FileMood

Download ConVerge

ConVerge

Name

ConVerge

 DOWNLOAD Copy Link

Total Size

9.0 GB

Total Files

169

Hash

C031A1F69BDB66306E44797B0D9611A071164DD5

/ConVerge 2015/

Don-Warnecke-building-the-team-for-a-successful-SOC.mp4

81.2 MB

Track100-Weaving-Security-into-the-SDLC-Bill-Sempf.mp4

73.3 MB

Track101-If-My-CICD-Teams-have-Time-for-Security-So-Does-Yours-Kevin-Poniatowski.mp4

37.0 MB

Track102-Adaptive-Monitoring-and-Detection-for-Todays-Landscape-Jamie-Murdock.mp4

408.3 MB

Track103-Threat-Intelligence-A-Program-Strategy-Approach-Jenn-Black.mp4

55.5 MB

Track104-Cymon-New-Cyber-Monitoring-Tool-Roy-Firestein.mp4

363.7 MB

Track105-Thats-NOT-my-RJ45-Jack-IRL-Networking-for-Humans-Pt-1-Johnny-Xmas.mp4

407.7 MB

Track106-On-Defending-Against-Doxxing-Benjamin-Brown.mp4

414.6 MB

Track107-Hiding-in-the-ShaDOS-Richard-Cassara.mp4

43.1 MB

Track108-Security-Culture-in-Development-Wolfgang-Goerlich.mp4

256.6 MB

Track109-Cracking-and-fixing-REST-services-Bill-Sempf.mp4

51.9 MB

Track110-PVCSec-Live.mp4

112.3 MB

Track111-Clientless-Android-Malware-Control-David-Schwartzberg.mp4

78.4 MB

Track112-who-watches-the-watchers-michael-roytman.mp4

53.1 MB

Track113-How-to-Dress-Like-a-Human-Being-IRL-Networking-for-Humans-Pt-2-Johnny-Xmas.mp4

473.1 MB

Track114-Soft-Skills-for-a-Technical-World-Justin-Herman.mp4

45.9 MB

Track200-The-Domain-Name-System-DNS-Operation-and-Security-Tom-Kopchak.mp4

70.4 MB

Track201-Homebrew-Censorship-Detection-by-Analysis-of-BGP-Data-Zach-Julian.mp4

35.3 MB

Track202-Four-Pillars-Passion-Vision-Communication-Execution-Edgar-Rojas.mp4

63.1 MB

Track203-Excuse-me-while-I-BURP-Steve-Motts.mp4

67.4 MB

Track206-The-Path-Well-Traveled-Common-Mistakes-Encountered-with-SIEM-Nick-Jacob.mp4

61.1 MB

Track209-Adventures-in-Communication-Taming-the-C-Suite-and-Board-Jim-Beechey.mp4

69.0 MB

Track210-Under-the-Unfluence-the-Dark-Side-of-Influence-Ron-Woerner.mp4

81.7 MB

Track211-Application-Security-Awareness-Building-an-Effective-and-Entertaining-Security-Training-Program-Chris-Romeo.mp4

74.5 MB

Track212-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr.mp4

63.2 MB

Track213-Shooting-Phish-in-a-Barrel-and-other-bad-fish-puns-Amanda-Berlin.mp4

63.7 MB

Track214-Process-The-Salvation-of-Incident-Response-Charles-Herring.mp4

57.6 MB

keynote-raphael-mudge-hacking-to-get-caught.mp4

401.9 MB

keynote01-Breaking-in-Bad-Im-the-one-who-doesnt-knock-Jayson-E-Street.mp4

96.9 MB

/ConVerge 2016/

Converge 2016 Intro.mp4

9.0 MB

Converge 2016 Intro.srt

9.2 KB

Hacker00 Violating Trust Social Engineering Past and Present Paul Blonsky.mp4

39.7 MB

Hacker00 Violating Trust Social Engineering Past and Present Paul Blonsky.srt

48.9 KB

Hacker01 Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.mp4

81.4 MB

Hacker01 Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.srt

87.6 KB

Hacker03 Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.mp4

80.6 MB

Hacker03 Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.srt

72.8 KB

Hacker05 Game of Hacks Play Hack and Track Joshua Clark.mp4

74.4 MB

Hacker05 Game of Hacks Play Hack and Track Joshua Clark.srt

63.8 KB

Hacker06 Building a better user Developing a security fluent society Rich Cassara.mp4

37.8 MB

Hacker06 Building a better user Developing a security fluent society Rich Cassara.srt

34.6 KB

Hacker07 Enterprise Class Threat Management Like A Boss Rockie Brockway.mp4

76.7 MB

Hacker07 Enterprise Class Threat Management Like A Boss Rockie Brockway.srt

70.8 KB

Hacker08 Sentry on the Wall Reid Brosko.mp4

58.7 MB

Hacker08 Sentry on the Wall Reid Brosko.srt

54.8 KB

Hacker09 Expanding Your Toolbox the DIY Way Chris Maddalena.mp4

38.5 MB

Hacker09 Expanding Your Toolbox the DIY Way Chris Maddalena.srt

49.3 KB

Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz (2).1549c741-e8d7-4632-983e-eb4e625e54c4.part

210.6 MB

Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.mp4

84.9 MB

Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.srt

49.7 KB

Motown00 So Youve Inherited a Security Department Now What Amanda Berlin.mp4

50.3 MB

Motown00 So Youve Inherited a Security Department Now What Amanda Berlin.srt

59.7 KB

Motown01 AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.mp4

59.7 MB

Motown01 AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.srt

83.9 KB

Motown02 Threat Modeling for Secure Software Design Robert Hurlbut.mp4

57.6 MB

Motown02 Threat Modeling for Secure Software Design Robert Hurlbut.srt

69.0 KB

Motown03 MySQL 57 Security Dave Stokes.mp4

37.4 MB

Motown03 MySQL 57 Security Dave Stokes.srt

38.5 KB

Motown04 Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.mp4

54.6 MB

Motown06 Food Fight J Wolfgang Goerlich.mp4

40.8 MB

Motown06 Food Fight J Wolfgang Goerlich.srt

50.1 KB

Motown07 Maneuvering Management Madness Andrew Hay.mp4

67.9 MB

Motown07 Maneuvering Management Madness Andrew Hay.srt

67.3 KB

Motown08 Surreal Paradigms Automotive Culture Crash Dave Schaefer.mp4

93.4 MB

Motown08 Surreal Paradigms Automotive Culture Crash Dave Schaefer.srt

73.3 KB

Motown09 Haking the Next Generation David Schwartzberg (2).5a37035f-df89-4794-ba79-3343d3f222a4.part

52.0 MB

Motown09 Haking the Next Generation David Schwartzberg.mp4

79.1 MB

Motown09 Haking the Next Generation David Schwartzberg.srt

85.7 KB

Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink (2).e38abc03-4803-401a-bb41-e980d8881102.part

250.4 MB

Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.mp4

68.8 MB

Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.srt

61.4 KB

global00 Keynote 1 Steve Werby.mp4

59.8 MB

global00 Keynote 1 Steve Werby.srt

80.3 KB

global01 Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.mp4

83.0 MB

global01 Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.srt

71.6 KB

/ConVerge 2017/

Converge 2017 100 You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.mp4

68.4 MB

Converge 2017 100 You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.srt

158.9 KB

Converge 2017 102 Prioritize Vulnerability Remediation Amol Sarwate.mp4

40.8 MB

Converge 2017 102 Prioritize Vulnerability Remediation Amol Sarwate.srt

112.7 KB

Converge 2017 103 That Escalated Quickly Shaun Bertrand.mp4

65.6 MB

Converge 2017 103 That Escalated Quickly Shaun Bertrand.srt

145.8 KB

Converge 2017 104 Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.mp4

43.3 MB

Converge 2017 104 Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.srt

90.6 KB

Converge 2017 105 Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.mp4

188.7 MB

Converge 2017 105 Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.srt

149.5 KB

Converge 2017 106 How to Transform Developers into Security People Chris Romeo.mp4

58.9 MB

Converge 2017 106 How to Transform Developers into Security People Chris Romeo.srt

151.9 KB

Converge 2017 107 Predicting Exploitability Michael Roytam.mp4

38.2 MB

Converge 2017 107 Predicting Exploitability Michael Roytam.srt

139.0 KB

Converge 2017 108 How Much Security Do You Really Need Wendy Nather.mp4

35.1 MB

Converge 2017 108 How Much Security Do You Really Need Wendy Nather.srt

110.8 KB

Converge 2017 110 A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.mp4

36.1 MB

Converge 2017 110 A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.srt

109.4 KB

Converge 2017 111 The 4 Eyes of Information Security Fernando Montenegro.mp4

23.0 MB

Converge 2017 111 The 4 Eyes of Information Security Fernando Montenegro.srt

66.3 KB

Converge 2017 112 You and Your Technical Community David Giard.mp4

22.5 MB

Converge 2017 112 You and Your Technical Community David Giard.srt

84.1 KB

Converge 2017 113 CBI Panel.mp4

211.1 MB

Converge 2017 113 CBI Panel.srt

169.0 KB

Converge 2017 114 Misbehaving Networks Daniel Gregory.mp4

64.0 MB

Converge 2017 114 Misbehaving Networks Daniel Gregory.srt

133.1 KB

Converge 2017 115 New School Security Combat Mindset Mike Behrmann.mp4

60.2 MB

Converge 2017 115 New School Security Combat Mindset Mike Behrmann.srt

90.1 KB

Converge 2017 200 Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.mp4

70.7 MB

Converge 2017 200 Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.srt

205.5 KB

Converge 2017 201 Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.mp4

63.8 MB

Converge 2017 201 Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.srt

138.4 KB

Converge 2017 202 How to kick start an application security program Timothy De Block.mp4

75.2 MB

Converge 2017 202 How to kick start an application security program Timothy De Block.srt

149.3 KB

Converge 2017 203 Threat Modeling 101 Matt Clapham.mp4

62.4 MB

Converge 2017 203 Threat Modeling 101 Matt Clapham.srt

130.0 KB

Converge 2017 204 Defending The De funded Keith Wilson.mp4

46.9 MB

Converge 2017 204 Defending The De funded Keith Wilson.srt

124.5 KB

Converge 2017 205 You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.mp4

34.3 MB

Converge 2017 205 You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.srt

54.2 KB

Converge 2017 206 Fast wins for the defense Justin Herman.mp4

41.6 MB

Converge 2017 206 Fast wins for the defense Justin Herman.srt

99.6 KB

Converge 2017 207 Tarnished Silver Bullets Wolfgang Goerlich.mp4

45.0 MB

Converge 2017 207 Tarnished Silver Bullets Wolfgang Goerlich.srt

172.1 KB

Converge 2017 208 AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.mp4

31.4 MB

Converge 2017 208 AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.srt

132.9 KB

Converge 2017 209 Practical Security Recommendations from an Incident Responder Matthew Aubert.mp4

13.7 MB

Converge 2017 209 Practical Security Recommendations from an Incident Responder Matthew Aubert.srt

53.9 KB

Converge 2017 211 Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.mp4

51.7 MB

Converge 2017 211 Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.srt

123.0 KB

/ConVerge 2018/

ConVerge 2018 100 Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.mp4

74.4 MB

ConVerge 2018 101 Winning the cybers by measuring all the things Jim Beechey.mp4

76.0 MB

ConVerge 2018 103 Dont Fear the Cloud Secure Solutions at Lower Cost Matt Newell.mp4

54.8 MB

ConVerge 2018 104 DevSecOps Security Testing with CICD Automation Servers Ed Arnold.mp4

33.1 MB

ConVerge 2018 105 Securing ASPNET Core Web Apps Dustin Kingen.mp4

50.8 MB

ConVerge 2018 106 All the Bacon How Lesley Knope and Ron Swanson encourage community growth Kevin Jo.mp4

112.5 MB

ConVerge 2018 107 ATT&CK Like an Adversary for Defense Hardening Steve Motts Christian Kopacsi.mp4

89.2 MB

ConVerge 2018 108 DADSEC 102 Richard Cassara.mp4

43.3 MB

ConVerge 2018 109 Held Hostage A Ransomware Primer Nick Hyatt.mp4

44.3 MB

ConVerge 2018 110 Automating Web App security in AWS Luther Hill.mp4

63.5 MB

ConVerge 2018 111 Finding the Money to Run an Effective Security Program Matt Topper.mp4

61.8 MB

ConVerge 2018 200 Social Engineering for the Blue Team Timothy De Block.mp4

101.0 MB

ConVerge 2018 201 The Emerging Product Security Leader Discipline Matthew Clapham.mp4

78.5 MB

ConVerge 2018 202 Server Message Block Worms The gift that keeps on giving Matthew Aubert.mp4

88.6 MB

ConVerge 2018 203 Backdooring With Metadata Itzik Kotler.mp4

85.7 MB

ConVerge 2018 204 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.mp4

100.8 MB

ConVerge 2018 206 The Things You Should Be Doing Defensively Right Now Joel Cardella.mp4

86.0 MB

ConVerge 2018 207 Prowling Better Penetration Testing J Wolfgang Goerlich.mp4

77.3 MB

ConVerge 2018 208 Cryptocurrency The Internetwide Bug Bounty Program Brian Laskowski.mp4

63.8 MB

ConVerge 2018 209 Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.mp4

83.4 MB

ConVerge 2018 Opening.mp4

5.3 MB

Converge 2018 100 Hackers Hugs Drugs Mental Health in Infosec Amanda Berlin.en.transcribed.srt

147.6 KB

Converge 2018 101 Winning the cybers by measuring all the things Jim Beechey.en.transcribed.srt

143.5 KB

Converge 2018 103 Dont Fear the Cloud Secure Solutions at Lower Cost Matt Newell.en.transcribed.srt

107.7 KB

Converge 2018 104 DevSecOps Security Testing with CICD Automation Servers Ed Arnold.en.transcribed.srt

78.5 KB

Converge 2018 105 Securing ASPNET Core Web Apps Dustin Kingen.en.transcribed.srt

119.9 KB

Converge 2018 106 All the Bacon How Lesley Knope and Ron Swanson encourage community growth Kevin Jo.en.transcribed.srt

124.2 KB

Converge 2018 107 ATT&CK Like an Adversary for Defense Hardening Steve Motts Christian Kopacsi.en.transcribed.srt

147.7 KB

Converge 2018 108 DADSEC 102 Richard Cassara.en.transcribed.srt

82.8 KB

Converge 2018 109 Held Hostage A Ransomware Primer Nick Hyatt.en.transcribed.srt

85.9 KB

Converge 2018 110 Automating Web App security in AWS Luther Hill.en.transcribed.srt

113.7 KB

Converge 2018 111 Finding the Money to Run an Effective Security Program Matt Topper.en.transcribed.srt

120.5 KB

Converge 2018 200 Social Engineering for the Blue Team Timothy De Block.en.transcribed.srt

138.4 KB

Converge 2018 201 The Emerging Product Security Leader Discipline Matthew Clapham.en.transcribed.srt

130.2 KB

Converge 2018 202 Server Message Block Worms The gift that keeps on giving Matthew Aubert.en.transcribed.srt

141.8 KB

Converge 2018 203 Backdooring With Metadata Itzik Kotler.en.transcribed.srt

90.2 KB

Converge 2018 204 How to Conduct a Product Security Test And How it Fits Into the Larger Security St.en.transcribed.srt

135.9 KB

Converge 2018 206 The Things You Should Be Doing Defensively Right Now Joel Cardella.en.transcribed.srt

171.4 KB

Converge 2018 207 Prowling Better Penetration Testing J Wolfgang Goerlich.en.transcribed.srt

149.8 KB

Converge 2018 208 Cryptocurrency The Internetwide Bug Bounty Program Brian Laskowski.en.transcribed.srt

104.8 KB

Converge 2018 209 Hacking Identity A Pen Testers Guide to IAM Jerod Brennen.en.transcribed.srt

177.0 KB

Converge 2018 Opening.en.transcribed.srt

10.7 KB

/

ConVerge Logo.png

8.0 KB

ConVerge thank you.txt

0.6 KB

 

Total files 169


Copyright © 2024 FileMood.com