamir-Lakhani.mp4

73.2 MB

108-Red-Team-Madness-Or-How-I-Learned-To-Stop-Worrying-and-Expect-Pentester-Mistakes-Jeremy-Nielson.mp4

88.8 MB

110-Top-10-Mistakes-in-Security-Operations-Centers-Incident-Handling-Response-Paul-R-Jorgensen.mp4

107.4 MB

111-Head-in-the-Sand-Defence-or-A-Stuxnet-for-Mainframes-Haydn-Johnson-Cheryl-Biswas.mp4

71.3 MB

112-Haking-the-Next-Generation-David-Schwartzberg.mp4

92.2 MB

114-Hacking-Our-Way-Into-Hacking-Kat-Sweet.mp4

86.8 MB

114-Your-Password-Policy-Still-Sucks-Martin-Bos.mp4

99.7 MB

115-Closing-Ceremony-CircleCityCon-Staff.mp4

92.8 MB

201-Bootstrapping-A-Security-Research-Project-Andrew-Hay.mp4

69.8 MB

202-Planes-Trains-and-Automobiles-The-Internet-of-Deadly-Things-Bryan-K-Fite.mp4

68.5 MB

203-Open-Source-Malware-Lab-Robert-Simmons.mp4

110.7 MB

204-Title-You-want-to-put-whatwhere-John-Stauffacher.mp4

37.2 MB

205-Untrusted-Onions-Is-Tor-Broken-Joshua-Galloway.mp4

44.3 MB

206-SIEM-Supersized-Walleed-Aljony.mp4

49.9 MB

208-Attacking-OSX-for-fun-and-profit-Toolset-Limitations-Frustration-and-Table-Flipping-Viss-Tentler.mp4

94.4 MB

300-Why-its-all-snake-oil-and-that-may-be-ok-Pablo-Breuer.mp4

72.5 MB

301-Playing-Doctor-Lessons-the-Blue-Team-Can-Learn-from-Patient-Engagement-Wolfgang-Goerlich.mp4

82.1 MB

302-Killing-you-softly-Josh-Bressers.mp4

61.4 MB

303-So-you-want-to-be-a-CISO-Von-Welch.mp4

54.5 MB

305-Contextual-Threat-Intelligence-Building-a-Data-Science-Capability-into-the-Hunt-Team-Brian-Genz.mp4

95.3 MB

306-Fantastic-OSINT-and-where-to-find-it-Tony-Robinson-da667.mp4

117.5 MB

307-Where-to-Start-When-Your-Environment-is-FK3d-InfoSystir-Amanda-Berlin.mp4

94.2 MB

308-Intro-to-Mobile-Device-Testing-Damian-Profancik.mp4

50.5 MB

Binary-Defense-Without-Privilege-Steve-Vittitoe.mp4

77.0 MB

Exfil-and-Reverse-Shells-in-a-Whitelisted-World.mp4

50.8 MB

Opening-Ceremony-CircleCityCon-Staff.mp4

74.6 MB

/CircleCityCon 2017/

000-Closing-Keynote-Lectures-or-Life-Experiences-Awareness-Training-that-Works-Tottenkoph-Cindy-Jones.mp4

85.5 MB

001-Closing-Ceremonies.mp4

91.5 MB

100-Opening-Ceremonies.mp4

103.5 MB

101-Opening-Keynote-Words-Have-Meanings-Dan-Tentler.mp4

90.0 MB

103-And-the-Clouds-Break-Continuity-in-the-21st-Century-Wolfgang-Goerlich.mp4

96.6 MB

104-DNS-Dark-Matter-Discovery-Theres-Evil-In-Those-Queries-Jim-Nitterauer.mp4

77.2 MB

105-Trials-and-Tribulations-of-setting-up-a-Phishing-Campaign-Insight-into-the-how-Haydn-Johnson.mp4

84.4 MB

106-Fuzzing-with-AFL-Adam-DC949.mp4

94.1 MB

107-Effective-Report-Writing-for-Security-Practitioners-Benjamin-Robinson.mp4

75.1 MB

108-Application-Security-Metrics-Caroline-Wong.mp4

84.6 MB

109-OSINT-And-Your-World-A-Love-Story-Michael-James.mp4

81.1 MB

110-Network-manipulation-on-video-games-Alex-Kot.mp4

87.5 MB

111-Phing-Phishers-JAe-.mp4

94.6 MB

112-Open-Sesamee-Max-Power.mp4

57.4 MB

114-Ichthyology-Phishing-as-a-Science-Karla-Burnett.mp4

66.7 MB

115-Peakaboo-I-own-you-Owning-hundreds-of-thousands-of-devices-with-a-broken-HTTP-packet-Amit-Serper.mp4

66.8 MB

200-Everything-is-Not-Awesome-How-to-Overcome-Barriers-to-Proper-Network-Segmentation-Jason-Beatty.mp4

107.4 MB

201-Cybersecurity-for-real-life-Using-the-NIST-Framework-to-protect-your-critical-infrastructure-Ryan-Koop.mp4

102.4 MB

202-The-Decision-Makers-Guide-To-Managing-Risk-Joel-Cardella.mp4

108.3 MB

203-Network-Security-What-About-The-Data-0ddj0bb-0ddj0bb.mp4

92.3 MB

204-Detecting-DNS-Anomalies-with-Statistics-Jamie-Buening.mp4

100.1 MB

205-Threat-Intelligence-Zero-to-Basics-Chris-J.mp4

124.5 MB

206-The-State-of-Security-in-the-Medical-Industry-Cannibal-billy.mp4

117.1 MB

208-See-beyond-the-veil-Automating-malicious-javascript-deobfuscation-Chad-Robertson.mp4

95.4 MB

209-Youre-not-old-enough-for-that-A-TLS-extension-to-put-the-past-behind-us-Falcon-Darkstar-Momot.mp4

97.9 MB

210-Ye-Olde-Hacking-Johnny-Xmas.mp4

177.4 MB

300-Tales-from-the-Cryptanalyst-Jeff-Man.mp4

77.8 MB

301-Talky-Horror-Picture-Show-Overcoming-CFP-Fears-Kat-Sweet.mp4

64.2 MB

302-Why-is-the-Internet-still-working-James-Troutman.mp4

101.0 MB

303-Security-Training-Making-Your-Weakest-Link-The-Strongest-Aaron-Hnatiw.mp4

105.0 MB

304-Its-A-Disaster-Cheryl-Biswas.mp4

62.6 MB

305-The-Kids-Arent-Alright-Security-and-K-12-Education-in-America-Vivienne-Pustell.mp4

105.2 MB

306-How-To-Be-Curious-Bret-Mattingly.mp4

67.6 MB

306-Of-Flags-Frogs-4chan-OPSec-vs-Weaponized-Autism-Adrian-Crenshaw.mp4

58.6 MB

307-Changing-our-future-with-3D-Printing-Emily-Peed.mp4

84.8 MB

308-We-Dont-Always-Go-Lights-and-Sirens-Kendra-Cooley.mp4

54.5 MB

309-Creating-Your-Own-Customized-Metamorphic-Algorithm-Raul-Alvarez.mp4

55.0 MB

CircleCityCon-4-logo.png

241.5 KB

/CircleCityCon 2018/

Circle City Con 50 000 Opening Ceremonies Circle City Con Staff.en.transcribed.srt

67.5 KB

Circle City Con 50 000 Opening Ceremonies Circle City Con Staff.mp4

27.0 MB

Circle City Con 50 100 Espionage In The Modern Age of Information Warfare Scot Terban.en.transcribed.srt

147.9 KB

Circle City Con 50 100 Espionage In The Modern Age of Information Warfare Scot Terban.mp4

57.5 MB

Circle City Con 50 101 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.en.transcribed.srt

127.7 KB

Circle City Con 50 101 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.mp4

46.9 MB

Circle City Con 50 102 The Network Night Watch Eric Rand Lesley Carhart.en.transcribed.srt

135.2 KB

Circle City Con 50 102 The Network Night Watch Eric Rand Lesley Carhart.mp4

50.6 MB

Circle City Con 50 103 Ransomware Robbed with a Toy Gun Brian Baskin.en.transcribed.srt

156.6 KB

Circle City Con 50 103 Ransomware Robbed with a Toy Gun Brian Baskin.mp4

53.2 MB

Circle City Con 50 104 Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.en.transcribed.srt

137.5 KB

Circle City Con 50 104 Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.mp4

113.2 MB

Circle City Con 50 107 Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.en.transcribed.srt

149.1 KB

Circle City Con 50 107 Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.mp4

65.2 MB

Circle City Con 50 108 IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.en.transcribed.srt

128.0 KB

Circle City Con 50 108 IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.mp4

54.0 MB

Circle City Con 50 109 Backdooring with Metadata Itzik Kotler.en.transcribed.srt

111.9 KB

Circle City Con 50 109 Backdooring with Metadata Itzik Kotler.mp4

51.9 MB

Circle City Con 50 110 Containers Exploits Surprises and Security Elissa Shevinsky.en.transcribed.srt

80.8 KB

Circle City Con 50 110 Containers Exploits Surprises and Security Elissa Shevinsky.mp4

47.1 MB

Circle City Con 50 111 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.en.transcribed.srt

76.7 KB

Circle City Con 50 111 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.mp4

55.1 MB

Circle City Con 50 112 Quick Retooling in Net for Red Teams Dimitry Snezhkov.en.transcribed.srt

119.9 KB

Circle City Con 50 112 Quick Retooling in Net for Red Teams Dimitry Snezhkov.mp4

61.2 MB

Circle City Con 50 113 Abuse Case Testing in DevOps Stephen Deck.en.transcribed.srt

157.7 KB

Circle City Con 50 113 Abuse Case Testing in DevOps Stephen Deck.mp4

69.4 MB

Circle City Con 50 200 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.en.transcribed.srt

164.6 KB

Circle City Con 50 200 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.mp4

55.9 MB

Circle City Con 50 201 Enterprise Vulnerability Management Assessing Implementing and Maintaining De.en.transcribed.srt

172.5 KB

Circle City Con 50 201 Enterprise Vulnerability Management Assessing Implementing and Maintaining De.mp4

63.5 MB

Circle City Con 50 202 Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.en.transcribed.srt

128.0 KB

Circle City Con 50 202 Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.mp4

35.5 MB

Circle City Con 50 203 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.en.transcribed.srt

80.8 KB

Circle City Con 50 203 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.mp4

30.4 MB

Circle City Con 50 204 SAEDY Subversion and Espionage Directed Against You Judy Towers.en.transcribed.srt

178.8 KB

Circle City Con 50 205 Rise of the Machines Aamir Lakhani.mp4

45.6 MB

Circle City Con 50 206 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.en.transcribed.srt

138.5 KB

Circle City Con 50 206 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.mp4

51.9 MB

Circle City Con 50 207 Playing Russian Troll Whack a Mole Courtney Falk.en.transcribed.srt

115.8 KB

Circle City Con 50 207 Playing Russian Troll Whack a Mole Courtney Falk.mp4

44.8 MB

Circle City Con 50 208 ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.en.transcribed.srt

117.1 KB

Circle City Con 50 208 ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.mp4

46.2 MB

Circle City Con 50 209 Operator The Well Rounded Hacker Matthew Curtin.en.transcribed.srt

139.5 KB

Circle City Con 50 209 Operator The Well Rounded Hacker Matthew Curtin.mp4

68.1 MB

Circle City Con 50 300 CTF Tips and Tricks Aaron Lintile.en.transcribed.srt

136.3 KB

Circle City Con 50 300 CTF Tips and Tricks Aaron Lintile.mp4

42.1 MB

Circle City Con 50 302 The consequences of lack of security in the Healthcare and how to handle it J.mp4

61.2 MB

Circle City Con 50 303 How to Lie with Statistics Information Security Edition Tony Martin Vegue.en.transcribed.srt

107.9 KB

Circle City Con 50 303 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4

52.7 MB

Circle City Con 50 304 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.en.transcribed.srt

100.0 KB

Circle City Con 50 304 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.mp4

45.4 MB

Circle City Con 50 305 Patching Its Complicated Cheryl Biswas.en.transcribed.srt

89.5 KB

Circle City Con 50 305 Patching Its Complicated Cheryl Biswas.mp4

47.6 MB

Circle City Con 50 306 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.en.transcribed.srt

153.6 KB

Circle City Con 50 306 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.mp4

56.4 MB

Circle City Con 50 307 Carrot vs Stick Motivation Metrics and Awareness Magen Wu.en.transcribed.srt

104.4 KB

Circle City Con 50 307 Carrot vs Stick Motivation Metrics and Awareness Magen Wu.mp4

44.5 MB

Circle City Con 50 308 Securing without Slowing DevOps Wolfgang Goerlich.en.transcribed.srt

161.9 KB

Circle City Con 50 308 Securing without Slowing DevOps Wolfgang Goerlich.mp4

52.0 MB

CircleCityCon 5 Closing.en.transcribed.srt

84.1 KB

CircleCityCon 5 Closing.mp4

68.7 MB

Shaver Phone.en.transcribed.srt

2.5 KB

Shaver Phone.mp4

3.2 MB

global00 GreatSCT Gotta Catch Em AWL Chris Spehn.en.transcribed.srt

138.9 KB

global00 GreatSCT Gotta Catch Em AWL Chris Spehn.mp4

43.7 MB

/CircleCityCon 2019/

Circle City Con 2019 Closing Cermonies.en.transcribed.srt

140.2 KB

Circle City Con 2019 Closing Cermonies.mp4

168.1 MB

Circle City Con 2019 Opening.en.transcribed.srt

37.9 KB

Circle City Con 2019 Opening.mp4

39.4 MB

Circle City Con 2019 behind the scenes.en.transcribed.srt

14.2 KB

Circle City Con 2019 behind the scenes.mp4

35.1 MB

How the video rig works.en.transcribed.srt

12.7 KB

How the video rig works.mp4

24.0 MB

Main Track 1 2 00 Data Access Rights Exploits under New Privacy Laws Amber Welch.en.transcribed.srt

90.4 KB

Main Track 1 2 00 Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4

84.0 MB

Main Track 1 2 01 More Tales from the CryptAnalyst Jeff Man.en.transcribed.srt

107.7 KB

Main Track 1 2 01 More Tales from the CryptAnalyst Jeff Man.mp4

106.8 MB

Main Track 1 2 02 Cons Careers Steven Bernstein.en.transcribed.srt

97.7 KB

Main Track 1 2 02 Cons Careers Steven Bernstein.mp4

61.3 MB

Main Track 1 2 03 3D printing canister launchable drones for city scale wardriving Glytch Tech.en.transcribed.srt

44.6 KB

Main Track 1 2 03 3D printing canister launchable drones for city scale wardriving Glytch Tech.mp4

41.5 MB

Main Track 1 2 04 Security lessons from the Woofmutt Chris Roberts.en.transcribed.srt

82.4 KB

Main Track 1 2 04 Security lessons from the Woofmutt Chris Roberts.mp4

71.7 MB

Main Track 1 2 05 Don't Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.en.transcribed.srt

51.1 KB

Main Track 1 2 05 Don't Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.mp4

58.0 MB

Track 3 00 How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.en.transcribed.srt

75.3 KB

Track 3 00 How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.mp4

64.8 MB

Track 3 01 Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.en.transcribed.srt

34.1 KB

Track 3 01 Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.mp4

40.1 MB

Track 3 02 Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.en.transcribed.srt

82.5 KB

Track 3 02 Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.mp4

51.8 MB

/CircleCityCon 2020/

. senua -v The Swiftly Sneaky C2 - Zach Zenner.eng.srt

85.8 KB

. senua -v The Swiftly Sneaky C2 - Zach Zenner.mp4

69.7 MB

0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.eng.srt

84.9 KB

0Day to HeroDay Bringing a company from scorched earth to a modern security organization Ryan Wisnie.mp4

37.9 MB

A Pitmasters Guide To Security Design - Alyssa Miller.eng.srt

93.4 KB

A Pitmasters Guide To Security Design - Alyssa Miller.mp4

88.7 MB

Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.eng.srt

62.3 KB

Bad Browser Hunting for Malicious Chrome Extensions Colin Cowie.mp4

29.7 MB

Between a SOC and a Hard Place - Shawn Thomas.eng.srt

81.4 KB

Between a SOC and a Hard Place - Shawn Thomas.mp4

34.3 MB

Break crypto like a pro - Alexei Kojenov.eng.srt

74.6 KB

Break crypto like a pro - Alexei Kojenov.mp4

51.8 MB

CTF Wrapup Starring Lintile.eng.srt

79.1 KB

CTF Wrapup Starring Lintile.mp4

130.2 MB

Closing Ceremonies - Circle City staff.eng.srt

53.1 KB

Closing Ceremonies - Circle City staff.mp4

66.1 MB

Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.eng.srt

41.7 KB

Compare DevOps to Harry Potter, so that Anyone Can Understand - Mary Waddick.mp4

46.7 MB

Creating APT targeted threat feeds for your industry - Keith Chapman.eng.srt

29.6 KB

Creating APT targeted threat feeds for your industry - Keith Chapman.mp4

33.2 MB

Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.eng.srt

44.2 KB

Cyber Harassment Things I wish I knew when sh1t went sideways - Laura Johnson.mp4

36.4 MB

CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.eng.srt

83.7 KB

CyberSafari Underexamined threat actors from the global threat landscape - Yoshi LNU.mp4

72.3 MB

DDoS Mitigation Fundamentals - Krassimir Tzvetanov.eng.srt

86.6 KB

DDoS Mitigation Fundamentals - Krassimir Tzvetanov.mp4

48.6 MB

Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.eng.srt

77.9 KB

Demystifying RFCs Practical Applications for Security and the Apocalypse - Chris Culling.mp4

35.3 MB

Doing ‘Simple’ at scale - Micah Brown.eng.srt

87.9 KB

Doing ‘Simple’ at scale - Micah Brown.mp4

83.4 MB

Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.eng.srt

85.4 KB

Dumpster Fires 6 things about IR I learned by being a firefighter - Catherine Ullman.mp4

46.2 MB

Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.eng.srt

72.4 KB

Every Breath You Take A CTI Review of Stalkerware - @Ch33r10.mp4

102.1 MB

Flex Seal your CICD Pipeline - Ochaun Marshall.eng.srt

59.7 KB

Flex Seal your CICD Pipeline - Ochaun Marshall.mp4

67.6 MB

Hacking While Blind - Joe B.eng.srt

88.2 KB

Hacking While Blind - Joe B.mp4

37.2 MB

Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.eng.srt

47.0 KB

Harry Potter and the InfoSec Apprentice - @_zammers and @krypton3.mp4

37.7 MB

Harvesting Botnets for Unusual Data - Alex Holden.eng.srt

67.9 KB

Harvesting Botnets for Unusual Data - Alex Holden.mp4

66.7 MB

I Want My EIP Buffer Overflow 101- Mike Saunders.eng.srt

75.8 KB

I Want My EIP Buffer Overflow 101- Mike Saunders.mp4

39.6 MB

Intel for Threat Intel - JJ Josing and Matthew Hoerger.eng.srt

67.0 KB

Intel for Threat Intel - JJ Josing and Matthew Hoerger.mp4

30.0 MB

Its the end of Critical Infrastructure and I dont feel fine - Steven Briggs.eng.srt

108.8 KB

Its the end of Critical Infrastructure and I dont feel fine - Steven Briggs.mp4

46.8 MB

Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.eng.srt

98.7 KB

Lies Deception and Manipulation Lets talk about Deepfakes - Erich Kron.mp4

89.6 MB

Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.eng.srt

125.4 KB

Marketing and Branding for Security Building a Security First Culture - Megan Kaczanowski Aaron Katz.mp4

77.7 MB

Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.eng.srt

91.4 KB

Nightmares of Information & Cyber Security Officers in a Research Organization Emma Peel Jeff Moore.mp4

92.5 MB

No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.eng.srt

111.0 KB

No One Cares How L33t You Are Providing Actual Value in Penetration Tests - Nathan Sweaney.mp4

39.0 MB

Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.eng.srt

63.9 KB

Panic At the Buttons Hacking Panic Button Systems - Hannah Robbins and Amanda Brown.mp4

70.2 MB

So You Are Comparing RASP and WAF - David Lindner.eng.srt

97.3 KB

So You Are Comparing RASP and WAF - David Lindner.mp4

40.5 MB

Stop buying blinkey boxes - Anthony Coggins.eng.srt

33.4 KB

Stop buying blinkey boxes - Anthony Coggins.mp4

40.0 MB

What the CISO is really looking for - Mitchell Parker.eng.srt

87.9 KB

What the CISO is really looking for - Mitchell Parker.mp4

35.7 MB

When a Plan Comes Together Building a SOC A-Team - Mark Orlando.eng.srt

104.8 KB

When a Plan Comes Together Building a SOC A-Team - Mark Orlando.mp4

65.4 MB

Working Remote Is Isolating Notifications are Overwhelming What Is Going On - Suzanne Pereira.mp4

35.2 MB

[In]secure deserialization, and how [not] to do it - Alexei Kojenov.eng.srt

64.8 KB

[In]secure deserialization, and how [not] to do it - Alexei Kojenov.mp4

52.2 MB

/

CircleCityCon 7 logo.jpg

30.2 KB

CircleCityCon thank you.txt

0.9 KB

CircleCityCon-logo.jpg

26.9 KB

 

Total files 332


Copyright © 2025 FileMood.com