FileMood

Download GRIMMCon

GRIMMCon

Name

GRIMMCon

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

5.5 GB

Total Files

220

Hash

0520FE4C111BD9E5EECBCDD67175E8D05C3E904A

/

GRIMMCon logo.jpg

2.7 KB

GRIMMCon thank you.txt

1.0 KB

/GRIMMCon 0x1/

GRIMMCon 0x1 Experts - Alyssa Miller Stealing Reality - Exploiting the Human Element with Deep Fakes.mp4

35.0 MB

GRIMMCon 0x1 Experts - Casey Ellis - disclose.io - Taking the Internets Immune System to the Next Level.mp4

42.6 MB

GRIMMCon 0x1 Experts - David Kennedy - Closing Keynote - Finding the Calm In the Storm.mp4

61.6 MB

GRIMMCon 0x1 Experts - Gabrielle Hempel - Outbreak Virus vs. Virus.mp4

34.4 MB

GRIMMCon 0x1 Experts - Harri Hursti - Current State and Future of Elections, With or Without Corona.mp4

132.2 MB

GRIMMCon 0x1 Experts - Ian Tabor - From an IVI in a box to a CAR in a box.mp4

49.2 MB

GRIMMCon 0x1 Experts - Keynote - Tarah Wheeler - Always Fail The First Time.mp4

80.5 MB

GRIMMCon 0x1 Experts - Wendy Nather - What CISOs Wish They Could Say Out Loud.mp4

43.4 MB

GRIMMCon 0x1 Experts - Xena Olsen - Adversary Detection Pipelines Finally Making Your Threat Intel Useful.mp4

57.9 MB

GRIMMCon 0x1 Experts - ʝօɦռռʏ Ӽʍǟֆ - The Maker Response to the US COVID-19 Pandemic.mp4

101.0 MB

GRIMMCon 0x1 New Speakers - Alexandre Blanc - The cyber threat landscape is after your accounts.mp4

47.5 MB

GRIMMCon 0x1 New Speakers - Angela Marafino - Harry Potter and the Career of Secrets.mp4

32.8 MB

GRIMMCon 0x1 New Speakers - David Kennedy - Closing Keynote - Finding the Calm In the Storm.mp4

61.6 MB

GRIMMCon 0x1 New Speakers - Jeffball - Analyzing SUID Binaries - VMWare Fusion.mp4

26.2 MB

GRIMMCon 0x1 New Speakers - John JT Thomas - Threat Modeling 101.mp4

24.3 MB

GRIMMCon 0x1 New Speakers - Johnny Ciocca Password Vaults and (Dead Routers).mp4

26.8 MB

GRIMMCon 0x1 New Speakers - Kamel Ghali - Bluetooth and why we need more people studying it.mp4

34.1 MB

GRIMMCon 0x1 New Speakers - Keynote - Tarah Wheeler - Always Fail The First Time.mp4

80.5 MB

GRIMMCon 0x1 New Speakers - Konstantin Klinger - Passive DNS for Threat Detection & Hunting.mp4

32.5 MB

GRIMMCon 0x1 New Speakers - Mike Forgione Increasing efficiency of threat intelligence collection.mp4

53.0 MB

GRIMMCon 0x1 New Speakers - Nicole Hoffman - Applying Fraud Detection Techniques to Hunt Adversaries.mp4

29.8 MB

GRIMMCon 0x1 New Speakers - Wade Wells - Mapping your network to Mitre ATT&CK.mp4

44.9 MB

/GRIMMCon 0x2/

GRIMMCon 0x2 Experts - Chloe Messdaghi - The Act of Balance.mp4

65.0 MB

GRIMMCon 0x2 Experts - Closing CISO Panel with Shawn M Bowen, Brett Conlon, Matt Conner, and Brian M DeMuth.mp4

71.3 MB

GRIMMCon 0x2 Experts - Dave Mayer - Almost Free Adversary Emulation.mp4

31.5 MB

GRIMMCon 0x2 Experts - Jaime William - Technical lessons from emulating adversaries.mp4

99.0 MB

GRIMMCon 0x2 Experts - Jeffball - Embbed Device ROP Tips and tricks Netgear.mp4

42.3 MB

GRIMMCon 0x2 Experts - John Hammond & Caleb Stewart - Pwncat.mp4

67.6 MB

GRIMMCon 0x2 Experts - Jorge Orchilles - Purple Team Exercises.mp4

57.2 MB

GRIMMCon 0x2 Experts - Mike Gualtieri - Live off the Land & Crack the NTLMSSP Protocol.mp4

64.6 MB

GRIMMCon 0x2 Experts - Oshea Bownes - Pushing the SOC left to achieve Nash Equilibrium.mp4

67.0 MB

GRIMMCon 0X2 Experts - Sherrod DeGrippo - Threat Actor Galaxy Brain.mp4

41.9 MB

GRIMMCon 0x2 New Speakers - Apruv Singh Gautam - Threat hunting on the DarkWeb.mp4

36.1 MB

GRIMMCon 0x2 New Speakers - Cynthia Moore - Social Butterflies.mp4

58.2 MB

GRIMMCon 0x2 New Speakers - Joe Brinkley (TheBlindHacker) - CyberPhunk2020 How to kick off your Cyber Journey.mp4

42.0 MB

GRIMMCon 0x2 New Speakers - John Foster - PKI & US.mp4

52.2 MB

GRIMMCon 0x2 New Speakers - Josh Corman - Advice I wish I had gotten.mp4

44.6 MB

GRIMMCon 0x2 New Speakers - Keith Chapman - Inciting the Imagination How we can help students see their future.eng.srt

60.6 KB

GRIMMCon 0x2 New Speakers - Keith Chapman - Inciting the Imagination How we can help students see their future.mp4

34.0 MB

GRIMMCon 0x2 New Speakers - Lauren Rogers - How to build a SOC in reality.mp4

38.9 MB

GRIMMCon 0x2 New Speakers - Nicole Hoffman - ATT&CK on the C Suite Cheat Codes.mp4

79.7 MB

GRIMMCon 0x2 New Speakers - Richard Scott - The Noobs Guide to Virtual Box.mp4

29.7 MB

/GRIMMCon 0x3/

Blake Regan - Limiting Admin User Risk in a Windows Environment and Other Tips.eng.srt

90.0 KB

Blake Regan - Limiting Admin User Risk in a Windows Environment and Other Tips.mp4

46.5 MB

Carey Lening - Privacy Shield is Dead Using Technology to Make the Lawyers Happy.eng.srt

87.6 KB

Carey Lening - Privacy Shield is Dead Using Technology to Make the Lawyers Happy.mp4

35.1 MB

Catherine Ullman - Incident Communications 101 Breaking the Bad News.eng.srt

94.2 KB

Catherine Ullman - Incident Communications 101 Breaking the Bad News.mp4

44.5 MB

Christopher Lopez - Asking Questions and Writing Effectively.eng.srt

104.9 KB

Christopher Lopez - Asking Questions and Writing Effectively.mp4

27.2 MB

Johnny Xmas - Urban Exploration A COVID-friendly Hacker Hobby.eng.srt

94.8 KB

Johnny Xmas - Urban Exploration A COVID-friendly Hacker Hobby.mp4

81.3 MB

Juan Spinel - GDPR Strategies for Failure.eng.srt

60.7 KB

Juan Spinel - GDPR Strategies for Failure.mp4

23.3 MB

Kamel - Bluetooth as a Rising Concern in Automotive Security.eng.srt

79.5 KB

Kamel - Bluetooth as a Rising Concern in Automotive Security.mp4

39.6 MB

Konstantin Klinger - Identifying Malware Analysis Using Bloom Filters and DGArchive.mp4

24.8 MB

Maggie Morganti - Hoe the Planet Not Your Mama's Social Engineering Talk.eng.srt

100.2 KB

Maggie Morganti - Hoe the Planet Not Your Mama's Social Engineering Talk.mp4

52.7 MB

Nathan Chung - Neurodiversity in Cybersecurity.eng.srt

38.2 KB

Nathan Chung - Neurodiversity in Cybersecurity.mp4

19.1 MB

Nicole Hoffman - The Cognitive Stairways of Analysis.eng.srt

88.9 KB

Nicole Hoffman - The Cognitive Stairways of Analysis.mp4

37.7 MB

Nina Jones - Phishing and Social Engineering, 101.eng.srt

69.0 KB

Nina Jones - Phishing and Social Engineering, 101.mp4

29.9 MB

Oscar Delgado - Unit Operations for ICS Security Professionals (One big and expensive - Lego ).eng.srt

43.7 KB

Oscar Delgado - Unit Operations for ICS Security Professionals (One big and expensive - Lego ).mp4

19.5 MB

Sounil Yu - Opening Keynote - How to Delay Building a Skynet.eng.srt

88.5 KB

Sounil Yu - Opening Keynote - How to Delay Building a Skynet.mp4

39.5 MB

Stephen Mondiguing - How to Learn Malware Analysis Without Breaking the Bank.mp4

22.9 MB

/GRIMMCon 0x4/

APT ATT&CK Emulation.eng.srt

56.4 KB

APT ATT&CK Emulation.mp4

34.7 MB

Blood in the Wires How the Tech Industry Fails Humanity.eng.srt

85.2 KB

Blood in the Wires How the Tech Industry Fails Humanity.mp4

41.5 MB

Bringing Critical D&D Skills to the Workplace.eng.srt

93.5 KB

Bringing Critical D&D Skills to the Workplace.mp4

71.5 MB

Building an Effective Red Team.eng.srt

99.1 KB

Building an Effective Red Team.mp4

40.5 MB

Design Thinking for Blue Teams.eng.srt

74.2 KB

Design Thinking for Blue Teams.mp4

41.2 MB

Electronify Your Objective C.eng.srt

65.3 KB

Electronify Your Objective C.mp4

30.1 MB

Emulating Supply Chain Attacks with Assume Breach.eng.srt

55.0 KB

Emulating Supply Chain Attacks with Assume Breach.mp4

25.7 MB

Exploiting COM with Microsoft Word.eng.srt

77.0 KB

Exploiting COM with Microsoft Word.mp4

49.0 MB

Funtastic Packers and Where To Find Them.eng.srt

46.5 KB

Funtastic Packers and Where To Find Them.mp4

38.7 MB

Intro to Hardware Hacking with a DRM'ed LED Therapy Mask.eng.srt

58.0 KB

Intro to Hardware Hacking with a DRM'ed LED Therapy Mask.mp4

26.9 MB

It's Broke, Let's Fix It.eng.srt

90.6 KB

It's Broke, Let's Fix It.mp4

35.3 MB

Know Thy Enemy - Know Thyself.eng.srt

85.6 KB

Know Thy Enemy - Know Thyself.mp4

55.7 MB

Kubernetes Security 101 Best Practices to Secure Your Cluster.eng.srt

72.9 KB

Kubernetes Security 101 Best Practices to Secure Your Cluster.mp4

42.1 MB

Opening (with Ron Gula).eng.srt

15.5 KB

Opening (with Ron Gula).mp4

13.0 MB

OSINT for Beginners.eng.srt

73.2 KB

OSINT for Beginners.mp4

32.4 MB

Repo Jacking How Github Usernames Expose 70k OSS Projects To Remote Code Injection.eng.srt

80.7 KB

Repo Jacking How Github Usernames Expose 70k OSS Projects To Remote Code Injection.mp4

23.9 MB

Speak Impact.eng.srt

57.4 KB

Speak Impact.mp4

17.0 MB

The Future is Humans, Not Machines.eng.srt

58.5 KB

The Future is Humans, Not Machines.mp4

23.4 MB

Uncovering Lazarus Group's Operation 'Dream Job'.mp4

22.5 MB

What to Expect When You're Expecting a Pentest.eng.srt

61.8 KB

What to Expect When You're Expecting a Pentest.mp4

20.1 MB

/GRIMMCon 0x5/

Adopt purple team strategy to augment Application Security - Trupti Shiralkar.eng.srt

89.5 KB

Adopt purple team strategy to augment Application Security - Trupti Shiralkar.mp4

48.7 MB

Bad legislation for Critical infrastructure Security - Keenan Skelly.eng.srt

81.1 KB

Bad legislation for Critical infrastructure Security - Keenan Skelly.mp4

47.7 MB

Closing Keynote - The FAIL Horsemen.eng.srt

106.1 KB

Closing Keynote - The FAIL Horsemen.mp4

90.3 MB

Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.eng.srt

74.7 KB

Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.mp4

33.6 MB

How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.eng.srt

59.6 KB

How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.mp4

32.1 MB

IPv6Does size matter - Anastasiia Mytrofanovska.eng.srt

63.3 KB

IPv6Does size matter - Anastasiia Mytrofanovska.mp4

31.5 MB

Jinkies this Email looks Suspicious - Nicole Hoffman.eng.srt

67.6 KB

Jinkies this Email looks Suspicious - Nicole Hoffman.mp4

32.9 MB

Notable ICS Cybersecurity Events - Jason Allnut.eng.srt

77.7 KB

Notable ICS Cybersecurity Events - Jason Allnut.mp4

41.1 MB

Opening Keynote - Tatyana Bolton.eng.srt

69.7 KB

Opening Keynote - Tatyana Bolton.mp4

59.4 MB

Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.eng.srt

94.2 KB

Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.mp4

43.3 MB

Side Hustles Your Entry Into Tech - Elyse Y. Robinson.eng.srt

33.3 KB

Side Hustles Your Entry Into Tech - Elyse Y. Robinson.mp4

27.9 MB

Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.eng.srt

67.2 KB

Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.mp4

42.0 MB

Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.eng.srt

80.2 KB

Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.mp4

42.8 MB

Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.eng.srt

88.4 KB

Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.mp4

52.5 MB

When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.eng.srt

34.3 KB

When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.mp4

17.4 MB

Zero Trust Model Impostors Among us - Sarthak Taneja.eng.srt

47.8 KB

Zero Trust Model Impostors Among us - Sarthak Taneja.mp4

19.4 MB

/GRIMMCon 0x6/

Bryan Bradford I want all the DATA Why death by logging and alerts is bad.eng.srt

45.8 KB

Bryan Bradford I want all the DATA Why death by logging and alerts is bad.mp4

22.6 MB

Daniel Borges - Keyloggers on Major Operating Systems (Windows, Linux, macOS).eng.srt

48.0 KB

Daniel Borges - Keyloggers on Major Operating Systems (Windows, Linux, macOS).mp4

17.6 MB

Dawnlight - A Beginner’s Guide to Hacking Your Cybersecurity Career.eng.srt

46.2 KB

Dawnlight - A Beginner’s Guide to Hacking Your Cybersecurity Career.mp4

17.4 MB

Elaine Harrison-Neukirch - Fun with MITRE ATT&CK and NIST 800-53.eng.srt

52.7 KB

Elaine Harrison-Neukirch - Fun with MITRE ATT&CK and NIST 800-53.mp4

36.3 MB

Hise Gibson - Building Agile Tech Organizations (Keynote).eng.srt

35.8 KB

Hise Gibson - Building Agile Tech Organizations (Keynote).mp4

18.0 MB

Ian Tabor - Value pasta auto how I built it and saved $28000.eng.srt

56.2 KB

Ian Tabor - Value pasta auto how I built it and saved $28000.mp4

29.7 MB

Jorge Orchilles - The State of C2 with the C2 Matrix.eng.srt

76.4 KB

Jorge Orchilles - The State of C2 with the C2 Matrix.mp4

44.5 MB

Keenan Skelly - Bad Legislation turned Good (Part 2) CISA FTW.eng.srt

61.0 KB

Keenan Skelly - Bad Legislation turned Good (Part 2) CISA FTW.mp4

31.3 MB

Marie Williams - Pivoting In Life Making Lateral Movements.eng.srt

48.1 KB

Marie Williams - Pivoting In Life Making Lateral Movements.mp4

19.4 MB

Nikki Robinson - Using Behavioral Analysis Techniques to Improve Security.eng.srt

68.4 KB

Nikki Robinson - Using Behavioral Analysis Techniques to Improve Security.mp4

30.3 MB

Paul Cummings - Building a Whole Cyber Human Candidate.eng.srt

60.7 KB

Paul Cummings - Building a Whole Cyber Human Candidate.mp4

34.0 MB

Sean McKeever - Teaching Kids to Hack.eng.srt

39.7 KB

Sean McKeever - Teaching Kids to Hack.mp4

24.3 MB

Teresa Rothaar - What Is a Cybersecurity Copywriter, Anyway.eng.srt

42.5 KB

Teresa Rothaar - What Is a Cybersecurity Copywriter, Anyway.mp4

23.5 MB

Thomas Somerville - CTI for the Rest of Us.eng.srt

54.6 KB

Thomas Somerville - CTI for the Rest of Us.mp4

26.4 MB

Tim Medin - Access Still Granted.eng.srt

55.6 KB

Tim Medin - Access Still Granted.mp4

56.0 MB

Vivek Ponnada - Who's on the losing end of Ransomware Not OT..eng.srt

67.0 KB

Vivek Ponnada - Who's on the losing end of Ransomware Not OT.mp4

23.6 MB

Wolfgang Goerlich - Shall We Play a Game.eng.srt

71.1 KB

Wolfgang Goerlich - Shall We Play a Game.mp4

28.0 MB

/GRIMMCon 0x7/

Amanda Berlin - Detecting Finishing Move before it's Game Over Mortal Kombat Style.eng.srt

95.0 KB

Amanda Berlin - Detecting Finishing Move before it's Game Over Mortal Kombat Style.mp4

63.7 MB

Ell Marquez and Jon Roberts - The Fallacy of DevSecOps.eng.srt

88.8 KB

Ell Marquez and Jon Roberts - The Fallacy of DevSecOps.mp4

41.7 MB

GRIMMCon 0x7 Keynote - Tanya Janca - Build Secure Software, Like a Boss.eng.srt

94.4 KB

GRIMMCon 0x7 Keynote - Tanya Janca - Build Secure Software, Like a Boss.mp4

46.3 MB

James Cabe - Why is Critical Infrastructure a Risk at all.eng.srt

85.9 KB

James Cabe - Why is Critical Infrastructure a Risk at all.mp4

38.8 MB

Neal Ferrano - Russian Cyber is Offensive.eng.srt

61.9 KB

Neal Ferrano - Russian Cyber is Offensive.mp4

36.1 MB

Scott Small - Control Compass Intelligence for Improved Security Validation.eng.srt

57.4 KB

Scott Small - Control Compass Intelligence for Improved Security Validation.mp4

39.6 MB

Sidd Malewar - Dissecting Agent Tesla.eng.srt

49.8 KB

Sidd Malewar - Dissecting Agent Tesla.mp4

22.0 MB

Stephen Semmelroth - Giving It All Away Open Sourcing Security Policies.eng.srt

59.3 KB

Stephen Semmelroth - Giving It All Away Open Sourcing Security Policies.mp4

53.8 MB

Vivek Ponnada - Teaming up to Tackle OT Security.eng.srt

95.0 KB

Vivek Ponnada - Teaming up to Tackle OT Security.mp4

45.5 MB

/GRIMMCon 0x8/

2023 Top Hack How to Manage Change as a Leader.eng.srt

50.1 KB

2023 Top Hack How to Manage Change as a Leader.mp4

33.3 MB

API Hacking Demystified A Technical Overview for Security Professionals.eng.srt

55.0 KB

API Hacking Demystified A Technical Overview for Security Professionals.mp4

29.5 MB

Automotive Security Standards Are Special Just Like Every Other Industry.eng.srt

70.3 KB

Automotive Security Standards Are Special Just Like Every Other Industry.mp4

55.3 MB

Closing Keynote Building and Enabling a Cyber Workforce.eng.srt

39.5 KB

Closing Keynote Building and Enabling a Cyber Workforce.mp4

38.7 MB

Deconstructing Supply Chain Risk.eng.srt

60.3 KB

Deconstructing Supply Chain Risk.mp4

54.2 MB

Finding Windows Privilege Escalation Vulnerabilities with Crassus.eng.srt

74.9 KB

Finding Windows Privilege Escalation Vulnerabilities with Crassus.mp4

64.2 MB

GRIMMCon 0x8 lineup.mp4

2.5 MB

OSINT and the Metadata of Madness.eng.srt

42.0 KB

OSINT and the Metadata of Madness.mp4

41.1 MB

Panel Authentic Allyship in Tech.eng.srt

85.8 KB

Panel Authentic Allyship in Tech.mp4

79.6 MB

Refining Your Offensive Pentest Methodology.eng.srt

41.6 KB

Refining Your Offensive Pentest Methodology.mp4

18.3 MB

Securing the Loop The Importance of the Decision Cycle in Control System Cyber Security.eng.srt

36.3 KB

Securing the Loop The Importance of the Decision Cycle in Control System Cyber Security.mp4

41.7 MB

Taking The Plunge Be a Cyber Startup Founder Too.eng.srt

79.3 KB

Taking The Plunge Be a Cyber Startup Founder Too.mp4

51.3 MB

Workshop Reducing Threat Landscape by Demonizing Adversaries.eng.srt

99.0 KB

Workshop Reducing Threat Landscape by Demonizing Adversaries.mp4

85.0 MB

 

Total files 220


Copyright © 2025 FileMood.com