FileMood

Download ConVerge

ConVerge

Name

ConVerge

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

3.2 GB

Total Files

904

Last Seen

Hash

A86AF882C87AAE40CE78DDF1BECBDB14FC17AB08

/

ConVerge Logo.png

8.0 KB

ConVerge thank you.txt

1.5 KB

HEADER.md

0.8 KB

ConVerge 2015/

10 Reasons Your Security Education Program Sucks Kris French Jr.mp4

26.7 MB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.mp4

29.1 MB

Adventures in Communication Taming the C Suite and Board Jim Beechey.mp4

30.1 MB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.mp4

29.8 MB

Clientless Android Malware Control David Schwartzberg.mp4

30.4 MB

Cracking and fixing REST services Bill Sempf.mp4

19.3 MB

Cymon New Cyber Monitoring Tool Roy Firestein.mp4

27.1 MB

Don Warnecke building the team for a successful SOC.mp4

30.3 MB

Excuse me while I BURP Steve Motts.mp4

28.5 MB

Four Pillars Passion Vision Communication Execution Edgar Rojas.mp4

31.0 MB

Hiding in the ShaDOS Richard Cassara.mp4

15.1 MB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.mp4

14.6 MB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.mp4

35.9 MB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.mp4

14.3 MB

keynote raphael mudge hacking to get caught.mp4

30.3 MB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.mp4

40.0 MB

On Defending Against Doxxing Benjamin Brown.mp4

30.8 MB

Process The Salvation of Incident Response Charles Herring.mp4

23.2 MB

PVCSec Live.mp4

39.8 MB

Security Culture in Development Wolfgang Goerlich.mp4

19.4 MB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.mp4

27.2 MB

Soft Skills for a Technical World Justin Herman.mp4

15.0 MB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.mp4

32.2 MB

The Domain Name System DNS Operation and Security Tom Kopchak.mp4

28.1 MB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.mp4

22.6 MB

Threat Intelligence A Program Strategy Approach Jenn Black.mp4

20.0 MB

Under the Unfluence the Dark Side of Influence Ron Woerner.mp4

32.9 MB

Weaving Security into the SDLC Bill Sempf.mp4

28.7 MB

who watches the watchers michael roytman.mp4

20.0 MB

/.../ConVerge 2015 captions/

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.json

2.7 MB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.lrc

68.3 KB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.srt

78.1 KB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.text

46.7 KB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.tsv

59.4 KB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.txt

69.1 KB

10 Reasons Your Security Education Program Sucks Kris French Jr.eng.vtt

69.1 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.json

2.5 MB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.lrc

62.2 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.srt

69.7 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.text

45.7 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.tsv

55.4 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.txt

62.8 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock.eng.vtt

62.8 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.json

2.5 MB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.lrc

62.2 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.srt

69.7 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.text

45.7 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.tsv

55.4 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.txt

62.8 KB

Adaptive Monitoring and Detection for Todays Landscape Jamie Murdock_en.vtt

62.8 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.json

2.4 MB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.lrc

62.3 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.srt

70.3 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.text

44.6 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.tsv

54.9 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.txt

63.0 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey.eng.vtt

63.0 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.json

2.4 MB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.lrc

62.3 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.srt

70.3 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.text

44.6 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.tsv

54.9 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.txt

63.0 KB

Adventures in Communication Taming the C Suite and Board Jim Beechey_en.vtt

63.0 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.json

2.8 MB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.lrc

66.8 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.srt

73.6 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.text

51.9 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.tsv

60.6 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.txt

67.4 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo.eng.vtt

67.4 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.json

2.8 MB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.lrc

66.8 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.srt

73.6 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.text

51.9 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.tsv

60.6 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.txt

67.4 KB

Application Security Awareness Building an Effective and Entertaining Security Training Program Chris Romeo_en.vtt

67.4 KB

Clientless Android Malware Control David Schwartzberg.eng.json

2.7 MB

Clientless Android Malware Control David Schwartzberg.eng.lrc

69.3 KB

Clientless Android Malware Control David Schwartzberg.eng.srt

79.0 KB

Clientless Android Malware Control David Schwartzberg.eng.text

48.0 KB

Clientless Android Malware Control David Schwartzberg.eng.tsv

60.6 KB

Clientless Android Malware Control David Schwartzberg.eng.txt

70.1 KB

Clientless Android Malware Control David Schwartzberg.eng.vtt

70.2 KB

Clientless Android Malware Control David Schwartzberg_en.json

2.7 MB

Clientless Android Malware Control David Schwartzberg_en.lrc

69.3 KB

Clientless Android Malware Control David Schwartzberg_en.srt

79.0 KB

Clientless Android Malware Control David Schwartzberg_en.text

48.0 KB

Clientless Android Malware Control David Schwartzberg_en.tsv

60.6 KB

Clientless Android Malware Control David Schwartzberg_en.txt

70.1 KB

Clientless Android Malware Control David Schwartzberg_en.vtt

70.2 KB

Cracking and fixing REST services Bill Sempf.eng.json

1.5 MB

Cracking and fixing REST services Bill Sempf.eng.lrc

38.6 KB

Cracking and fixing REST services Bill Sempf.eng.srt

43.0 KB

Cracking and fixing REST services Bill Sempf.eng.text

28.7 KB

Cracking and fixing REST services Bill Sempf.eng.tsv

34.5 KB

Cracking and fixing REST services Bill Sempf.eng.txt

39.0 KB

Cracking and fixing REST services Bill Sempf.eng.vtt

39.0 KB

Cracking and fixing REST services Bill Sempf_en.json

1.5 MB

Cracking and fixing REST services Bill Sempf_en.lrc

38.6 KB

Cracking and fixing REST services Bill Sempf_en.srt

43.0 KB

Cracking and fixing REST services Bill Sempf_en.text

28.7 KB

Cracking and fixing REST services Bill Sempf_en.tsv

34.5 KB

Cracking and fixing REST services Bill Sempf_en.txt

39.0 KB

Cracking and fixing REST services Bill Sempf_en.vtt

39.0 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.json

2.1 MB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.lrc

52.1 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.srt

58.0 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.text

39.0 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.tsv

46.7 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.txt

52.6 KB

Cymon New Cyber Monitoring Tool Roy Firestein.eng.vtt

52.6 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.json

2.1 MB

Cymon New Cyber Monitoring Tool Roy Firestein_en.lrc

52.1 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.srt

58.0 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.text

39.0 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.tsv

46.7 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.txt

52.6 KB

Cymon New Cyber Monitoring Tool Roy Firestein_en.vtt

52.6 KB

Don Warnecke building the team for a successful SOC.eng.json

3.1 MB

Don Warnecke building the team for a successful SOC.eng.lrc

59.4 KB

Don Warnecke building the team for a successful SOC.eng.srt

65.7 KB

Don Warnecke building the team for a successful SOC.eng.text

45.4 KB

Don Warnecke building the team for a successful SOC.eng.tsv

53.6 KB

Don Warnecke building the team for a successful SOC.eng.txt

59.9 KB

Don Warnecke building the team for a successful SOC.eng.vtt

59.9 KB

Don Warnecke building the team for a successful SOC_en.json

3.2 MB

Don Warnecke building the team for a successful SOC_en.lrc

60.0 KB

Don Warnecke building the team for a successful SOC_en.srt

66.4 KB

Don Warnecke building the team for a successful SOC_en.text

45.9 KB

Don Warnecke building the team for a successful SOC_en.tsv

54.2 KB

Don Warnecke building the team for a successful SOC_en.txt

60.6 KB

Don Warnecke building the team for a successful SOC_en.vtt

60.6 KB

Excuse me while I BURP Steve Motts.eng.json

2.2 MB

Excuse me while I BURP Steve Motts.eng.lrc

55.0 KB

Excuse me while I BURP Steve Motts.eng.srt

62.5 KB

Excuse me while I BURP Steve Motts.eng.text

38.6 KB

Excuse me while I BURP Steve Motts.eng.tsv

48.3 KB

Excuse me while I BURP Steve Motts.eng.txt

55.7 KB

Excuse me while I BURP Steve Motts.eng.vtt

55.7 KB

Excuse me while I BURP Steve Motts_en.json

2.2 MB

Excuse me while I BURP Steve Motts_en.lrc

55.0 KB

Excuse me while I BURP Steve Motts_en.srt

62.5 KB

Excuse me while I BURP Steve Motts_en.text

38.6 KB

Excuse me while I BURP Steve Motts_en.tsv

48.3 KB

Excuse me while I BURP Steve Motts_en.txt

55.7 KB

Excuse me while I BURP Steve Motts_en.vtt

55.7 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.json

2.1 MB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.lrc

53.0 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.srt

60.1 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.text

37.5 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.tsv

46.5 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.txt

53.6 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas.eng.vtt

53.6 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.json

2.1 MB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.lrc

53.0 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.srt

60.1 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.text

37.5 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.tsv

46.5 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.txt

53.6 KB

Four Pillars Passion Vision Communication Execution Edgar Rojas_en.vtt

53.6 KB

Hiding in the ShaDOS Richard Cassara.eng.json

1.2 MB

Hiding in the ShaDOS Richard Cassara.eng.lrc

28.4 KB

Hiding in the ShaDOS Richard Cassara.eng.srt

31.7 KB

Hiding in the ShaDOS Richard Cassara.eng.text

20.8 KB

Hiding in the ShaDOS Richard Cassara.eng.tsv

25.1 KB

Hiding in the ShaDOS Richard Cassara.eng.txt

28.7 KB

Hiding in the ShaDOS Richard Cassara.eng.vtt

28.7 KB

Hiding in the ShaDOS Richard Cassara_en.json

1.2 MB

Hiding in the ShaDOS Richard Cassara_en.lrc

28.4 KB

Hiding in the ShaDOS Richard Cassara_en.srt

31.7 KB

Hiding in the ShaDOS Richard Cassara_en.text

20.8 KB

Hiding in the ShaDOS Richard Cassara_en.tsv

25.1 KB

Hiding in the ShaDOS Richard Cassara_en.txt

28.7 KB

Hiding in the ShaDOS Richard Cassara_en.vtt

28.7 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.json

1.0 MB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.lrc

25.0 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.srt

27.4 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.text

19.6 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.tsv

22.6 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.txt

25.2 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian.eng.vtt

25.2 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.json

1.0 MB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.lrc

25.0 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.srt

27.4 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.text

19.6 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.tsv

22.6 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.txt

25.2 KB

Homebrew Censorship Detection by Analysis of BGP Data Zach Julian_en.vtt

25.2 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.json

3.3 MB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.lrc

82.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.srt

93.3 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.text

57.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.tsv

71.8 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.txt

83.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas.eng.vtt

83.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.json

3.3 MB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.lrc

82.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.srt

93.3 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.text

57.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.tsv

71.8 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.txt

83.0 KB

How to Dress Like a Human Being IRL Networking for Humans Pt 2 Johnny Xmas_en.vtt

83.0 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.json

1.2 MB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.lrc

31.1 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.srt

35.1 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.text

22.2 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.tsv

27.2 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.txt

31.4 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski.eng.vtt

31.4 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.json

1.2 MB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.lrc

31.1 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.srt

35.1 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.text

22.2 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.tsv

27.2 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.txt

31.4 KB

If My CICD Teams have Time for Security So Does Yours Kevin Poniatowski_en.vtt

31.4 KB

keynote raphael mudge hacking to get caught.eng.json

2.4 MB

keynote raphael mudge hacking to get caught.eng.lrc

58.9 KB

keynote raphael mudge hacking to get caught.eng.srt

64.8 KB

keynote raphael mudge hacking to get caught.eng.text

45.8 KB

keynote raphael mudge hacking to get caught.eng.tsv

53.5 KB

keynote raphael mudge hacking to get caught.eng.txt

59.4 KB

keynote raphael mudge hacking to get caught.eng.vtt

59.4 KB

keynote raphael mudge hacking to get caught_en.json

2.4 MB

keynote raphael mudge hacking to get caught_en.lrc

58.9 KB

keynote raphael mudge hacking to get caught_en.srt

64.8 KB

keynote raphael mudge hacking to get caught_en.text

45.8 KB

keynote raphael mudge hacking to get caught_en.tsv

53.5 KB

keynote raphael mudge hacking to get caught_en.txt

59.4 KB

keynote raphael mudge hacking to get caught_en.vtt

59.4 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.json

3.9 MB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.lrc

92.4 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.srt

104.8 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.text

64.3 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.tsv

80.8 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.txt

93.5 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street.eng.vtt

93.5 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.json

3.9 MB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.lrc

92.4 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.srt

104.8 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.text

64.3 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.tsv

80.8 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.txt

93.5 KB

keynote01 Breaking in Bad Im the one who doesnt knock Jayson E Street_en.vtt

93.5 KB

On Defending Against Doxxing Benjamin Brown.eng.json

2.6 MB

On Defending Against Doxxing Benjamin Brown.eng.lrc

62.2 KB

On Defending Against Doxxing Benjamin Brown.eng.srt

67.7 KB

On Defending Against Doxxing Benjamin Brown.eng.text

50.2 KB

On Defending Against Doxxing Benjamin Brown.eng.tsv

57.3 KB

On Defending Against Doxxing Benjamin Brown.eng.txt

62.7 KB

On Defending Against Doxxing Benjamin Brown.eng.vtt

62.7 KB

On Defending Against Doxxing Benjamin Brown_en.json

2.6 MB

On Defending Against Doxxing Benjamin Brown_en.lrc

62.2 KB

On Defending Against Doxxing Benjamin Brown_en.srt

67.7 KB

On Defending Against Doxxing Benjamin Brown_en.text

50.2 KB

On Defending Against Doxxing Benjamin Brown_en.tsv

57.3 KB

On Defending Against Doxxing Benjamin Brown_en.txt

62.7 KB

On Defending Against Doxxing Benjamin Brown_en.vtt

62.7 KB

Process The Salvation of Incident Response Charles Herring.eng.json

1.8 MB

Process The Salvation of Incident Response Charles Herring.eng.lrc

46.3 KB

Process The Salvation of Incident Response Charles Herring.eng.srt

51.9 KB

Process The Salvation of Incident Response Charles Herring.eng.text

34.1 KB

Process The Salvation of Incident Response Charles Herring.eng.tsv

41.2 KB

Process The Salvation of Incident Response Charles Herring.eng.txt

46.8 KB

Process The Salvation of Incident Response Charles Herring.eng.vtt

46.8 KB

Process The Salvation of Incident Response Charles Herring_en.json

1.8 MB

Process The Salvation of Incident Response Charles Herring_en.lrc

46.3 KB

Process The Salvation of Incident Response Charles Herring_en.srt

51.9 KB

Process The Salvation of Incident Response Charles Herring_en.text

34.1 KB

Process The Salvation of Incident Response Charles Herring_en.tsv

41.2 KB

Process The Salvation of Incident Response Charles Herring_en.txt

46.8 KB

Process The Salvation of Incident Response Charles Herring_en.vtt

46.8 KB

PVCSec Live.eng.json

2.7 MB

PVCSec Live.eng.lrc

70.3 KB

PVCSec Live.eng.srt

80.9 KB

PVCSec Live.eng.text

47.0 KB

PVCSec Live.eng.tsv

60.7 KB

PVCSec Live.eng.txt

71.1 KB

PVCSec Live.eng.vtt

71.2 KB

PVCSec Live_en.json

2.7 MB

PVCSec Live_en.lrc

70.0 KB

PVCSec Live_en.srt

80.5 KB

PVCSec Live_en.text

47.0 KB

PVCSec Live_en.tsv

60.6 KB

PVCSec Live_en.txt

70.9 KB

PVCSec Live_en.vtt

70.9 KB

Security Culture in Development Wolfgang Goerlich.eng.json

2.3 MB

Security Culture in Development Wolfgang Goerlich.eng.lrc

59.2 KB

Security Culture in Development Wolfgang Goerlich.eng.srt

68.8 KB

Security Culture in Development Wolfgang Goerlich.eng.text

38.2 KB

Security Culture in Development Wolfgang Goerlich.eng.tsv

50.2 KB

Security Culture in Development Wolfgang Goerlich.eng.txt

60.1 KB

Security Culture in Development Wolfgang Goerlich.eng.vtt

60.1 KB

Security Culture in Development Wolfgang Goerlich_en.json

2.3 MB

Security Culture in Development Wolfgang Goerlich_en.lrc

59.2 KB

Security Culture in Development Wolfgang Goerlich_en.srt

68.8 KB

Security Culture in Development Wolfgang Goerlich_en.text

38.2 KB

Security Culture in Development Wolfgang Goerlich_en.tsv

50.2 KB

Security Culture in Development Wolfgang Goerlich_en.txt

60.1 KB

Security Culture in Development Wolfgang Goerlich_en.vtt

60.1 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.json

1.9 MB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.lrc

46.4 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.srt

52.2 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.text

33.5 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.tsv

41.0 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.txt

46.9 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin.eng.vtt

46.9 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.json

1.9 MB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.lrc

46.4 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.srt

52.2 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.text

33.5 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.tsv

41.0 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.txt

46.9 KB

Shooting Phish in a Barrel and other bad fish puns Amanda Berlin_en.vtt

46.9 KB

Soft Skills for a Technical World Justin Herman.eng.json

1.6 MB

Soft Skills for a Technical World Justin Herman.eng.lrc

35.4 KB

Soft Skills for a Technical World Justin Herman.eng.srt

38.5 KB

Soft Skills for a Technical World Justin Herman.eng.text

28.3 KB

Soft Skills for a Technical World Justin Herman.eng.tsv

32.4 KB

Soft Skills for a Technical World Justin Herman.eng.txt

35.6 KB

Soft Skills for a Technical World Justin Herman.eng.vtt

35.6 KB

Soft Skills for a Technical World Justin Herman_en.json

1.6 MB

Soft Skills for a Technical World Justin Herman_en.lrc

35.4 KB

Soft Skills for a Technical World Justin Herman_en.srt

38.5 KB

Soft Skills for a Technical World Justin Herman_en.text

28.3 KB

Soft Skills for a Technical World Justin Herman_en.tsv

32.4 KB

Soft Skills for a Technical World Justin Herman_en.txt

35.6 KB

Soft Skills for a Technical World Justin Herman_en.vtt

35.6 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.json

2.7 MB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.lrc

68.9 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.srt

78.2 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.text

48.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.tsv

60.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.txt

69.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas.eng.vtt

69.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.json

2.7 MB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.lrc

68.9 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.srt

78.2 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.text

48.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.tsv

60.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.txt

69.7 KB

Thats NOT my RJ45 Jack IRL Networking for Humans Pt 1 Johnny Xmas_en.vtt

69.7 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.json

2.2 MB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.lrc

52.2 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.srt

57.1 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.text

41.3 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.tsv

47.6 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.txt

52.6 KB

The Domain Name System DNS Operation and Security Tom Kopchak.eng.vtt

52.6 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.json

2.2 MB

The Domain Name System DNS Operation and Security Tom Kopchak_en.lrc

52.2 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.srt

57.1 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.text

41.3 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.tsv

47.6 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.txt

52.6 KB

The Domain Name System DNS Operation and Security Tom Kopchak_en.vtt

52.6 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.json

1.8 MB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.lrc

45.0 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.srt

50.8 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.text

32.0 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.tsv

39.6 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.txt

45.5 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob.eng.vtt

45.5 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.json

1.8 MB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.lrc

45.0 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.srt

50.8 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.text

32.0 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.tsv

39.6 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.txt

45.5 KB

The Path Well Traveled Common Mistakes Encountered with SIEM Nick Jacob_en.vtt

45.5 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.json

1.8 MB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.lrc

39.5 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.srt

44.2 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.text

28.9 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.tsv

35.0 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.txt

39.9 KB

Threat Intelligence A Program Strategy Approach Jenn Black.eng.vtt

39.9 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.json

1.8 MB

Threat Intelligence A Program Strategy Approach Jenn Black_en.lrc

39.5 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.srt

44.2 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.text

28.9 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.tsv

35.0 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.txt

39.9 KB

Threat Intelligence A Program Strategy Approach Jenn Black_en.vtt

39.9 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.json

2.3 MB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.lrc

65.3 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.srt

76.1 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.text

41.7 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.tsv

55.6 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.txt

66.2 KB

Under the Unfluence the Dark Side of Influence Ron Woerner.eng.vtt

66.2 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.json

2.3 MB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.lrc

65.3 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.srt

76.1 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.text

41.7 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.tsv

55.6 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.txt

66.2 KB

Under the Unfluence the Dark Side of Influence Ron Woerner_en.vtt

66.2 KB

Weaving Security into the SDLC Bill Sempf.eng.json

2.4 MB

Weaving Security into the SDLC Bill Sempf.eng.lrc

59.0 KB

Weaving Security into the SDLC Bill Sempf.eng.srt

66.3 KB

Weaving Security into the SDLC Bill Sempf.eng.text

43.0 KB

Weaving Security into the SDLC Bill Sempf.eng.tsv

52.4 KB

Weaving Security into the SDLC Bill Sempf.eng.txt

59.7 KB

Weaving Security into the SDLC Bill Sempf.eng.vtt

59.7 KB

Weaving Security into the SDLC Bill Sempf_en.json

2.4 MB

Weaving Security into the SDLC Bill Sempf_en.lrc

59.0 KB

Weaving Security into the SDLC Bill Sempf_en.srt

66.3 KB

Weaving Security into the SDLC Bill Sempf_en.text

43.0 KB

Weaving Security into the SDLC Bill Sempf_en.tsv

52.4 KB

Weaving Security into the SDLC Bill Sempf_en.txt

59.7 KB

Weaving Security into the SDLC Bill Sempf_en.vtt

59.7 KB

who watches the watchers michael roytman.eng.json

2.0 MB

who watches the watchers michael roytman.eng.lrc

46.4 KB

who watches the watchers michael roytman.eng.srt

51.2 KB

who watches the watchers michael roytman.eng.text

35.7 KB

who watches the watchers michael roytman.eng.tsv

41.8 KB

who watches the watchers michael roytman.eng.txt

46.8 KB

who watches the watchers michael roytman.eng.vtt

46.8 KB

who watches the watchers michael roytman_en.json

2.0 MB

who watches the watchers michael roytman_en.lrc

46.4 KB

who watches the watchers michael roytman_en.srt

51.2 KB

who watches the watchers michael roytman_en.text

35.7 KB

who watches the watchers michael roytman_en.tsv

41.8 KB

who watches the watchers michael roytman_en.txt

46.8 KB

who watches the watchers michael roytman_en.vtt

46.8 KB

ConVerge 2016/

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.mp4

26.1 MB

Building a better user Developing a security fluent society Rich Cassara.mp4

14.6 MB

Converge 2016 Intro.mp4

3.5 MB

Enterprise Class Threat Management Like A Boss Rockie Brockway.mp4

33.4 MB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.mp4

24.5 MB

Expanding Your Toolbox the DIY Way Chris Maddalena.mp4

16.5 MB

Food Fight J Wolfgang Goerlich.mp4

17.2 MB

Game of Hacks Play Hack and Track Joshua Clark.mp4

30.9 MB

Haking the Next Generation David Schwartzberg.mp4

33.4 MB

Keynote 1 Steve Werby.mp4

24.9 MB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.mp4

32.4 MB

Maneuvering Management Madness Andrew Hay.mp4

28.4 MB

MySQL 57 Security Dave Stokes.mp4

15.5 MB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.mp4

31.2 MB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.mp4

34.3 MB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.mp4

33.7 MB

Security Compliance Simple Pick 2 Joshua Marpet.mp4

141.4 MB

Sentry on the Wall Reid Brosko.mp4

26.9 MB

So You've Inherited a Security Department Now What Amanda Berlin.mp4

22.7 MB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.mp4

27.4 MB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.mp4

37.1 MB

Threat Modeling for Secure Software Design Robert Hurlbut.mp4

24.7 MB

Violating Trust Social Engineering Past and Present Paul Blonsky.mp4

16.7 MB

/.../ConVerge 2016 captions/

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.json

2.7 MB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.lrc

66.3 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.srt

73.0 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.text

51.7 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.tsv

60.3 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.txt

66.9 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.eng.vtt

66.9 KB

AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.srt

83.9 KB

Building a better user Developing a security fluent society Rich Cassara.eng.json

1.2 MB

Building a better user Developing a security fluent society Rich Cassara.eng.lrc

27.1 KB

Building a better user Developing a security fluent society Rich Cassara.eng.srt

30.1 KB

Building a better user Developing a security fluent society Rich Cassara.eng.text

20.6 KB

Building a better user Developing a security fluent society Rich Cassara.eng.tsv

24.3 KB

Building a better user Developing a security fluent society Rich Cassara.eng.txt

27.4 KB

Building a better user Developing a security fluent society Rich Cassara.eng.vtt

27.4 KB

Building a better user Developing a security fluent society Rich Cassara.srt

34.6 KB

Converge 2016 Intro.eng.json

352.8 KB

Converge 2016 Intro.eng.lrc

9.0 KB

Converge 2016 Intro.eng.srt

10.5 KB

Converge 2016 Intro.eng.text

5.6 KB

Converge 2016 Intro.eng.tsv

7.4 KB

Converge 2016 Intro.eng.txt

9.2 KB

Converge 2016 Intro.eng.vtt

9.2 KB

Converge 2016 Intro.srt

9.2 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.json

2.6 MB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.lrc

57.5 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.srt

64.3 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.text

42.5 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.tsv

51.4 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.txt

58.1 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.eng.vtt

58.1 KB

Enterprise Class Threat Management Like A Boss Rockie Brockway.srt

70.8 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.json

2.3 MB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.lrc

55.6 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.srt

62.6 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.text

40.4 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.tsv

49.3 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.txt

56.2 KB

Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.eng.vtt

56.2 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.json

1.9 MB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.lrc

42.2 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.srt

47.1 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.text

31.3 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.tsv

37.5 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.txt

42.6 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.eng.vtt

42.6 KB

Expanding Your Toolbox the DIY Way Chris Maddalena.srt

49.3 KB

Food Fight J Wolfgang Goerlich.eng.json

2.3 MB

Food Fight J Wolfgang Goerlich.eng.lrc

47.0 KB

Food Fight J Wolfgang Goerlich.eng.srt

53.1 KB

Food Fight J Wolfgang Goerlich.eng.text

33.5 KB

Food Fight J Wolfgang Goerlich.eng.tsv

41.1 KB

Food Fight J Wolfgang Goerlich.eng.txt

47.5 KB

Food Fight J Wolfgang Goerlich.eng.vtt

47.5 KB

Food Fight J Wolfgang Goerlich.srt

50.1 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.json

2.4 MB

Game of Hacks Play Hack and Track Joshua Clark.eng.lrc

58.5 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.srt

66.7 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.text

40.5 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.tsv

51.1 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.txt

59.2 KB

Game of Hacks Play Hack and Track Joshua Clark.eng.vtt

59.2 KB

Game of Hacks Play Hack and Track Joshua Clark.srt

63.8 KB

Haking the Next Generation David Schwartzberg.eng.json

3.2 MB

Haking the Next Generation David Schwartzberg.eng.lrc

75.5 KB

Haking the Next Generation David Schwartzberg.eng.srt

84.9 KB

Haking the Next Generation David Schwartzberg.eng.text

55.0 KB

Haking the Next Generation David Schwartzberg.eng.tsv

67.2 KB

Haking the Next Generation David Schwartzberg.eng.txt

76.3 KB

Haking the Next Generation David Schwartzberg.eng.vtt

76.3 KB

Haking the Next Generation David Schwartzberg.srt

85.7 KB

Keynote 1 Steve Werby.eng.json

2.7 MB

Keynote 1 Steve Werby.eng.lrc

69.1 KB

Keynote 1 Steve Werby.eng.srt

76.4 KB

Keynote 1 Steve Werby.eng.text

53.0 KB

Keynote 1 Steve Werby.eng.tsv

62.4 KB

Keynote 1 Steve Werby.eng.txt

69.7 KB

Keynote 1 Steve Werby.eng.vtt

69.7 KB

Keynote 1 Steve Werby.srt

80.3 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.json

3.2 MB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.lrc

79.4 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.srt

91.0 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.text

53.9 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.tsv

68.9 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.txt

80.4 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.eng.vtt

80.4 KB

Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.srt

49.7 KB

Maneuvering Management Madness Andrew Hay.eng.json

2.3 MB

Maneuvering Management Madness Andrew Hay.eng.lrc

59.0 KB

Maneuvering Management Madness Andrew Hay.eng.srt

67.0 KB

Maneuvering Management Madness Andrew Hay.eng.text

41.4 KB

Maneuvering Management Madness Andrew Hay.eng.tsv

51.8 KB

Maneuvering Management Madness Andrew Hay.eng.txt

59.7 KB

Maneuvering Management Madness Andrew Hay.eng.vtt

59.7 KB

Maneuvering Management Madness Andrew Hay.srt

67.3 KB

MySQL 57 Security Dave Stokes.eng.json

1.4 MB

MySQL 57 Security Dave Stokes.eng.lrc

33.8 KB

MySQL 57 Security Dave Stokes.eng.srt

37.8 KB

MySQL 57 Security Dave Stokes.eng.text

25.1 KB

MySQL 57 Security Dave Stokes.eng.tsv

30.0 KB

MySQL 57 Security Dave Stokes.eng.txt

34.2 KB

MySQL 57 Security Dave Stokes.eng.vtt

34.2 KB

MySQL 57 Security Dave Stokes.srt

38.5 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.json

2.8 MB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.lrc

66.6 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.srt

76.1 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.text

45.8 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.tsv

58.0 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.txt

67.4 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.eng.vtt

67.4 KB

Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.srt

72.8 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.json

2.8 MB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.lrc

66.4 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.srt

76.5 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.text

44.3 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.tsv

57.3 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.txt

67.3 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.eng.vtt

67.3 KB

Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.srt

71.6 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.json

3.3 MB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.lrc

78.3 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.srt

88.0 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.text

57.0 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.tsv

69.6 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.txt

79.1 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.eng.vtt

79.1 KB

Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.srt

87.6 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.json

5.6 MB

Security Compliance Simple Pick 2 Joshua Marpet.eng.lrc

171.2 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.srt

197.1 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.text

82.8 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.tsv

129.4 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.txt

174.2 KB

Security Compliance Simple Pick 2 Joshua Marpet.eng.vtt

174.2 KB

Sentry on the Wall Reid Brosko.eng.json

1.8 MB

Sentry on the Wall Reid Brosko.eng.lrc

45.5 KB

Sentry on the Wall Reid Brosko.eng.srt

50.9 KB

Sentry on the Wall Reid Brosko.eng.text

33.4 KB

Sentry on the Wall Reid Brosko.eng.tsv

40.4 KB

Sentry on the Wall Reid Brosko.eng.txt

45.9 KB

Sentry on the Wall Reid Brosko.eng.vtt

45.9 KB

Sentry on the Wall Reid Brosko.srt

54.8 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.json

2.1 MB

So You've Inherited a Security Department Now What Amanda Berlin.eng.lrc

50.9 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.srt

56.3 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.text

38.9 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.tsv

46.0 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.txt

51.3 KB

So You've Inherited a Security Department Now What Amanda Berlin.eng.vtt

51.3 KB

So You've Inherited a Security Department Now What Amanda Berlin.srt

59.7 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.json

2.2 MB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.lrc

52.3 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.srt

58.8 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.text

37.9 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.tsv

46.3 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.txt

52.8 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.eng.vtt

52.8 KB

Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.srt

61.4 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.json

2.5 MB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.lrc

62.7 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.srt

70.8 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.text

45.1 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.tsv

55.5 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.txt

63.4 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.eng.vtt

63.4 KB

Surreal Paradigms Automotive Culture Crash Dave Schaefer.srt

73.3 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.json

2.7 MB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.lrc

58.5 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.srt

65.0 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.text

44.0 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.tsv

52.5 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.txt

59.0 KB

Threat Modeling for Secure Software Design Robert Hurlbut.eng.vtt

59.0 KB

Threat Modeling for Secure Software Design Robert Hurlbut.srt

69.0 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.json

1.7 MB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.lrc

43.3 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.srt

48.7 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.text

31.4 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.tsv

38.2 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.txt

43.8 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.eng.vtt

43.8 KB

Violating Trust Social Engineering Past and Present Paul Blonsky.srt

48.9 KB

ConVerge 2017/

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.mp4

25.8 MB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.mp4

22.3 MB

CBI Panel.mp4

39.7 MB

Defending The De funded Keith Wilson.mp4

20.1 MB

Fast wins for the defense Justin Herman.mp4

18.6 MB

How Much Security Do You Really Need Wendy Nather.mp4

23.7 MB

How to kick start an application security program Timothy De Block.mp4

30.6 MB

How to Transform Developers into Security People Chris Romeo.mp4

24.9 MB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.mp4

21.7 MB

Misbehaving Networks Daniel Gregory.mp4

24.5 MB

New School Security Combat Mindset Mike Behrmann.mp4

21.7 MB

Practical Security Recommendations from an Incident Responder Matthew Aubert.mp4

11.0 MB

Predicting Exploitability Michael Roytam.mp4

21.6 MB

Prioritize Vulnerability Remediation Amol Sarwate.mp4

23.5 MB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.mp4

35.0 MB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.mp4

26.9 MB

Tarnished Silver Bullets Wolfgang Goerlich.mp4

33.0 MB

That Escalated Quickly Shaun Bertrand.mp4

27.4 MB

The 4 Eyes of Information Security Fernando Montenegro.mp4

15.3 MB

Threat Modeling 101 Matt Clapham.mp4

26.7 MB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.mp4

18.1 MB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.mp4

32.4 MB

You and Your Technical Community David Giard.mp4

15.6 MB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.mp4

27.5 MB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.mp4

14.8 MB

/.../ConVerge 2017 captions/

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.json

2.2 MB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.lrc

47.5 KB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.srt

52.8 KB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.text

36.0 KB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.tsv

42.8 KB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.txt

48.0 KB

A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.eng.vtt

48.0 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.json

2.4 MB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.lrc

51.7 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.srt

56.2 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.text

41.6 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.tsv

47.4 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.txt

52.0 KB

AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.eng.vtt

52.1 KB

CBI Panel.eng.json

2.9 MB

CBI Panel.eng.lrc

71.9 KB

CBI Panel.eng.srt

80.9 KB

CBI Panel.eng.text

52.1 KB

CBI Panel.eng.tsv

63.8 KB

CBI Panel.eng.txt

72.6 KB

CBI Panel.eng.vtt

72.6 KB

Defending The De funded Keith Wilson.eng.json

2.3 MB

Defending The De funded Keith Wilson.eng.lrc

51.6 KB

Defending The De funded Keith Wilson.eng.srt

56.9 KB

Defending The De funded Keith Wilson.eng.text

39.9 KB

Defending The De funded Keith Wilson.eng.tsv

46.7 KB

Defending The De funded Keith Wilson.eng.txt

52.0 KB

Defending The De funded Keith Wilson.eng.vtt

52.1 KB

Fast wins for the defense Justin Herman.eng.json

1.9 MB

Fast wins for the defense Justin Herman.eng.lrc

40.4 KB

Fast wins for the defense Justin Herman.eng.srt

44.4 KB

Fast wins for the defense Justin Herman.eng.text

31.3 KB

Fast wins for the defense Justin Herman.eng.tsv

36.5 KB

Fast wins for the defense Justin Herman.eng.txt

40.7 KB

Fast wins for the defense Justin Herman.eng.vtt

40.7 KB

How Much Security Do You Really Need Wendy Nather.eng.json

1.9 MB

How Much Security Do You Really Need Wendy Nather.eng.lrc

48.1 KB

How Much Security Do You Really Need Wendy Nather.eng.srt

54.1 KB

How Much Security Do You Really Need Wendy Nather.eng.text

35.0 KB

How Much Security Do You Really Need Wendy Nather.eng.tsv

42.6 KB

How Much Security Do You Really Need Wendy Nather.eng.txt

48.6 KB

How Much Security Do You Really Need Wendy Nather.eng.vtt

48.7 KB

How to kick start an application security program Timothy De Block.eng.json

2.9 MB

How to kick start an application security program Timothy De Block.eng.lrc

63.3 KB

How to kick start an application security program Timothy De Block.eng.srt

70.6 KB

How to kick start an application security program Timothy De Block.eng.text

47.3 KB

How to kick start an application security program Timothy De Block.eng.tsv

56.7 KB

How to kick start an application security program Timothy De Block.eng.txt

63.9 KB

How to kick start an application security program Timothy De Block.eng.vtt

63.9 KB

How to Transform Developers into Security People Chris Romeo.eng.json

2.8 MB

How to Transform Developers into Security People Chris Romeo.eng.lrc

60.0 KB

How to Transform Developers into Security People Chris Romeo.eng.srt

65.8 KB

How to Transform Developers into Security People Chris Romeo.eng.text

47.1 KB

How to Transform Developers into Security People Chris Romeo.eng.tsv

54.7 KB

How to Transform Developers into Security People Chris Romeo.eng.txt

60.5 KB

How to Transform Developers into Security People Chris Romeo.eng.vtt

60.5 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.json

2.2 MB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.lrc

51.7 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.srt

57.3 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.text

39.3 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.tsv

46.4 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.txt

52.1 KB

Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.eng.vtt

52.1 KB

Misbehaving Networks Daniel Gregory.eng.json

2.1 MB

Misbehaving Networks Daniel Gregory.eng.lrc

56.8 KB

Misbehaving Networks Daniel Gregory.eng.srt

63.8 KB

Misbehaving Networks Daniel Gregory.eng.text

41.3 KB

Misbehaving Networks Daniel Gregory.eng.tsv

50.3 KB

Misbehaving Networks Daniel Gregory.eng.txt

57.4 KB

Misbehaving Networks Daniel Gregory.eng.vtt

57.4 KB

New School Security Combat Mindset Mike Behrmann.eng.json

1.6 MB

New School Security Combat Mindset Mike Behrmann.eng.lrc

37.5 KB

New School Security Combat Mindset Mike Behrmann.eng.srt

41.3 KB

New School Security Combat Mindset Mike Behrmann.eng.text

29.2 KB

New School Security Combat Mindset Mike Behrmann.eng.tsv

34.0 KB

New School Security Combat Mindset Mike Behrmann.eng.txt

37.9 KB

New School Security Combat Mindset Mike Behrmann.eng.vtt

37.9 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.json

861.8 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.lrc

21.5 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.srt

23.4 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.text

17.2 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.tsv

19.6 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.txt

21.7 KB

Practical Security Recommendations from an Incident Responder Matthew Aubert.eng.vtt

21.7 KB

Predicting Exploitability Michael Roytam.eng.json

2.4 MB

Predicting Exploitability Michael Roytam.eng.lrc

56.8 KB

Predicting Exploitability Michael Roytam.eng.srt

61.8 KB

Predicting Exploitability Michael Roytam.eng.text

45.6 KB

Predicting Exploitability Michael Roytam.eng.tsv

52.2 KB

Predicting Exploitability Michael Roytam.eng.txt

57.2 KB

Predicting Exploitability Michael Roytam.eng.vtt

57.2 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.json

2.1 MB

Prioritize Vulnerability Remediation Amol Sarwate.eng.lrc

45.6 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.srt

49.6 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.text

36.8 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.tsv

41.9 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.txt

46.0 KB

Prioritize Vulnerability Remediation Amol Sarwate.eng.vtt

46.0 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.json

2.5 MB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.lrc

60.8 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.srt

66.7 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.text

48.0 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.tsv

55.5 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.txt

61.3 KB

Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.eng.vtt

61.3 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.json

2.4 MB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.lrc

56.9 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.srt

62.8 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.text

44.1 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.tsv

51.6 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.txt

57.4 KB

Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.eng.vtt

57.4 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.json

3.1 MB

Tarnished Silver Bullets Wolfgang Goerlich.eng.lrc

79.5 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.srt

90.1 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.text

56.3 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.tsv

69.8 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.txt

80.4 KB

Tarnished Silver Bullets Wolfgang Goerlich.eng.vtt

80.4 KB

That Escalated Quickly Shaun Bertrand.eng.json

2.5 MB

That Escalated Quickly Shaun Bertrand.eng.lrc

62.9 KB

That Escalated Quickly Shaun Bertrand.eng.srt

70.3 KB

That Escalated Quickly Shaun Bertrand.eng.text

46.8 KB

That Escalated Quickly Shaun Bertrand.eng.tsv

56.3 KB

That Escalated Quickly Shaun Bertrand.eng.txt

63.6 KB

That Escalated Quickly Shaun Bertrand.eng.vtt

63.6 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.json

1.1 MB

The 4 Eyes of Information Security Fernando Montenegro.eng.lrc

27.0 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.srt

29.7 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.text

20.7 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.tsv

24.2 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.txt

27.2 KB

The 4 Eyes of Information Security Fernando Montenegro.eng.vtt

27.2 KB

Threat Modeling 101 Matt Clapham.eng.json

2.4 MB

Threat Modeling 101 Matt Clapham.eng.lrc

57.6 KB

Threat Modeling 101 Matt Clapham.eng.srt

64.7 KB

Threat Modeling 101 Matt Clapham.eng.text

42.0 KB

Threat Modeling 101 Matt Clapham.eng.tsv

51.1 KB

Threat Modeling 101 Matt Clapham.eng.txt

58.2 KB

Threat Modeling 101 Matt Clapham.eng.vtt

58.2 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.json

1.6 MB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.lrc

34.9 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.srt

37.9 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.text

28.2 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.tsv

32.1 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.txt

35.2 KB

Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.eng.vtt

35.2 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.json

4.0 MB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.lrc

86.0 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.srt

95.0 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.text

66.2 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.tsv

77.8 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.txt

86.7 KB

Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.eng.vtt

86.7 KB

You and Your Technical Community David Giard.eng.json

1.6 MB

You and Your Technical Community David Giard.eng.lrc

39.9 KB

You and Your Technical Community David Giard.eng.srt

45.9 KB

You and Your Technical Community David Giard.eng.text

26.7 KB

You and Your Technical Community David Giard.eng.tsv

34.1 KB

You and Your Technical Community David Giard.eng.txt

40.4 KB

You and Your Technical Community David Giard.eng.vtt

40.4 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.json

2.9 MB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.lrc

72.4 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.srt

82.2 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.text

50.7 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.tsv

63.4 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.txt

73.2 KB

You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.eng.vtt

73.2 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.json

918.4 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.lrc

20.6 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.srt

22.2 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.text

16.9 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.tsv

19.0 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.txt

20.7 KB

You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.eng.vtt

20.7 KB

ConVerge 2018/

All the Bacon How Lesley Knope and Ron Swanson encourage community growth Kevin Jo.mp4

37.3 MB

ATT&CK Like an Adversary for Defense Hardening Steve Motts Christian Kopacsi.mp4

32.9 MB

Automating Web App security in AWS Luther Hill.mp4

22.2 MB

Backdooring With Metadata Itzik Kotler.mp4

25.9 MB

Converge 2018 Opening.mp4

2.2 MB

Cryptocurrency The Internetwide Bug Bounty Program Brian Laskowski.mp4

25.6 MB

DADSEC 102 Richard Cassara.mp4

16.4 MB

DevSecOps Security Testing with CICD Automation Servers Ed Arnold.mp4

14.7 MB

don't Fear the Cloud Secure Solutions at Lower Cost Matt Newell.mp4

23.6 MB

Finding the Money to Run an Effective Security Program Matt Topper.mp4

22.7 MB

Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.mp4

32.4 MB

Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.mp4

34.2 MB

Held Hostage A Ransomware Primer Nick Hyatt.mp4

16.9 MB

How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4

30.1 MB

Prowling Better Penetration Testing J Wolfgang Goerlich.mp4

29.6 MB

Securing ASPNET Core Web Apps Dustin Kingen.mp4

23.3 MB

Server Message Block Worms The gift that keeps on giving Matthew Aubert.mp4

28.1 MB

Social Engineering for the Blue Team Timothy De Block.mp4

32.7 MB

The Emerging Product Security Leader Discipline Matthew Clapham.mp4

25.4 MB

The Things You Should Be Doing Defensively Right Now Joel Cardella.mp4

32.5 MB

Winning the cybers by measuring all the things Jim Beechey.mp4

31.4 MB

/.../ConVerge 2018 captions/

All the Bacon How Lesley Knope and Ron Swanson encourage community growth Kevin Jo.eng.srt

124.2 KB

ATT&CK Like an Adversary for Defense Hardening Steve Motts Christian Kopacsi.eng.srt

147.7 KB

Automating Web App security in AWS Luther Hill.eng.srt

113.7 KB

Backdooring With Metadata Itzik Kotler.eng.srt

90.2 KB

Converge 2018 Opening.eng.srt

10.7 KB

Cryptocurrency The Internetwide Bug Bounty Program Brian Laskowski.eng.srt

104.8 KB

DADSEC 102 Richard Cassara.eng.srt

82.8 KB

DevSecOps Security Testing with CICD Automation Servers Ed Arnold.eng.srt

78.5 KB

don't Fear the Cloud Secure Solutions at Lower Cost Matt Newell.eng.srt

107.7 KB

Finding the Money to Run an Effective Security Program Matt Topper.eng.srt

120.5 KB

Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.eng.srt

147.6 KB

Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.eng.srt

177.0 KB

Held Hostage A Ransomware Primer Nick Hyatt.eng.srt

85.9 KB

How to Conduct a Product Security Test And How it Fits Into the Larger Security St.eng.srt

135.9 KB

Prowling Better Penetration Testing J Wolfgang Goerlich.eng.srt

149.8 KB

Securing ASPNET Core Web Apps Dustin Kingen.eng.srt

119.9 KB

Server Message Block Worms The gift that keeps on giving Matthew Aubert.eng.srt

141.8 KB

Social Engineering for the Blue Team Timothy De Block.eng.srt

138.4 KB

The Emerging Product Security Leader Discipline Matthew Clapham.eng.srt

130.2 KB

The Things You Should Be Doing Defensively Right Now Joel Cardella.eng.srt

171.4 KB

Winning the cybers by measuring all the things Jim Beechey.eng.srt

143.5 KB

ConVerge 2019/

Breaking NBAD and UEBA Detection.mp4

13.9 MB

Corporate Phishing Keeping the Phish in the Water and the Boat Afloat.mp4

20.9 MB

Decomposing Risk What does a Blue Team Stop.mp4

13.6 MB

Design Human centered Security.mp4

19.3 MB

Forensics for the Small to Medium Size Org.mp4

28.5 MB

Honeybotting Extracting Confessions From Client Side Implants.mp4

30.5 MB

Implementing Application Explicit Allow Without Getting Fired.mp4

18.0 MB

Incident Communications 101 - Breaking the Bad News.mp4

23.1 MB

Intelligent Threat Intelligence.mp4

16.9 MB

Red Team Level over 9000.mp4

32.8 MB

Red vs Blue The Untold Chapter.mp4

31.9 MB

Roku Roll Rickrolling all the Rokus.mp4

12.2 MB

The Intelligence Information We Share and How We Share It.mp4

23.3 MB

/.../ConVerge 2019 captions/

Breaking NBAD and UEBA Detection.eng.srt

51.1 KB

Corporate Phishing Keeping the Phish in the Water and the Boat Afloat.eng.srt

99.3 KB

Decomposing Risk What does a Blue Team Stop.eng.srt

66.3 KB

Design Human centered Security.eng.srt

87.4 KB

Forensics for the Small to Medium Size Org.eng.srt

95.3 KB

Honeybotting Extracting Confessions From Client Side Implants.eng.srt

78.1 KB

Implementing Application Explicit Allow Without Getting Fired.eng.srt

92.9 KB

Incident Communications 101 - Breaking the Bad News.eng.srt

82.7 KB

Intelligent Threat Intelligence.eng.srt

103.4 KB

Red Team Level over 9000.eng.srt

57.2 KB

Red vs Blue The Untold Chapter.eng.srt

122.5 KB

Roku Roll Rickrolling all the Rokus.eng.srt

48.0 KB

The Intelligence Information We Share and How We Share It.eng.srt

90.6 KB

 

Total files 904


Copyright © 2026 FileMood.com