/
|
GRIMMCon logo.jpg
|
2.7 KB
|
GRIMMCon thank you.txt
|
1.0 KB
|
/GRIMMCon 0x1/
|
GRIMMCon 0x1 Experts - Alyssa Miller Stealing Reality - Exploiting the Human Element with Deep Fakes.mp4
|
35.0 MB
|
GRIMMCon 0x1 Experts - Casey Ellis - disclose.io - Taking the Internets Immune System to the Next Level.mp4
|
42.6 MB
|
GRIMMCon 0x1 Experts - David Kennedy - Closing Keynote - Finding the Calm In the Storm.mp4
|
61.6 MB
|
GRIMMCon 0x1 Experts - Gabrielle Hempel - Outbreak Virus vs. Virus.mp4
|
34.4 MB
|
GRIMMCon 0x1 Experts - Harri Hursti - Current State and Future of Elections, With or Without Corona.mp4
|
132.2 MB
|
GRIMMCon 0x1 Experts - Ian Tabor - From an IVI in a box to a CAR in a box.mp4
|
49.2 MB
|
GRIMMCon 0x1 Experts - Keynote - Tarah Wheeler - Always Fail The First Time.mp4
|
80.5 MB
|
GRIMMCon 0x1 Experts - Wendy Nather - What CISOs Wish They Could Say Out Loud.mp4
|
43.4 MB
|
GRIMMCon 0x1 Experts - Xena Olsen - Adversary Detection Pipelines Finally Making Your Threat Intel Useful.mp4
|
57.9 MB
|
GRIMMCon 0x1 Experts - ʝօɦռռʏ Ӽʍǟֆ - The Maker Response to the US COVID-19 Pandemic.mp4
|
101.0 MB
|
GRIMMCon 0x1 New Speakers - Alexandre Blanc - The cyber threat landscape is after your accounts.mp4
|
47.5 MB
|
GRIMMCon 0x1 New Speakers - Angela Marafino - Harry Potter and the Career of Secrets.mp4
|
32.8 MB
|
GRIMMCon 0x1 New Speakers - David Kennedy - Closing Keynote - Finding the Calm In the Storm.mp4
|
61.6 MB
|
GRIMMCon 0x1 New Speakers - Jeffball - Analyzing SUID Binaries - VMWare Fusion.mp4
|
26.2 MB
|
GRIMMCon 0x1 New Speakers - John JT Thomas - Threat Modeling 101.mp4
|
24.3 MB
|
GRIMMCon 0x1 New Speakers - Johnny Ciocca Password Vaults and (Dead Routers).mp4
|
26.8 MB
|
GRIMMCon 0x1 New Speakers - Kamel Ghali - Bluetooth and why we need more people studying it.mp4
|
34.1 MB
|
GRIMMCon 0x1 New Speakers - Keynote - Tarah Wheeler - Always Fail The First Time.mp4
|
80.5 MB
|
GRIMMCon 0x1 New Speakers - Konstantin Klinger - Passive DNS for Threat Detection & Hunting.mp4
|
32.5 MB
|
GRIMMCon 0x1 New Speakers - Mike Forgione Increasing efficiency of threat intelligence collection.mp4
|
53.0 MB
|
GRIMMCon 0x1 New Speakers - Nicole Hoffman - Applying Fraud Detection Techniques to Hunt Adversaries.mp4
|
29.8 MB
|
GRIMMCon 0x1 New Speakers - Wade Wells - Mapping your network to Mitre ATT&CK.mp4
|
44.9 MB
|
/GRIMMCon 0x2/
|
GRIMMCon 0x2 Experts - Chloe Messdaghi - The Act of Balance.mp4
|
65.0 MB
|
GRIMMCon 0x2 Experts - Closing CISO Panel with Shawn M Bowen, Brett Conlon, Matt Conner, and Brian M DeMuth.mp4
|
71.3 MB
|
GRIMMCon 0x2 Experts - Dave Mayer - Almost Free Adversary Emulation.mp4
|
31.5 MB
|
GRIMMCon 0x2 Experts - Jaime William - Technical lessons from emulating adversaries.mp4
|
99.0 MB
|
GRIMMCon 0x2 Experts - Jeffball - Embbed Device ROP Tips and tricks Netgear.mp4
|
42.3 MB
|
GRIMMCon 0x2 Experts - John Hammond & Caleb Stewart - Pwncat.mp4
|
67.6 MB
|
GRIMMCon 0x2 Experts - Jorge Orchilles - Purple Team Exercises.mp4
|
57.2 MB
|
GRIMMCon 0x2 Experts - Mike Gualtieri - Live off the Land & Crack the NTLMSSP Protocol.mp4
|
64.6 MB
|
GRIMMCon 0x2 Experts - Oshea Bownes - Pushing the SOC left to achieve Nash Equilibrium.mp4
|
67.0 MB
|
GRIMMCon 0X2 Experts - Sherrod DeGrippo - Threat Actor Galaxy Brain.mp4
|
41.9 MB
|
GRIMMCon 0x2 New Speakers - Apruv Singh Gautam - Threat hunting on the DarkWeb.mp4
|
36.1 MB
|
GRIMMCon 0x2 New Speakers - Cynthia Moore - Social Butterflies.mp4
|
58.2 MB
|
GRIMMCon 0x2 New Speakers - Joe Brinkley (TheBlindHacker) - CyberPhunk2020 How to kick off your Cyber Journey.mp4
|
42.0 MB
|
GRIMMCon 0x2 New Speakers - John Foster - PKI & US.mp4
|
52.2 MB
|
GRIMMCon 0x2 New Speakers - Josh Corman - Advice I wish I had gotten.mp4
|
44.6 MB
|
GRIMMCon 0x2 New Speakers - Keith Chapman - Inciting the Imagination How we can help students see their future.eng.srt
|
60.6 KB
|
GRIMMCon 0x2 New Speakers - Keith Chapman - Inciting the Imagination How we can help students see their future.mp4
|
34.0 MB
|
GRIMMCon 0x2 New Speakers - Lauren Rogers - How to build a SOC in reality.mp4
|
38.9 MB
|
GRIMMCon 0x2 New Speakers - Nicole Hoffman - ATT&CK on the C Suite Cheat Codes.mp4
|
79.7 MB
|
GRIMMCon 0x2 New Speakers - Richard Scott - The Noobs Guide to Virtual Box.mp4
|
29.7 MB
|
/GRIMMCon 0x3/
|
Blake Regan - Limiting Admin User Risk in a Windows Environment and Other Tips.eng.srt
|
90.0 KB
|
Blake Regan - Limiting Admin User Risk in a Windows Environment and Other Tips.mp4
|
46.5 MB
|
Carey Lening - Privacy Shield is Dead Using Technology to Make the Lawyers Happy.eng.srt
|
87.6 KB
|
Carey Lening - Privacy Shield is Dead Using Technology to Make the Lawyers Happy.mp4
|
35.1 MB
|
Catherine Ullman - Incident Communications 101 Breaking the Bad News.eng.srt
|
94.2 KB
|
Catherine Ullman - Incident Communications 101 Breaking the Bad News.mp4
|
44.5 MB
|
Christopher Lopez - Asking Questions and Writing Effectively.eng.srt
|
104.9 KB
|
Christopher Lopez - Asking Questions and Writing Effectively.mp4
|
27.2 MB
|
Johnny Xmas - Urban Exploration A COVID-friendly Hacker Hobby.eng.srt
|
94.8 KB
|
Johnny Xmas - Urban Exploration A COVID-friendly Hacker Hobby.mp4
|
81.3 MB
|
Juan Spinel - GDPR Strategies for Failure.eng.srt
|
60.7 KB
|
Juan Spinel - GDPR Strategies for Failure.mp4
|
23.3 MB
|
Kamel - Bluetooth as a Rising Concern in Automotive Security.eng.srt
|
79.5 KB
|
Kamel - Bluetooth as a Rising Concern in Automotive Security.mp4
|
39.6 MB
|
Konstantin Klinger - Identifying Malware Analysis Using Bloom Filters and DGArchive.mp4
|
24.8 MB
|
Maggie Morganti - Hoe the Planet Not Your Mama's Social Engineering Talk.eng.srt
|
100.2 KB
|
Maggie Morganti - Hoe the Planet Not Your Mama's Social Engineering Talk.mp4
|
52.7 MB
|
Nathan Chung - Neurodiversity in Cybersecurity.eng.srt
|
38.2 KB
|
Nathan Chung - Neurodiversity in Cybersecurity.mp4
|
19.1 MB
|
Nicole Hoffman - The Cognitive Stairways of Analysis.eng.srt
|
88.9 KB
|
Nicole Hoffman - The Cognitive Stairways of Analysis.mp4
|
37.7 MB
|
Nina Jones - Phishing and Social Engineering, 101.eng.srt
|
69.0 KB
|
Nina Jones - Phishing and Social Engineering, 101.mp4
|
29.9 MB
|
Oscar Delgado - Unit Operations for ICS Security Professionals (One big and expensive - Lego ).eng.srt
|
43.7 KB
|
Oscar Delgado - Unit Operations for ICS Security Professionals (One big and expensive - Lego ).mp4
|
19.5 MB
|
Sounil Yu - Opening Keynote - How to Delay Building a Skynet.eng.srt
|
88.5 KB
|
Sounil Yu - Opening Keynote - How to Delay Building a Skynet.mp4
|
39.5 MB
|
Stephen Mondiguing - How to Learn Malware Analysis Without Breaking the Bank.mp4
|
22.9 MB
|
/GRIMMCon 0x4/
|
APT ATT&CK Emulation.eng.srt
|
56.4 KB
|
APT ATT&CK Emulation.mp4
|
34.7 MB
|
Blood in the Wires How the Tech Industry Fails Humanity.eng.srt
|
85.2 KB
|
Blood in the Wires How the Tech Industry Fails Humanity.mp4
|
41.5 MB
|
Bringing Critical D&D Skills to the Workplace.eng.srt
|
93.5 KB
|
Bringing Critical D&D Skills to the Workplace.mp4
|
71.5 MB
|
Building an Effective Red Team.eng.srt
|
99.1 KB
|
Building an Effective Red Team.mp4
|
40.5 MB
|
Design Thinking for Blue Teams.eng.srt
|
74.2 KB
|
Design Thinking for Blue Teams.mp4
|
41.2 MB
|
Electronify Your Objective C.eng.srt
|
65.3 KB
|
Electronify Your Objective C.mp4
|
30.1 MB
|
Emulating Supply Chain Attacks with Assume Breach.eng.srt
|
55.0 KB
|
Emulating Supply Chain Attacks with Assume Breach.mp4
|
25.7 MB
|
Exploiting COM with Microsoft Word.eng.srt
|
77.0 KB
|
Exploiting COM with Microsoft Word.mp4
|
49.0 MB
|
Funtastic Packers and Where To Find Them.eng.srt
|
46.5 KB
|
Funtastic Packers and Where To Find Them.mp4
|
38.7 MB
|
Intro to Hardware Hacking with a DRM'ed LED Therapy Mask.eng.srt
|
58.0 KB
|
Intro to Hardware Hacking with a DRM'ed LED Therapy Mask.mp4
|
26.9 MB
|
It's Broke, Let's Fix It.eng.srt
|
90.6 KB
|
It's Broke, Let's Fix It.mp4
|
35.3 MB
|
Know Thy Enemy - Know Thyself.eng.srt
|
85.6 KB
|
Know Thy Enemy - Know Thyself.mp4
|
55.7 MB
|
Kubernetes Security 101 Best Practices to Secure Your Cluster.eng.srt
|
72.9 KB
|
Kubernetes Security 101 Best Practices to Secure Your Cluster.mp4
|
42.1 MB
|
Opening (with Ron Gula).eng.srt
|
15.5 KB
|
Opening (with Ron Gula).mp4
|
13.0 MB
|
OSINT for Beginners.eng.srt
|
73.2 KB
|
OSINT for Beginners.mp4
|
32.4 MB
|
Repo Jacking How Github Usernames Expose 70k OSS Projects To Remote Code Injection.eng.srt
|
80.7 KB
|
Repo Jacking How Github Usernames Expose 70k OSS Projects To Remote Code Injection.mp4
|
23.9 MB
|
Speak Impact.eng.srt
|
57.4 KB
|
Speak Impact.mp4
|
17.0 MB
|
The Future is Humans, Not Machines.eng.srt
|
58.5 KB
|
The Future is Humans, Not Machines.mp4
|
23.4 MB
|
Uncovering Lazarus Group's Operation 'Dream Job'.mp4
|
22.5 MB
|
What to Expect When You're Expecting a Pentest.eng.srt
|
61.8 KB
|
What to Expect When You're Expecting a Pentest.mp4
|
20.1 MB
|
/GRIMMCon 0x5/
|
Adopt purple team strategy to augment Application Security - Trupti Shiralkar.eng.srt
|
89.5 KB
|
Adopt purple team strategy to augment Application Security - Trupti Shiralkar.mp4
|
48.7 MB
|
Bad legislation for Critical infrastructure Security - Keenan Skelly.eng.srt
|
81.1 KB
|
Bad legislation for Critical infrastructure Security - Keenan Skelly.mp4
|
47.7 MB
|
Closing Keynote - The FAIL Horsemen.eng.srt
|
106.1 KB
|
Closing Keynote - The FAIL Horsemen.mp4
|
90.3 MB
|
Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.eng.srt
|
74.7 KB
|
Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.mp4
|
33.6 MB
|
How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.eng.srt
|
59.6 KB
|
How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.mp4
|
32.1 MB
|
IPv6Does size matter - Anastasiia Mytrofanovska.eng.srt
|
63.3 KB
|
IPv6Does size matter - Anastasiia Mytrofanovska.mp4
|
31.5 MB
|
Jinkies this Email looks Suspicious - Nicole Hoffman.eng.srt
|
67.6 KB
|
Jinkies this Email looks Suspicious - Nicole Hoffman.mp4
|
32.9 MB
|
Notable ICS Cybersecurity Events - Jason Allnut.eng.srt
|
77.7 KB
|
Notable ICS Cybersecurity Events - Jason Allnut.mp4
|
41.1 MB
|
Opening Keynote - Tatyana Bolton.eng.srt
|
69.7 KB
|
Opening Keynote - Tatyana Bolton.mp4
|
59.4 MB
|
Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.eng.srt
|
94.2 KB
|
Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.mp4
|
43.3 MB
|
Side Hustles Your Entry Into Tech - Elyse Y. Robinson.eng.srt
|
33.3 KB
|
Side Hustles Your Entry Into Tech - Elyse Y. Robinson.mp4
|
27.9 MB
|
Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.eng.srt
|
67.2 KB
|
Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.mp4
|
42.0 MB
|
Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.eng.srt
|
80.2 KB
|
Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.mp4
|
42.8 MB
|
Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.eng.srt
|
88.4 KB
|
Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.mp4
|
52.5 MB
|
When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.eng.srt
|
34.3 KB
|
When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.mp4
|
17.4 MB
|
Zero Trust Model Impostors Among us - Sarthak Taneja.eng.srt
|
47.8 KB
|
Zero Trust Model Impostors Among us - Sarthak Taneja.mp4
|
19.4 MB
|
/GRIMMCon 0x6/
|
Bryan Bradford I want all the DATA Why death by logging and alerts is bad.eng.srt
|
45.8 KB
|
Bryan Bradford I want all the DATA Why death by logging and alerts is bad.mp4
|
22.6 MB
|
Daniel Borges - Keyloggers on Major Operating Systems (Windows, Linux, macOS).eng.srt
|
48.0 KB
|
Daniel Borges - Keyloggers on Major Operating Systems (Windows, Linux, macOS).mp4
|
17.6 MB
|
Dawnlight - A Beginner’s Guide to Hacking Your Cybersecurity Career.eng.srt
|
46.2 KB
|
Dawnlight - A Beginner’s Guide to Hacking Your Cybersecurity Career.mp4
|
17.4 MB
|
Elaine Harrison-Neukirch - Fun with MITRE ATT&CK and NIST 800-53.eng.srt
|
52.7 KB
|
Elaine Harrison-Neukirch - Fun with MITRE ATT&CK and NIST 800-53.mp4
|
36.3 MB
|
Hise Gibson - Building Agile Tech Organizations (Keynote).eng.srt
|
35.8 KB
|
Hise Gibson - Building Agile Tech Organizations (Keynote).mp4
|
18.0 MB
|
Ian Tabor - Value pasta auto how I built it and saved $28000.eng.srt
|
56.2 KB
|
Ian Tabor - Value pasta auto how I built it and saved $28000.mp4
|
29.7 MB
|
Jorge Orchilles - The State of C2 with the C2 Matrix.eng.srt
|
76.4 KB
|
Jorge Orchilles - The State of C2 with the C2 Matrix.mp4
|
44.5 MB
|
Keenan Skelly - Bad Legislation turned Good (Part 2) CISA FTW.eng.srt
|
61.0 KB
|
Keenan Skelly - Bad Legislation turned Good (Part 2) CISA FTW.mp4
|
31.3 MB
|
Marie Williams - Pivoting In Life Making Lateral Movements.eng.srt
|
48.1 KB
|
Marie Williams - Pivoting In Life Making Lateral Movements.mp4
|
19.4 MB
|
Nikki Robinson - Using Behavioral Analysis Techniques to Improve Security.eng.srt
|
68.4 KB
|
Nikki Robinson - Using Behavioral Analysis Techniques to Improve Security.mp4
|
30.3 MB
|
Paul Cummings - Building a Whole Cyber Human Candidate.eng.srt
|
60.7 KB
|
Paul Cummings - Building a Whole Cyber Human Candidate.mp4
|
34.0 MB
|
Sean McKeever - Teaching Kids to Hack.eng.srt
|
39.7 KB
|
Sean McKeever - Teaching Kids to Hack.mp4
|
24.3 MB
|
Teresa Rothaar - What Is a Cybersecurity Copywriter, Anyway.eng.srt
|
42.5 KB
|
Teresa Rothaar - What Is a Cybersecurity Copywriter, Anyway.mp4
|
23.5 MB
|
Thomas Somerville - CTI for the Rest of Us.eng.srt
|
54.6 KB
|
Thomas Somerville - CTI for the Rest of Us.mp4
|
26.4 MB
|
Tim Medin - Access Still Granted.eng.srt
|
55.6 KB
|
Tim Medin - Access Still Granted.mp4
|
56.0 MB
|
Vivek Ponnada - Who's on the losing end of Ransomware Not OT..eng.srt
|
67.0 KB
|
Vivek Ponnada - Who's on the losing end of Ransomware Not OT.mp4
|
23.6 MB
|
Wolfgang Goerlich - Shall We Play a Game.eng.srt
|
71.1 KB
|
Wolfgang Goerlich - Shall We Play a Game.mp4
|
28.0 MB
|
/GRIMMCon 0x7/
|
Amanda Berlin - Detecting Finishing Move before it's Game Over Mortal Kombat Style.eng.srt
|
95.0 KB
|
Amanda Berlin - Detecting Finishing Move before it's Game Over Mortal Kombat Style.mp4
|
63.7 MB
|
Ell Marquez and Jon Roberts - The Fallacy of DevSecOps.eng.srt
|
88.8 KB
|
Ell Marquez and Jon Roberts - The Fallacy of DevSecOps.mp4
|
41.7 MB
|
GRIMMCon 0x7 Keynote - Tanya Janca - Build Secure Software, Like a Boss.eng.srt
|
94.4 KB
|
GRIMMCon 0x7 Keynote - Tanya Janca - Build Secure Software, Like a Boss.mp4
|
46.3 MB
|
James Cabe - Why is Critical Infrastructure a Risk at all.eng.srt
|
85.9 KB
|
James Cabe - Why is Critical Infrastructure a Risk at all.mp4
|
38.8 MB
|
Neal Ferrano - Russian Cyber is Offensive.eng.srt
|
61.9 KB
|
Neal Ferrano - Russian Cyber is Offensive.mp4
|
36.1 MB
|
Scott Small - Control Compass Intelligence for Improved Security Validation.eng.srt
|
57.4 KB
|
Scott Small - Control Compass Intelligence for Improved Security Validation.mp4
|
39.6 MB
|
Sidd Malewar - Dissecting Agent Tesla.eng.srt
|
49.8 KB
|
Sidd Malewar - Dissecting Agent Tesla.mp4
|
22.0 MB
|
Stephen Semmelroth - Giving It All Away Open Sourcing Security Policies.eng.srt
|
59.3 KB
|
Stephen Semmelroth - Giving It All Away Open Sourcing Security Policies.mp4
|
53.8 MB
|
Vivek Ponnada - Teaming up to Tackle OT Security.eng.srt
|
95.0 KB
|
Vivek Ponnada - Teaming up to Tackle OT Security.mp4
|
45.5 MB
|
/GRIMMCon 0x8/
|
2023 Top Hack How to Manage Change as a Leader.eng.srt
|
50.1 KB
|
2023 Top Hack How to Manage Change as a Leader.mp4
|
33.3 MB
|
API Hacking Demystified A Technical Overview for Security Professionals.eng.srt
|
55.0 KB
|
API Hacking Demystified A Technical Overview for Security Professionals.mp4
|
29.5 MB
|
Automotive Security Standards Are Special Just Like Every Other Industry.eng.srt
|
70.3 KB
|
Automotive Security Standards Are Special Just Like Every Other Industry.mp4
|
55.3 MB
|
Closing Keynote Building and Enabling a Cyber Workforce.eng.srt
|
39.5 KB
|
Closing Keynote Building and Enabling a Cyber Workforce.mp4
|
38.7 MB
|
Deconstructing Supply Chain Risk.eng.srt
|
60.3 KB
|
Deconstructing Supply Chain Risk.mp4
|
54.2 MB
|
Finding Windows Privilege Escalation Vulnerabilities with Crassus.eng.srt
|
74.9 KB
|
Finding Windows Privilege Escalation Vulnerabilities with Crassus.mp4
|
64.2 MB
|
GRIMMCon 0x8 lineup.mp4
|
2.5 MB
|
OSINT and the Metadata of Madness.eng.srt
|
42.0 KB
|
OSINT and the Metadata of Madness.mp4
|
41.1 MB
|
Panel Authentic Allyship in Tech.eng.srt
|
85.8 KB
|
Panel Authentic Allyship in Tech.mp4
|
79.6 MB
|
Refining Your Offensive Pentest Methodology.eng.srt
|
41.6 KB
|
Refining Your Offensive Pentest Methodology.mp4
|
18.3 MB
|
Securing the Loop The Importance of the Decision Cycle in Control System Cyber Security.eng.srt
|
36.3 KB
|
Securing the Loop The Importance of the Decision Cycle in Control System Cyber Security.mp4
|
41.7 MB
|
Taking The Plunge Be a Cyber Startup Founder Too.eng.srt
|
79.3 KB
|
Taking The Plunge Be a Cyber Startup Founder Too.mp4
|
51.3 MB
|
Workshop Reducing Threat Landscape by Demonizing Adversaries.eng.srt
|
99.0 KB
|
Workshop Reducing Threat Landscape by Demonizing Adversaries.mp4
|
85.0 MB
|
Total files 220
|