/
|
LASCON Logo.jpg
|
37.7 KB
|
LASCON thank you.txt
|
0.9 KB
|
/LASCON 2011/
|
Automated vs. Manual Security - You can't scan for The Stupid - charles and david.mp4
|
30.3 MB
|
Beautiful Payment Systems with OAuth - Tom Brown.eng.srt
|
17.3 KB
|
Beautiful Payment Systems with OAuth - Tom Brown.mp4
|
29.8 MB
|
Ghosts of XSS Past, Present and Future - Jim Manico.eng.srt
|
108.0 KB
|
Ghosts of XSS Past, Present and Future - Jim Manico.mp4
|
45.5 MB
|
Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.eng.srt
|
137.5 KB
|
Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.mp4
|
42.7 MB
|
Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.eng.srt
|
96.1 KB
|
Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.mp4
|
34.4 MB
|
How to build a secure login - Ben Broussard.eng.srt
|
102.0 KB
|
How to build a secure login - Ben Broussard.mp4
|
38.6 MB
|
Infosec In The New World Order - Rugged DevOps And More ... - Gene Kim.eng.srt
|
123.9 KB
|
Infosec In The New World Order - Rugged DevOps And More ... - Gene Kim.mp4
|
40.5 MB
|
Matt Tesauro Keynote.eng.srt
|
120.2 KB
|
Matt Tesauro Keynote.mp4
|
41.5 MB
|
Obfuscation in Javascript- herrera.eng.srt
|
95.0 KB
|
Obfuscation in Javascript- herrera.mp4
|
31.6 MB
|
opensamm in the Real World- Philip J.Beyer, Scott Stevens.eng.srt
|
119.1 KB
|
opensamm in the Real World- Philip J.Beyer, Scott Stevens.mp4
|
42.3 MB
|
PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.eng.srt
|
111.4 KB
|
PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.mp4
|
40.8 MB
|
Reversing Web Applications - Andrew Wilson.eng.srt
|
141.9 KB
|
Reversing Web Applications - Andrew Wilson.mp4
|
44.0 MB
|
SDL- A History -Michael Howard.eng.srt
|
103.6 KB
|
SDL- A History -Michael Howard.mp4
|
47.7 MB
|
Social Engineering - David Hughes.eng.srt
|
93.6 KB
|
Social Engineering - David Hughes.mp4
|
40.5 MB
|
Software Assurance- Joe Jarzombek.eng.srt
|
18.7 KB
|
Software Assurance- Joe Jarzombek.mp4
|
5.9 MB
|
You're Going to Need a Bigger Shovel - Rafa Los.eng.srt
|
41.7 KB
|
You're Going to Need a Bigger Shovel - Rafa Los.mp4
|
17.7 MB
|
/LASCON 2012/
|
An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts.eng.srt
|
180.9 KB
|
An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts.mp4
|
54.2 MB
|
Android Security, or this is not the kind of 'open' I meant with Mike Park, Trustwave SpiderLabs.mp4
|
32.4 MB
|
Application Security & User Experience with Alex Smolen.mp4
|
25.1 MB
|
Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti.eng.srt
|
1.4 KB
|
Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti.mp4
|
53.0 MB
|
Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode.eng.srt
|
1.5 KB
|
Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode.mp4
|
26.9 MB
|
AppSec Inception Exploiting Software Culture with Jeff Williams, Aspect Security, CEO.mp4
|
36.1 MB
|
Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems.eng.srt
|
80.2 KB
|
Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems.mp4
|
25.7 MB
|
Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw.eng.srt
|
50.5 KB
|
Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw.mp4
|
26.2 MB
|
Community The Killer App with Mark Curphey, OWASP.mp4
|
46.1 MB
|
Coud Sec 12 Step with Adrian Lane, Securosis, LLC.eng.srt
|
99.7 KB
|
Coud Sec 12 Step with Adrian Lane, Securosis, LLC.mp4
|
31.3 MB
|
Emerging Threats in Mobile Computing with Adam Meyers SRA International.mp4
|
43.2 MB
|
Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal.eng.srt
|
101.0 KB
|
Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal.mp4
|
41.2 MB
|
Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall, ESAPI Project co owner.mp4
|
9.9 MB
|
Ghosts of XSS Past, Present & Future with Jim Manico, WhiteHat Security.mp4
|
30.8 MB
|
Gray, the New Black, Gray Box Vulnerability Testing with Brian Chess, Ph D.mp4
|
27.7 MB
|
Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs.mp4
|
29.6 MB
|
Hacking NET Applications, The Black Arts with Jon McCoy, DigitalBodyGuard.com.mp4
|
57.9 MB
|
How To Recruit Spies on the Internet with Ira Winkler, CISSP.mp4
|
37.1 MB
|
Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs.eng.srt
|
112.9 KB
|
Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs.mp4
|
40.1 MB
|
Improve your SDLC with CAPEC and CWE with Ryan Stinson, KCG.mp4
|
24.5 MB
|
Keeping Up with the Web Application Security with Ganesh Devarajan & Todd Redfoot.mp4
|
34.0 MB
|
Lesson Learned Building Secure ASP NET Applications with Tom Fischer.mp4
|
28.4 MB
|
Messaging Security Using GlassFish & Open Message Queue with Srini Penchikala.mp4
|
21.8 MB
|
Mobile Web Services with Gunnar Peterson.eng.srt
|
0.4 KB
|
Mobile Web Services with Gunnar Peterson.mp4
|
47.2 MB
|
Next Generation Web Attacks HTML 5, DOM L3 and XHR L2 with Shreeraj Shah, Blueinfy Solutions Pvt.mp4
|
38.7 MB
|
OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates.eng.srt
|
1.7 KB
|
OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates.mp4
|
32.4 MB
|
OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier.eng.srt
|
116.5 KB
|
OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier.mp4
|
35.0 MB
|
Panel Discussion Making it in Information Security & Application Security.eng.srt
|
1.5 KB
|
Panel Discussion Making it in Information Security & Application Security.mp4
|
45.4 MB
|
Principles of Patrolling, Applying Ranger School Lessons to Information Security with Patrick Tatro.mp4
|
26.4 MB
|
Recap and Looking Ahead to the Next ten Years and Appsec USA 2012.mp4
|
11.3 MB
|
Secure Development Considerations for Cloud Virtual Environments with Andrew Murren.eng.srt
|
74.1 KB
|
Secure Development Considerations for Cloud Virtual Environments with Andrew Murren.mp4
|
29.2 MB
|
Secure Programming Support in IDE with Bill Chu and Jing Xie.eng.srt
|
101.7 KB
|
Secure Programming Support in IDE with Bill Chu and Jing Xie.mp4
|
35.4 MB
|
Simplifying Threat Modeling with Mike Ware, Cigital.mp4
|
29.6 MB
|
Six Key Metrics A Look at the Future of AppSec with Arian Evans.mp4
|
35.4 MB
|
Software Assurance Automation Throughout the Lifecycle with Richard Struse.mp4
|
35.6 MB
|
Software Security Is OK Good Enough with John B Dickson, CISSP.mp4
|
31.5 MB
|
SSL And The Future of Authenticity with Moxie Marlinspike -Keynote.eng.srt
|
141.5 KB
|
SSL And The Future of Authenticity with Moxie Marlinspike -Keynote.mp4
|
28.6 MB
|
STAAF An Efficient Distributed Framework for Performing Large Scale Android Application Analysis.mp4
|
35.4 MB
|
Sticking to the Facts Scientific Study of Static Analysis Tools with Britton Willis.mp4
|
33.4 MB
|
Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member.eng.srt
|
47.1 KB
|
Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member.mp4
|
15.2 MB
|
The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody.eng.srt
|
113.4 KB
|
The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody.mp4
|
29.5 MB
|
Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu.eng.srt
|
86.4 KB
|
Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu.mp4
|
31.0 MB
|
Web Application Security Payloads with Andres Riancho, RAPID 7.mp4
|
37.3 MB
|
Why Do Developers Make Dangerous Software Errors with Michele Moss & Nadya Bartol.mp4
|
31.5 MB
|
You're Not Done Yet Turning Securable Apps into Secure Installations using SCAP with Charles Schmi.mp4
|
29.1 MB
|
/LASCON 2013/
|
5 Proven Success Strategies for your Software Security Program -Bankim Tejani.eng.srt
|
108.9 KB
|
5 Proven Success Strategies for your Software Security Program -Bankim Tejani.mp4
|
72.8 MB
|
Big Data, Little Security - Practical Steps for securing Big Data -Manoj Tripathi.eng.srt
|
99.5 KB
|
Big Data, Little Security - Practical Steps for securing Big Data -Manoj Tripathi.mp4
|
80.8 MB
|
Blindspots Keynote with Robert Hansen.eng.srt
|
104.4 KB
|
Blindspots Keynote with Robert Hansen.mp4
|
61.6 MB
|
Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.eng.srt
|
117.2 KB
|
Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.mp4
|
83.3 MB
|
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.eng.srt
|
107.5 KB
|
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.mp4
|
65.2 MB
|
DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.eng.srt
|
69.4 KB
|
DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.mp4
|
48.1 MB
|
Do you have a Scanner, or a Scanning Program -Dan Cornell.eng.srt
|
121.4 KB
|
Do you have a Scanner, or a Scanning Program -Dan Cornell.mp4
|
80.2 MB
|
Drawing the map Outlining Android permissions mechanism -Andrew Reiter.eng.srt
|
89.8 KB
|
Drawing the map Outlining Android permissions mechanism -Andrew Reiter.mp4
|
42.0 MB
|
Enforcing Authorization with Cryptography -Amit Sethi.eng.srt
|
60.6 KB
|
Enforcing Authorization with Cryptography -Amit Sethi.mp4
|
42.7 MB
|
From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.eng.srt
|
111.1 KB
|
From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.mp4
|
79.9 MB
|
Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.eng.srt
|
98.7 KB
|
Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.mp4
|
69.6 MB
|
Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.eng.srt
|
91.8 KB
|
Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.mp4
|
56.0 MB
|
How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.eng.srt
|
115.5 KB
|
How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.mp4
|
64.4 MB
|
How overlay networks can make public clouds your global WAN network - Ryan Koop.eng.srt
|
90.2 KB
|
How overlay networks can make public clouds your global WAN network - Ryan Koop.mp4
|
79.9 MB
|
Ice Cream 'sudo make me a' Sandwich -Max Sobell.eng.srt
|
82.6 KB
|
Ice Cream 'sudo make me a' Sandwich -Max Sobell.mp4
|
54.3 MB
|
Malware Automation -Christopher Elisan.eng.srt
|
97.8 KB
|
Malware Automation -Christopher Elisan.mp4
|
64.2 MB
|
Million Browser Botnet -Matt Johansen.eng.srt
|
106.0 KB
|
Million Browser Botnet -Matt Johansen.mp4
|
65.4 MB
|
Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.eng.srt
|
95.2 KB
|
Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.mp4
|
58.8 MB
|
Mobile AppSec Development and Alphabet Soup -David Lindner.eng.srt
|
100.4 KB
|
Mobile AppSec Development and Alphabet Soup -David Lindner.mp4
|
55.4 MB
|
No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.eng.srt
|
118.4 KB
|
No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.mp4
|
63.0 MB
|
OWASP Top Ten Proactive Controls -Jim Manico.eng.srt
|
153.0 KB
|
OWASP Top Ten Proactive Controls -Jim Manico.mp4
|
80.3 MB
|
Penetration Testing The Other Stuff -David Hughes.eng.srt
|
121.6 KB
|
Penetration Testing The Other Stuff -David Hughes.mp4
|
80.6 MB
|
Practical PKI -Steven Bernstein.eng.srt
|
93.6 KB
|
Practical PKI -Steven Bernstein.mp4
|
58.3 MB
|
Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.eng.srt
|
70.2 KB
|
Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.mp4
|
43.8 MB
|
Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.eng.srt
|
87.4 KB
|
Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.mp4
|
59.3 MB
|
Riding the Magical Code Injection Rainbow -Daniel Crowley.eng.srt
|
70.8 KB
|
Riding the Magical Code Injection Rainbow -Daniel Crowley.mp4
|
58.9 MB
|
Rugged Driven Development with Gauntlt -James Wickett.eng.srt
|
64.9 KB
|
Rugged Driven Development with Gauntlt -James Wickett.mp4
|
51.0 MB
|
Securing Redis with Sedona -Will Urbanski.eng.srt
|
61.3 KB
|
Securing Redis with Sedona -Will Urbanski.mp4
|
45.7 MB
|
Software and Supply Chain Assurance SSCA -Joe Jarzombek.eng.srt
|
137.4 KB
|
Software and Supply Chain Assurance SSCA -Joe Jarzombek.mp4
|
84.4 MB
|
Speed Debates -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.eng.srt
|
109.3 KB
|
Speed Debates -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.mp4
|
84.4 MB
|
Stalking a City for Fun and Frivolity -Brendan O'Connor.eng.srt
|
172.2 KB
|
Stalking a City for Fun and Frivolity -Brendan O'Connor.mp4
|
71.0 MB
|
Stupid webappsec Tricks -Zane Lackey.eng.srt
|
119.4 KB
|
Stupid webappsec Tricks -Zane Lackey.mp4
|
65.1 MB
|
The Origins of Insecurity Keynote with Nick Galbreath.mp4
|
62.4 MB
|
The Real Cost of Security -Wendy Nather.eng.srt
|
86.8 KB
|
The Real Cost of Security -Wendy Nather.mp4
|
59.3 MB
|
User Auth for Winners, how to get it right the first time -Karthik Gaekwad.eng.srt
|
90.1 KB
|
User Auth for Winners, how to get it right the first time -Karthik Gaekwad.mp4
|
55.5 MB
|
View this abstract in your browser -PHIL PURVIANCE.eng.srt
|
64.5 KB
|
View this abstract in your browser -PHIL PURVIANCE.mp4
|
34.8 MB
|
We are the Cavalry Why it has to be us & why now -Adam Brand.eng.srt
|
79.2 KB
|
We are the Cavalry Why it has to be us & why now -Adam Brand.mp4
|
45.6 MB
|
Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.eng.srt
|
87.4 KB
|
Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.mp4
|
60.6 MB
|
/LASCON 2014/
|
Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.eng.srt
|
111.2 KB
|
Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.mp4
|
88.5 MB
|
Breach Assessments Are you 0wned You can find out- Jessey Bullock, Kevin Dunn.eng.srt
|
108.2 KB
|
Breach Assessments Are you 0wned You can find out- Jessey Bullock, Kevin Dunn.mp4
|
66.9 MB
|
Building a Security Engineering Organization for the Modern World- Zane Lackey.eng.srt
|
131.0 KB
|
Building a Security Engineering Organization for the Modern World- Zane Lackey.mp4
|
58.4 MB
|
Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.eng.srt
|
97.1 KB
|
Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.mp4
|
66.8 MB
|
Derived Credentials - A better user experience for secure applications in the mobile world.eng.srt
|
70.9 KB
|
Derived Credentials - A better user experience for secure applications in the mobile world.mp4
|
72.4 MB
|
DevOps, CI, APIs, Oh My Security Gone Agile - Matt Tesauro.eng.srt
|
121.4 KB
|
DevOps, CI, APIs, Oh My Security Gone Agile - Matt Tesauro.mp4
|
89.7 MB
|
DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.eng.srt
|
77.9 KB
|
DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.mp4
|
47.6 MB
|
Fireside chat with RSnake.eng.srt
|
107.4 KB
|
Fireside chat with RSnake.mp4
|
67.5 MB
|
Historical Lessons for Improving Cyber Security Marty Hellman.eng.srt
|
84.6 KB
|
Historical Lessons for Improving Cyber Security Marty Hellman.mp4
|
72.0 MB
|
How to use adaptive hashes without making yourself vulnerable to DoS attacks.eng.srt
|
111.8 KB
|
How to use adaptive hashes without making yourself vulnerable to DoS attacks.mp4
|
71.0 MB
|
Implementing a large scale identity theft prevention solution using the cloud.eng.srt
|
122.7 KB
|
Implementing a large scale identity theft prevention solution using the cloud.mp4
|
66.8 MB
|
In AppSec, Fast Is Everything.eng.srt
|
101.1 KB
|
In AppSec, Fast Is Everything.mp4
|
62.5 MB
|
Intro to GPG and the Web of Trust.eng.srt
|
115.3 KB
|
Intro to GPG and the Web of Trust.mp4
|
43.5 MB
|
Is this your pipe Hijacking the build pipeline.eng.srt
|
39.2 KB
|
Is this your pipe Hijacking the build pipeline.mp4
|
33.5 MB
|
Keynote by Chris Nickerson.eng.srt
|
109.7 KB
|
Keynote by Chris Nickerson.mp4
|
63.1 MB
|
Methodology for Creation and Practical Applications of Polyglots.eng.srt
|
71.7 KB
|
Methodology for Creation and Practical Applications of Polyglots.mp4
|
69.2 MB
|
Multi Factor Authentication Weeding Out the Snake Oil - YouTube.eng.srt
|
79.6 KB
|
Multi Factor Authentication Weeding Out the Snake Oil - YouTube.mp4
|
64.2 MB
|
OpenStack API Security Testing Automation in Action.eng.srt
|
60.3 KB
|
OpenStack API Security Testing Automation in Action.mp4
|
95.6 MB
|
OWASP Top 10 Proactive Controls.eng.srt
|
105.0 KB
|
OWASP Top 10 Proactive Controls.mp4
|
87.5 MB
|
Practical AppSec Quick Wins for More Secure Software.eng.srt
|
76.1 KB
|
Practical AppSec Quick Wins for More Secure Software.mp4
|
63.4 MB
|
Privacy-Re-framing what we think we know.eng.srt
|
102.2 KB
|
Privacy-Re-framing what we think we know.mp4
|
67.2 MB
|
Risk management for teams that get things done - YouTube.eng.srt
|
72.3 KB
|
Risk management for teams that get things done - YouTube.mp4
|
49.7 MB
|
Ruby Meta programming Here's how to do it wrong.eng.srt
|
82.6 KB
|
Ruby Meta programming Here's how to do it wrong.mp4
|
49.8 MB
|
Securing The Android Apps On Your Wrist and Face.mp4
|
70.0 MB
|
Security from Inception.mp4
|
87.9 MB
|
Security Shark Tank.eng.srt
|
91.2 KB
|
Security Shark Tank.mp4
|
65.9 MB
|
Seven Grades of Perfect Forward Secrecy.mp4
|
68.5 MB
|
Speed Debates.eng.srt
|
94.1 KB
|
Speed Debates.mp4
|
88.1 MB
|
The State of Crypto in Python.eng.srt
|
117.4 KB
|
The State of Crypto in Python.mp4
|
64.5 MB
|
Threat Modeling for Linux Containers LXC, Docker and the Cloud.eng.srt
|
68.7 KB
|
Threat Modeling for Linux Containers LXC, Docker and the Cloud.mp4
|
35.4 MB
|
Understanding and Implementing Rugged.eng.srt
|
88.5 KB
|
Understanding and Implementing Rugged.mp4
|
97.5 MB
|
Warning Ahead Security Storms are Brewing in Your JavaScript.eng.srt
|
31.3 KB
|
Warning Ahead Security Storms are Brewing in Your JavaScript.mp4
|
26.9 MB
|
Welcome to the blue team How building a better hacker accidentally built a better defender.eng.srt
|
64.3 KB
|
Welcome to the blue team How building a better hacker accidentally built a better defender.mp4
|
44.7 MB
|
What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.eng.srt
|
100.5 KB
|
What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.mp4
|
58.3 MB
|
/LASCON 2015/
|
Agile Security - The fails that nobody told you about.eng.srt
|
117.1 KB
|
Agile Security - The fails that nobody told you about.mp4
|
63.0 MB
|
Authz is the new Authn - Trust Elevation with UMA and OpenID Connect.eng.srt
|
79.5 KB
|
Authz is the new Authn - Trust Elevation with UMA and OpenID Connect.mp4
|
59.0 MB
|
Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.eng.srt
|
98.6 KB
|
Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.mp4
|
66.4 MB
|
Big Data, What's the Big Deal.eng.srt
|
90.8 KB
|
Big Data, What's the Big Deal.mp4
|
49.4 MB
|
Connected Vehicle Security.eng.srt
|
123.5 KB
|
Connected Vehicle Security.mp4
|
81.3 MB
|
Designing Flexibility in Software to Increase Security.eng.srt
|
104.3 KB
|
Designing Flexibility in Software to Increase Security.mp4
|
92.4 MB
|
Docker Docker Docker Security Docker.eng.srt
|
95.2 KB
|
Docker Docker Docker Security Docker.mp4
|
63.2 MB
|
Hack the Cloud Hack the Company - the Cloud Impact on Enterprise Security.eng.srt
|
118.6 KB
|
Hack the Cloud Hack the Company - the Cloud Impact on Enterprise Security.mp4
|
54.0 MB
|
Hack Wars - A New Hope.mp4
|
35.7 MB
|
How Google Turned Me Into My Mother - The Proxy Paradox In Security.eng.srt
|
97.0 KB
|
How Google Turned Me Into My Mother - The Proxy Paradox In Security.mp4
|
62.9 MB
|
Httpillage - Calling all nodes.eng.srt
|
80.9 KB
|
Httpillage - Calling all nodes.mp4
|
57.2 MB
|
It Takes a Village - Effective Collaboration in Security.eng.srt
|
104.5 KB
|
It Takes a Village - Effective Collaboration in Security.mp4
|
67.7 MB
|
Keynote - Jack Daniel.eng.srt
|
79.7 KB
|
Keynote - Jack Daniel.mp4
|
35.5 MB
|
Keynote - Kelly Lum.eng.srt
|
77.0 KB
|
Keynote - Kelly Lum.mp4
|
53.5 MB
|
Keynote - Pete Cheslock.eng.srt
|
110.8 KB
|
Keynote - Pete Cheslock.mp4
|
48.0 MB
|
Managing Certificates and TLS Endpoints.eng.srt
|
75.7 KB
|
Managing Certificates and TLS Endpoints.mp4
|
49.6 MB
|
Mobile Connect - A better and secure user experience for online authentication..eng.srt
|
79.2 KB
|
Mobile Connect - A better and secure user experience for online authentication..mp4
|
69.7 MB
|
Mobile Landscape - The Security of Wearables.eng.srt
|
92.6 KB
|
Mobile Landscape - The Security of Wearables.mp4
|
72.4 MB
|
MQTT and CoAP - A Story about IoT Protocol Security.eng.srt
|
110.8 KB
|
MQTT and CoAP - A Story about IoT Protocol Security.mp4
|
45.0 MB
|
New Farming Methods for the Epistemological Wasteland of Application Security.eng.srt
|
123.3 KB
|
New Farming Methods for the Epistemological Wasteland of Application Security.mp4
|
77.1 MB
|
PHP Security Redefined.eng.srt
|
112.3 KB
|
PHP Security Redefined.mp4
|
79.8 MB
|
PHP WAF - Intercept and Monitor Application Attacks.eng.srt
|
101.4 KB
|
PHP WAF - Intercept and Monitor Application Attacks.mp4
|
84.1 MB
|
Problems you'll face when building a software security program.eng.srt
|
100.4 KB
|
Problems you'll face when building a software security program.mp4
|
47.7 MB
|
Rugged Software Engineering - Nick Galbreath.eng.srt
|
86.7 KB
|
Rugged Software Engineering - Nick Galbreath.mp4
|
40.5 MB
|
Security Automation in the Agile SDLC - Real World Cases.eng.srt
|
86.4 KB
|
Security Automation in the Agile SDLC - Real World Cases.mp4
|
53.4 MB
|
Security for Non-Unicorns-Ben Hughes.eng.srt
|
98.2 KB
|
Security for Non-Unicorns-Ben Hughes.mp4
|
59.5 MB
|
Speed Debates.eng.srt
|
101.3 KB
|
Speed Debates.mp4
|
100.0 MB
|
Static Analysis Security Testing for Dummies and You.eng.srt
|
131.3 KB
|
Static Analysis Security Testing for Dummies and You.mp4
|
63.3 MB
|
Technology, Privacy and the Law - New Challenges for Non-Profits.eng.srt
|
95.2 KB
|
Technology, Privacy and the Law - New Challenges for Non-Profits.mp4
|
79.2 MB
|
Testing Modern Applications with Hackazon.eng.srt
|
82.9 KB
|
Testing Modern Applications with Hackazon.mp4
|
64.4 MB
|
The Culture of Security.eng.srt
|
35.6 KB
|
The Culture of Security.mp4
|
27.2 MB
|
The Illusion of Control - Secrets Within Your Software Supply Chain.eng.srt
|
90.3 KB
|
The Illusion of Control - Secrets Within Your Software Supply Chain.mp4
|
86.6 MB
|
The Node.js Highway - Attacks Are At Full Throttle.eng.srt
|
39.8 KB
|
The Node.js Highway - Attacks Are At Full Throttle.mp4
|
51.5 MB
|
What Do You Mean My Security Tools Don’t Work on APIs.eng.srt
|
118.9 KB
|
What Do You Mean My Security Tools Don’t Work on APIs.mp4
|
98.4 MB
|
Why Some Multi-Factor Authentication Technology is Irresponsible.eng.srt
|
81.7 KB
|
Why Some Multi-Factor Authentication Technology is Irresponsible.mp4
|
74.0 MB
|
Your Last Manual Assessment.eng.srt
|
42.1 KB
|
Your Last Manual Assessment.mp4
|
29.5 MB
|
/LASCON 2016/
|
Architecting a Security Program for the Future - Karen Lu & Josh Sokol.eng.srt
|
103.5 KB
|
Architecting a Security Program for the Future - Karen Lu & Josh Sokol.mp4
|
73.8 MB
|
Avoiding Application Security Program Pitfalls - Cap Diebel.eng.srt
|
112.6 KB
|
Avoiding Application Security Program Pitfalls - Cap Diebel.mp4
|
57.9 MB
|
Be Ready for BeyondCorp - enterprise identity, perimeters and your application- Jason Kent.eng.srt
|
74.0 KB
|
Be Ready for BeyondCorp - enterprise identity, perimeters and your application- Jason Kent.mp4
|
40.3 MB
|
Building Information Security Program from Scratch - Josh Sokol.eng.srt
|
130.3 KB
|
Building Information Security Program from Scratch - Josh Sokol.mp4
|
53.2 MB
|
Could a few links of code f@#k it all up.eng.srt
|
51.0 KB
|
Could a few links of code f@#k it all up.mp4
|
33.9 MB
|
Cryptography 101 - A History and the Basics of Cryptography - Bryant Hagen.eng.srt
|
91.3 KB
|
Cryptography 101 - A History and the Basics of Cryptography - Bryant Hagen.mp4
|
80.6 MB
|
Demystifying a Malware Attack - Christopher Elisan.eng.srt
|
94.4 KB
|
Demystifying a Malware Attack - Christopher Elisan.mp4
|
63.2 MB
|
Doing Security in 100 milliseconds-The Speed of Serverless Computing.mp4
|
65.8 MB
|
Don't Touch Me That Way - David Linder.eng.srt
|
66.9 KB
|
Don't Touch Me That Way - David Linder.mp4
|
52.9 MB
|
Easy Mobile Hacking - Native and Hybrid Pitfalls - Aaron Guzman.eng.srt
|
88.6 KB
|
Easy Mobile Hacking - Native and Hybrid Pitfalls - Aaron Guzman.mp4
|
72.1 MB
|
Eradicating the Weakest Link in Global Corporation - Tomohisa Ishikawa.mp4
|
39.3 MB
|
Go Purple Adopt purple team strategy to augment Application Security Programs - Trupti Shiralkar.mp4
|
78.9 MB
|
Hindsight isn't good enough - LANGSEC helps you take control of your security - Kunal Anand.4f1ec8e5-84dc-4ba4-99c3-3ade330d562c.part
|
848.8 MB
|
Hindsight isn't good enough - LANGSEC helps you take control of your security - Kunal Anand.mp4
|
62.6 MB
|
Invited Speaker - Dave Kennedy.eng.srt
|
135.9 KB
|
Invited Speaker - Dave Kennedy.mp4
|
83.0 MB
|
Invited Speaker - Ryan Huber.eng.srt
|
122.6 KB
|
Invited Speaker - Ryan Huber.mp4
|
57.6 MB
|
IOT and AppSec- Jason Kent.mp4
|
69.3 MB
|
It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.eng.srt
|
86.8 KB
|
It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.mp4
|
50.3 MB
|
Key Note - Shannon Lietz.eng.srt
|
104.5 KB
|
Key Note - Shannon Lietz.mp4
|
77.0 MB
|
LangSec for the Masses - Joe Rozner.eng.srt
|
95.6 KB
|
LangSec for the Masses - Joe Rozner.mp4
|
53.4 MB
|
Lean Security - Ernest Mueller.eng.srt
|
88.6 KB
|
Lean Security - Ernest Mueller.mp4
|
60.4 MB
|
Leveling up your bug bounty program- Charles Valentine.eng.srt
|
94.1 KB
|
Leveling up your bug bounty program- Charles Valentine.mp4
|
32.1 MB
|
Making Invisible Things Visible - Tracking Down Known Vulnerabilities - Derek E. Weeks.eng.srt
|
90.3 KB
|
Making Invisible Things Visible - Tracking Down Known Vulnerabilities - Derek E. Weeks.mp4
|
93.2 MB
|
Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.eng.srt
|
90.1 KB
|
Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.mp4
|
67.7 MB
|
Mind the CSP Gap - Challenges developing a meaningful Content-Security-Policy - Garett Held.eng.srt
|
79.4 KB
|
Mind the CSP Gap - Challenges developing a meaningful Content-Security-Policy - Garett Held.mp4
|
50.8 MB
|
Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.eng.srt
|
113.8 KB
|
Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.mp4
|
65.9 MB
|
Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.eng.srt
|
55.9 KB
|
Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.mp4
|
36.3 MB
|
Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.eng.srt
|
89.9 KB
|
Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.mp4
|
50.3 MB
|
Scanning IPv4 for Free Data and Free Shells - Jordan Wright.eng.srt
|
110.0 KB
|
Scanning IPv4 for Free Data and Free Shells - Jordan Wright.mp4
|
63.4 MB
|
Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.eng.srt
|
103.6 KB
|
Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.mp4
|
54.0 MB
|
Six myths of Information Security - Steve Horstman.eng.srt
|
98.9 KB
|
Six myths of Information Security - Steve Horstman.mp4
|
52.1 MB
|
Sk8ing in Thin Ice - A crash course in Kubernetes & Security- Matt Johansen.eng.srt
|
86.6 KB
|
Sk8ing in Thin Ice - A crash course in Kubernetes & Security- Matt Johansen.mp4
|
45.2 MB
|
Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.eng.srt
|
83.2 KB
|
Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.mp4
|
81.7 MB
|
Trusted Execution - A Deterministic Approach to AppSec for Zero-Day Threat Prevention - Satya Gupta.mp4
|
70.6 MB
|
What if IOT is Dumped in Your Lap - - Chris Walker.mp4
|
80.5 MB
|
Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.eng.srt
|
96.7 KB
|
Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.mp4
|
67.2 MB
|
/LASCON 2016 OWASP Top 10/
|
OWASP Top 10 Free Training - LASCON 2016 [3 4].eng.srt
|
188.7 KB
|
OWASP Top 10 Free Training - LASCON 2016 [3 4].mp4
|
102.8 MB
|
OWASP Top 10 Free Training - LASCON 2016 [4 4].mp4
|
107.8 MB
|
/LASCON 2017/
|
A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.eng.srt
|
114.5 KB
|
A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.mp4
|
85.6 MB
|
Abusing Normality - Data Exfiltration in Plain Site.eng.srt
|
101.0 KB
|
Abusing Normality - Data Exfiltration in Plain Site.mp4
|
93.3 MB
|
AppSec Pipelines and Event-based Security - Moving beyond a traditional security test. - Matt Tesauro.eng.srt
|
131.5 KB
|
AppSec Pipelines and Event-based Security - Moving beyond a traditional security test. - Matt Tesauro.mp4
|
62.7 MB
|
Architecting for Security in the Cloud - Josh Sokol.eng.srt
|
126.9 KB
|
Architecting for Security in the Cloud - Josh Sokol.mp4
|
54.5 MB
|
Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.eng.srt
|
136.0 KB
|
Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.mp4
|
89.8 MB
|
Attack Vectors in Biometric Recognition Systems - Clare Nelson.eng.srt
|
111.4 KB
|
Attack Vectors in Biometric Recognition Systems - Clare Nelson.mp4
|
72.3 MB
|
Breaking into Security - Tommy Dew, Gisela Hinojosa.eng.srt
|
127.7 KB
|
Breaking into Security - Tommy Dew, Gisela Hinojosa.mp4
|
53.9 MB
|
Cloud Ops MasterClass - Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.eng.srt
|
169.0 KB
|
Cloud Ops MasterClass - Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.mp4
|
94.7 MB
|
Core Rule Set for the Masses - Lessons from taming ModSecurity rules at massive scale - Tin Zaw.eng.srt
|
135.5 KB
|
Core Rule Set for the Masses - Lessons from taming ModSecurity rules at massive scale - Tin Zaw.mp4
|
68.7 MB
|
Demystifying the Ransomware and IoT Threat - Christopher Elisan.eng.srt
|
94.5 KB
|
Demystifying the Ransomware and IoT Threat - Christopher Elisan.mp4
|
56.2 MB
|
From Zero to Zero-Trust - Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.eng.srt
|
101.1 KB
|
From Zero to Zero-Trust - Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.mp4
|
62.6 MB
|
How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.eng.srt
|
87.7 KB
|
How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.mp4
|
48.9 MB
|
How to put Sec in Devops - Igor Matlin.eng.srt
|
63.2 KB
|
How to put Sec in Devops - Igor Matlin.mp4
|
59.8 MB
|
Invited Speaker - Chris Roberts.eng.srt
|
142.6 KB
|
Invited Speaker - Chris Roberts.mp4
|
83.7 MB
|
IoT and the Security of That Mobile App - Mark Loveless.eng.srt
|
132.2 KB
|
IoT and the Security of That Mobile App - Mark Loveless.mp4
|
89.4 MB
|
IOT Assimilation - Resistance is Futile - Mark Szewczul.eng.srt
|
155.7 KB
|
IOT Assimilation - Resistance is Futile - Mark Szewczul.mp4
|
90.6 MB
|
Keynote - Chris Nickerson.eng.srt
|
121.2 KB
|
Keynote - Chris Nickerson.mp4
|
62.9 MB
|
Keynote - Georgia Weidman.eng.srt
|
149.4 KB
|
Keynote - Georgia Weidman.mp4
|
90.5 MB
|
Layer 8 and Why People are the Most Important Security Tool.eng.srt
|
115.3 KB
|
Layer 8 and Why People are the Most Important Security Tool.mp4
|
75.8 MB
|
Leveraging Social Engineering in physical security assessment - Snow.eng.srt
|
140.9 KB
|
Leveraging Social Engineering in physical security assessment - Snow.mp4
|
65.1 MB
|
Malware Clustering - Srivathsan Srinivasagopalan.eng.srt
|
115.4 KB
|
Malware Clustering - Srivathsan Srinivasagopalan.mp4
|
67.0 MB
|
No one left behind - Security Defense through Gamification including CTFs - Kashish Mittal.mp4
|
55.4 MB
|
OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.eng.srt
|
75.3 KB
|
OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.mp4
|
69.2 MB
|
Pen Testing for Humans - Rajan Kapoor.eng.srt
|
90.9 KB
|
Pen Testing for Humans - Rajan Kapoor.mp4
|
57.9 MB
|
Phishing - It's Not Just for Pentesters - Joe Gray.eng.srt
|
153.4 KB
|
Phishing - It's Not Just for Pentesters - Joe Gray.mp4
|
90.6 MB
|
Realizing Software Security Maturity - The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.eng.srt
|
133.8 KB
|
Realizing Software Security Maturity - The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.mp4
|
67.4 MB
|
Security Evaluation of Libraries.eng.srt
|
85.5 KB
|
Security Evaluation of Libraries.mp4
|
65.6 MB
|
Security for DevOps - Shannon Lietz.eng.srt
|
156.7 KB
|
Security for DevOps - Shannon Lietz.mp4
|
82.2 MB
|
Serverless security - A pragmatic primer for builders and defenders - James Wickett.eng.srt
|
149.8 KB
|
Serverless security - A pragmatic primer for builders and defenders - James Wickett.mp4
|
64.4 MB
|
Startup Security - Making Everyone Happy - Michael McCabe, Brian Henderson.eng.srt
|
136.9 KB
|
Startup Security - Making Everyone Happy - Michael McCabe, Brian Henderson.mp4
|
64.5 MB
|
The Rest of the Story - Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.eng.srt
|
75.9 KB
|
The Rest of the Story - Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.mp4
|
59.2 MB
|
The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.eng.srt
|
118.3 KB
|
The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.mp4
|
67.3 MB
|
Threat Modeling For Secure Software Design.eng.srt
|
158.9 KB
|
Threat Modeling For Secure Software Design.mp4
|
91.4 MB
|
Using Identity to Evolve Application Security - Kevin Paige.eng.srt
|
128.6 KB
|
Using Identity to Evolve Application Security - Kevin Paige.mp4
|
77.3 MB
|
Where we’re going we won’t need passwords - Matt Hajda.eng.srt
|
169.2 KB
|
Where we’re going we won’t need passwords - Matt Hajda.mp4
|
87.4 MB
|
Won't somebody please think of the data - Sarah-Jane Madden.eng.srt
|
128.6 KB
|
Won't somebody please think of the data - Sarah-Jane Madden.mp4
|
94.3 MB
|
/LASCON 2017 OWASP Top 10/
|
OWASP Top 10 @ LASCON 2017 [3 5].eng.srt
|
188.1 KB
|
OWASP Top 10 @ LASCON 2017 [3 5].mp4
|
98.4 MB
|
OWASP Top 10 @ LASCON 2017 [4 5].eng.srt
|
152.0 KB
|
OWASP Top 10 @ LASCON 2017 [4 5].mp4
|
86.3 MB
|
OWASP Top 10 @ LASCON 2017 [5 5].eng.srt
|
127.9 KB
|
OWASP Top 10 @ LASCON 2017 [5 5].mp4
|
61.3 MB
|
/LASCON 2018/
|
Adapting Your AppSec - Brian Glas.eng.srt
|
147.7 KB
|
Adapting Your AppSec - Brian Glas.mp4
|
84.1 MB
|
Be Prepared - Things you can do today for the brea.eng.srt
|
142.1 KB
|
Be Prepared - Things you can do today for the brea.mp4
|
54.2 MB
|
Bridging GDPR from your Application to your Cloud (2).eng.srt
|
139.7 KB
|
Bridging GDPR from your Application to your Cloud (2).mp4
|
87.4 MB
|
Bridging GDPR from your Application to your Cloud.eng.srt
|
74.4 KB
|
Bridging GDPR from your Application to your Cloud.mp4
|
62.6 MB
|
Building An AppSec Program From The Ground Up An H.eng.srt
|
180.7 KB
|
Building An AppSec Program From The Ground Up An H.mp4
|
83.1 MB
|
Building Products People Trust Designing Privacy,.eng.srt
|
147.2 KB
|
Building Products People Trust Designing Privacy,.mp4
|
68.7 MB
|
Conducting Table Top Exercises to Get Your Team Ba.eng.srt
|
169.3 KB
|
Conducting Table Top Exercises to Get Your Team Ba.mp4
|
79.4 MB
|
Cryptography may or may not protect you - how it i.eng.srt
|
87.1 KB
|
Cryptography may or may not protect you - how it i.mp4
|
55.1 MB
|
Data Protection at Scale.eng.srt
|
143.7 KB
|
Data Protection at Scale.mp4
|
73.5 MB
|
Denial of Trust - The New Attacks - Wendy Nather.eng.srt
|
113.5 KB
|
Denial of Trust - The New Attacks - Wendy Nather.mp4
|
61.2 MB
|
DevSecOps without DevOps is Just Security.eng.srt
|
170.4 KB
|
DevSecOps without DevOps is Just Security.mp4
|
89.0 MB
|
Don't @ Me - Hunting Twitter Bots at Scale.eng.srt
|
153.1 KB
|
Don't @ Me - Hunting Twitter Bots at Scale.mp4
|
63.2 MB
|
Eisenhower and the Internet.eng.srt
|
81.5 KB
|
Eisenhower and the Internet.mp4
|
42.8 MB
|
Empathy & Vulnerability in SecOps.eng.srt
|
133.8 KB
|
Empathy & Vulnerability in SecOps.mp4
|
69.7 MB
|
Evolving Your Security Mindset to Embrace DevSecOp.eng.srt
|
135.5 KB
|
Evolving Your Security Mindset to Embrace DevSecOp.mp4
|
80.7 MB
|
How to Assess the Maturity of your Security Progra.eng.srt
|
91.0 KB
|
How to Assess the Maturity of your Security Progra.mp4
|
70.7 MB
|
How To Kick Butt in InfoSec Blogging - Kate Brew.eng.srt
|
109.8 KB
|
How To Kick Butt in InfoSec Blogging - Kate Brew.mp4
|
78.9 MB
|
It takes a village to get security right Building.eng.srt
|
109.9 KB
|
It takes a village to get security right Building.mp4
|
51.5 MB
|
Keynote Jayson Street.eng.srt
|
127.0 KB
|
Keynote Jayson Street.mp4
|
73.9 MB
|
Making Continuous Security a Reality with OWASP's.eng.srt
|
102.8 KB
|
Making Continuous Security a Reality with OWASP's.mp4
|
44.8 MB
|
Microservices Security Landscape - Prabath Siriwar.mp4
|
65.2 MB
|
ML-Based Detection Engine of Device Network Attack.eng.srt
|
115.0 KB
|
ML-Based Detection Engine of Device Network Attack.mp4
|
88.9 MB
|
Orchestrating Security Tools with AWS Step Functio.eng.srt
|
113.1 KB
|
Orchestrating Security Tools with AWS Step Functio.mp4
|
54.7 MB
|
Pentesting for Developers.eng.srt
|
120.1 KB
|
Pentesting for Developers.mp4
|
62.2 MB
|
Poking Holes in the Cloud Auditing AWS Security.eng.srt
|
159.3 KB
|
Poking Holes in the Cloud Auditing AWS Security.mp4
|
77.8 MB
|
Practical DevSecOps - the simple free pipeline any.eng.srt
|
161.8 KB
|
Practical DevSecOps - the simple free pipeline any.mp4
|
86.0 MB
|
Red Team Pen Testing Panel Discussion.eng.srt
|
169.6 KB
|
Red Team Pen Testing Panel Discussion.mp4
|
100.8 MB
|
Rethinking Role-Based Security Education - Kat Swe.eng.srt
|
86.0 KB
|
Rethinking Role-Based Security Education - Kat Swe.mp4
|
41.3 MB
|
Running at Light Speed Cloud Native Security Patte.eng.srt
|
171.1 KB
|
Running at Light Speed Cloud Native Security Patte.mp4
|
22.4 MB
|
Secure Configuration in the Cloud.eng.srt
|
109.6 KB
|
Secure Configuration in the Cloud.mp4
|
56.3 MB
|
Securing Legacy Applications.eng.srt
|
144.1 KB
|
Securing Legacy Applications.mp4
|
73.6 MB
|
Securing the Future of TLS - What's new in TLS 1.3.eng.srt
|
104.2 KB
|
Securing the Future of TLS - What's new in TLS 1.3.mp4
|
59.0 MB
|
Security Testing Is Automation Failing US Heather.eng.srt
|
111.9 KB
|
Security Testing Is Automation Failing US Heather.mp4
|
66.8 MB
|
SEOWNING The Internet Part 2- Robert Hansen.eng.srt
|
153.0 KB
|
SEOWNING The Internet Part 2- Robert Hansen.mp4
|
75.0 MB
|
Speed with confidence - Shannon Lietz.eng.srt
|
139.4 KB
|
Speed with confidence - Shannon Lietz.mp4
|
68.9 MB
|
The DevSecOps Builders Guide to the CI CD PIPELINE.eng.srt
|
154.0 KB
|
The DevSecOps Builders Guide to the CI CD PIPELINE.mp4
|
74.1 MB
|
The FaaS and the Curious.eng.srt
|
122.2 KB
|
The FaaS and the Curious.mp4
|
59.0 MB
|
The Mitre ATT&CK Framework is for all of us, and i.eng.srt
|
186.8 KB
|
The Mitre ATT&CK Framework is for all of us, and i.mp4
|
89.8 MB
|
The White Hat’s Advantage Open-source OWASP tools.eng.srt
|
102.4 KB
|
The White Hat’s Advantage Open-source OWASP tools.mp4
|
49.3 MB
|
Threat Modeling for IoT Systems.eng.srt
|
159.7 KB
|
Threat Modeling for IoT Systems.mp4
|
80.0 MB
|
Vulnerability Management You're doing it wrong.eng.srt
|
138.1 KB
|
Vulnerability Management You're doing it wrong.mp4
|
76.6 MB
|
Year[0] AppSec at a Startup - Leif Dreizler.eng.srt
|
172.1 KB
|
Year[0] AppSec at a Startup - Leif Dreizler.mp4
|
57.8 MB
|
/LASCON 2019/
|
A DevOps View of AppSec.en.srt
|
82.9 KB
|
A DevOps View of AppSec.mp4
|
106.8 MB
|
A Stratagem on Strategy Rolling Testing into Product Testing.en.srt
|
111.5 KB
|
A Stratagem on Strategy Rolling Testing into Product Testing.mp4
|
112.1 MB
|
Achieve AI-powered API Privacy using Open Source.en.srt
|
98.2 KB
|
Achieve AI-powered API Privacy using Open Source.mp4
|
41.0 MB
|
Application Logging in the Era of GDPR.en.srt
|
68.5 KB
|
Application Logging in the Era of GDPR.mp4
|
80.7 MB
|
Assessing Maturity OpenSAMM and BSIMM.en.srt
|
91.9 KB
|
Assessing Maturity OpenSAMM and BSIMM.mp4
|
62.0 MB
|
Baited Canaries - Monitoring attackers with active beacons.en.srt
|
31.6 KB
|
Baited Canaries - Monitoring attackers with active beacons.mp4
|
37.0 MB
|
Being Powerful While Powerless Elevating Security by Leading Without Authority.en.srt
|
64.5 KB
|
Being Powerful While Powerless Elevating Security by Leading Without Authority.mp4
|
75.9 MB
|
Breaking Into Red Teaming.en.srt
|
103.8 KB
|
Breaking Into Red Teaming.mp4
|
58.8 MB
|
Choosing the Right Static Code Analyzers Based on Hard Data.en.srt
|
60.8 KB
|
Choosing the Right Static Code Analyzers Based on Hard Data.mp4
|
59.7 MB
|
Cloud Security At Scale Managing the Chaos.en.srt
|
91.2 KB
|
Cloud Security At Scale Managing the Chaos.mp4
|
74.0 MB
|
Cloudy with a chance of Persistence.en.srt
|
55.5 KB
|
Cloudy with a chance of Persistence.mp4
|
37.7 MB
|
Detect Insider Threats Using Blockchains.mp4
|
50.4 MB
|
Face Recognition & Privacy.en.srt
|
93.4 KB
|
Face Recognition & Privacy.mp4
|
66.5 MB
|
How to Build an Effective Malware Protection Architecture for File Uploads in Modern Web Apps.en.srt
|
44.7 KB
|
How to Build an Effective Malware Protection Architecture for File Uploads in Modern Web Apps.mp4
|
51.3 MB
|
How to Secure a nodejs Application End-to-End.en.srt
|
71.4 KB
|
How to Secure a nodejs Application End-to-End.mp4
|
82.8 MB
|
Invited Speaker - Josh Sokol.en.srt
|
86.1 KB
|
Invited Speaker - Josh Sokol.mp4
|
69.0 MB
|
Keynote John Bambenek.en.srt
|
110.1 KB
|
Keynote John Bambenek.mp4
|
91.5 MB
|
Keynote Purple is the new black Modern Approaches to Application Security.en.srt
|
90.9 KB
|
Keynote Purple is the new black Modern Approaches to Application Security.mp4
|
69.9 MB
|
Kubernetes Ingress-Nginx Security from Beginner to Expert.en.srt
|
55.6 KB
|
Kubernetes Ingress-Nginx Security from Beginner to Expert.mp4
|
70.7 MB
|
Learning the Power of the Not My Responsibility Mindset.en.srt
|
75.4 KB
|
Learning the Power of the Not My Responsibility Mindset.mp4
|
74.4 MB
|
Living in AppSec [Promised Fantasy Wonder]land.en.srt
|
80.1 KB
|
Living in AppSec [Promised Fantasy Wonder]land.mp4
|
74.3 MB
|
Lost in Translation Communicating Outside of Security.en.srt
|
43.1 KB
|
Lost in Translation Communicating Outside of Security.mp4
|
48.8 MB
|
Micro-services Challenges - Istio to the Rescue.en.srt
|
62.9 KB
|
Micro-services Challenges - Istio to the Rescue.mp4
|
99.0 MB
|
NetFlow Where We're Going, We Don't Need... NetFlow.en.srt
|
66.0 KB
|
NetFlow Where We're Going, We Don't Need... NetFlow.mp4
|
52.6 MB
|
Nifty Network Discovery.en.srt
|
127.3 KB
|
Nifty Network Discovery.mp4
|
69.0 MB
|
Offensive Threat Models Against the Supply Chain.en.srt
|
90.4 KB
|
Offensive Threat Models Against the Supply Chain.mp4
|
69.8 MB
|
On the Internet, nobody knows you're a dog - Revisiting the meme after 25 years.en.srt
|
106.2 KB
|
On the Internet, nobody knows you're a dog - Revisiting the meme after 25 years.mp4
|
95.4 MB
|
Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol.en.srt
|
61.8 KB
|
Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol.mp4
|
34.9 MB
|
Running FaaS with Scissors.en.srt
|
75.3 KB
|
Running FaaS with Scissors.mp4
|
86.3 MB
|
Securability - Shannon Leitz.en.srt
|
91.1 KB
|
Securability - Shannon Leitz.mp4
|
72.9 MB
|
Securing Modern API and Microservice Based Applications by Design..en.srt
|
110.5 KB
|
Securing Modern API and Microservice Based Applications by Design..mp4
|
110.2 MB
|
Security Code Analysis is for Everyone.mp4
|
80.5 MB
|
Security Instrumentation Is the Future of All Software.en.srt
|
102.6 KB
|
Security Instrumentation Is the Future of All Software.mp4
|
84.6 MB
|
Security Management 101 Practical Techniques They Should've Taught You.en.srt
|
96.1 KB
|
Security Management 101 Practical Techniques They Should've Taught You.mp4
|
35.0 MB
|
Sexy Mobile App Attacks by Example.en.srt
|
77.9 KB
|
Sexy Mobile App Attacks by Example.mp4
|
90.7 MB
|
Soft Skills Panel.en.srt
|
92.5 KB
|
Soft Skills Panel.mp4
|
94.5 MB
|
The A's, B's, and Four C's ofTesting Cloud-Native Applications.en.srt
|
109.0 KB
|
The A's, B's, and Four C's ofTesting Cloud-Native Applications.mp4
|
19.7 MB
|
The Battle to Address Mobile in the Endpoint Security Space.en.srt
|
41.2 KB
|
The Battle to Address Mobile in the Endpoint Security Space.mp4
|
46.7 MB
|
The End of the AppSec Team.en.srt
|
81.0 KB
|
The End of the AppSec Team.mp4
|
94.7 MB
|
Threat Modelling Stories from the Trenches.en.srt
|
95.8 KB
|
Threat Modelling Stories from the Trenches.mp4
|
48.9 MB
|
Thwarting Intruders with Ever Morphing Infrastructure.mp4
|
44.4 MB
|
/LASCON 2021/
|
A Hacker's Guide to Blockchain, Smart Contracts, and NFTs.eng.srt
|
120.2 KB
|
A Hacker's Guide to Blockchain, Smart Contracts, and NFTs.mp4
|
98.5 MB
|
API Security Is it the new application attack surface and how to secure at enterprise scale.eng.srt
|
55.4 KB
|
API Security Is it the new application attack surface and how to secure at enterprise scale.mp4
|
52.1 MB
|
BRICK'D - Making End User AppSec Training Awesome with building bricks.eng.srt
|
62.6 KB
|
BRICK'D - Making End User AppSec Training Awesome with building bricks.mp4
|
66.5 MB
|
Climbing AppSec Mountains (and how to summit).eng.srt
|
100.6 KB
|
Climbing AppSec Mountains (and how to summit).mp4
|
81.4 MB
|
Cloud security and Compliance.eng.srt
|
103.6 KB
|
Cloud security and Compliance.mp4
|
89.0 MB
|
Cloud Security Scaled The Chaos Continues.eng.srt
|
99.3 KB
|
Cloud Security Scaled The Chaos Continues.mp4
|
56.1 MB
|
Comparing WAF and RASP, Why.eng.srt
|
102.8 KB
|
Comparing WAF and RASP, Why.mp4
|
75.2 MB
|
Detection Engineering Methodologies.eng.srt
|
94.3 KB
|
Detection Engineering Methodologies.mp4
|
98.2 MB
|
Developing and Managing an OWASP Project (Projects 101).eng.srt
|
66.0 KB
|
Developing and Managing an OWASP Project (Projects 101).mp4
|
50.7 MB
|
Doing This One Crazy Thing Will Change Your AppSec Program Forever.eng.srt
|
112.2 KB
|
Doing This One Crazy Thing Will Change Your AppSec Program Forever.mp4
|
32.5 MB
|
Get funding for your Security Initiatives by thinking like a MBA not a CISSP.eng.srt
|
93.4 KB
|
Get funding for your Security Initiatives by thinking like a MBA not a CISSP.mp4
|
58.7 MB
|
How security can keep pace with continuously evolving cloud-native applications.eng.srt
|
88.7 KB
|
How security can keep pace with continuously evolving cloud-native applications.mp4
|
62.4 MB
|
Infosec metrics that your bosses will love.eng.srt
|
68.6 KB
|
Infosec metrics that your bosses will love.mp4
|
53.9 MB
|
Insiders Guide to Mobile AppSec with OWASP MASVS.eng.srt
|
117.7 KB
|
Insiders Guide to Mobile AppSec with OWASP MASVS.mp4
|
69.0 MB
|
Introduction to inner-loop security. Shifting left, but better..eng.srt
|
101.1 KB
|
Introduction to inner-loop security. Shifting left, but better.mp4
|
70.8 MB
|
Invited Speaker - Charisse Castagnoli.eng.srt
|
111.5 KB
|
Invited Speaker - Charisse Castagnoli.mp4
|
88.9 MB
|
JWTs - Patterns & Anti-patterns.eng.srt
|
63.3 KB
|
JWTs - Patterns & Anti-patterns.mp4
|
34.3 MB
|
Keynote - Dan Cornell.eng.srt
|
89.4 KB
|
Keynote - Dan Cornell.mp4
|
71.6 MB
|
Manual JavaScript Analysis is a Bug.eng.srt
|
96.4 KB
|
Manual JavaScript Analysis is a Bug.mp4
|
78.8 MB
|
Privacy Impact Assessments - how much privacy is enough.eng.srt
|
81.4 KB
|
Privacy Impact Assessments - how much privacy is enough.mp4
|
61.9 MB
|
Security Observability 101 Thinking Inside the Box.eng.srt
|
108.1 KB
|
Security Observability 101 Thinking Inside the Box.mp4
|
97.8 MB
|
Security while scaling Agile - lessons learned.eng.srt
|
85.0 KB
|
Security while scaling Agile - lessons learned.mp4
|
74.3 MB
|
Shifting Engineering Right What security engineers can learn from DevSecOps.eng.srt
|
97.6 KB
|
Shifting Engineering Right What security engineers can learn from DevSecOps.mp4
|
67.6 MB
|
SSL Hell.eng.srt
|
60.2 KB
|
SSL Hell.mp4
|
46.5 MB
|
The Final Frontier, Automating DYNAMIC Security Testing.eng.srt
|
87.0 KB
|
The Final Frontier, Automating DYNAMIC Security Testing.mp4
|
66.4 MB
|
The Software Security Testing Lifecycle The framework testers need.eng.srt
|
103.4 KB
|
The Software Security Testing Lifecycle The framework testers need.mp4
|
90.6 MB
|
TMI, the kinds of data your applications are leaking.eng.srt
|
82.4 KB
|
TMI, the kinds of data your applications are leaking.mp4
|
93.4 MB
|
Using the Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program.eng.srt
|
139.0 KB
|
Using the Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program.mp4
|
79.8 MB
|
WAF - Your frontier defense.eng.srt
|
97.1 KB
|
WAF - Your frontier defense.mp4
|
42.0 MB
|
Writing Policies That Aren’t Miserable for Everyone Involved.eng.srt
|
68.4 KB
|
Writing Policies That Aren’t Miserable for Everyone Involved.mp4
|
52.1 MB
|
/LASCON 2022/
|
'Who allowed you to do that' Detecting and Controlling Rogue Third-Party Scripts - Brad Burkle.eng.srt
|
83.2 KB
|
'Who allowed you to do that' Detecting and Controlling Rogue Third-Party Scripts - Brad Burkle.mp4
|
76.7 MB
|
A visual journey to demystifying OAuth2 and OIDC - Anton Aleksandrov.eng.srt
|
92.2 KB
|
A visual journey to demystifying OAuth2 and OIDC - Anton Aleksandrov.mp4
|
93.1 MB
|
API Security Through External Attack Surface Management - Phillip Wylie.eng.srt
|
69.1 KB
|
API Security Through External Attack Surface Management - Phillip Wylie.mp4
|
53.1 MB
|
Automating App Security Tests in Development, with Docker - Gabe Schuyler.eng.srt
|
71.6 KB
|
Automating App Security Tests in Development, with Docker - Gabe Schuyler.mp4
|
73.4 MB
|
Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi.eng.srt
|
107.0 KB
|
Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi.mp4
|
85.7 MB
|
Can you keep a secret - An Overview of the OWASP Secrets Management Cheat Sheet - Jet Anderson.eng.srt
|
59.0 KB
|
Can you keep a secret - An Overview of the OWASP Secrets Management Cheat Sheet - Jet Anderson.mp4
|
54.5 MB
|
Close Encounters of the Vulnerable Kind A DevSecOps Odyssey - Pranshu Bajpai.eng.srt
|
103.7 KB
|
Close Encounters of the Vulnerable Kind A DevSecOps Odyssey - Pranshu Bajpai.mp4
|
98.8 MB
|
Defense-in-Depth Engineering - John Poulin.eng.srt
|
100.3 KB
|
Defense-in-Depth Engineering - John Poulin.mp4
|
67.9 MB
|
Design-Level Supply Chain Attacks In The Real World - Moshe Zioni.mp4
|
81.1 MB
|
DSOMM from Theory to Enforcement - Chris Koehnecke.eng.srt
|
86.9 KB
|
DSOMM from Theory to Enforcement - Chris Koehnecke.mp4
|
64.3 MB
|
Elite Security Champions Build Strong Security Culture - Chris Romeo.eng.srt
|
108.4 KB
|
Elite Security Champions Build Strong Security Culture - Chris Romeo.mp4
|
77.4 MB
|
FAIR STRIDE - Building business relevant AppSec threat models - Arthur Loris.eng.srt
|
91.9 KB
|
FAIR STRIDE - Building business relevant AppSec threat models - Arthur Loris.mp4
|
57.4 MB
|
Fuzzers, analyzers, and other Gophers insecticides - Alex (hex0punk) Useche.eng.srt
|
99.9 KB
|
Fuzzers, analyzers, and other Gophers insecticides - Alex (hex0punk) Useche.mp4
|
83.4 MB
|
Hacking and Defending APIs - Red and Blue make Purple. - Matt Tesauro.eng.srt
|
107.5 KB
|
Hacking and Defending APIs - Red and Blue make Purple. - Matt Tesauro.mp4
|
97.4 MB
|
Hacking JavaScript Desktop apps with XSS and RCE - Abraham Aranguren.eng.srt
|
82.9 KB
|
Hacking JavaScript Desktop apps with XSS and RCE - Abraham Aranguren.mp4
|
61.7 MB
|
How To Hack An API In 15 Minutes - Igor Matlin.eng.srt
|
61.3 KB
|
How To Hack An API In 15 Minutes - Igor Matlin.mp4
|
79.8 MB
|
How to scan at scale with OWASP ZAP - Tiago Mendo.eng.srt
|
89.2 KB
|
How to scan at scale with OWASP ZAP - Tiago Mendo.mp4
|
95.3 MB
|
Invited - Amiran Alavidze - Securing Managed Kubernetes Clusters.eng.srt
|
92.3 KB
|
Invited - Amiran Alavidze - Securing Managed Kubernetes Clusters.mp4
|
80.5 MB
|
Invited - Chris Roberts - Charles Valentine.eng.srt
|
104.4 KB
|
Invited - Chris Roberts - Charles Valentine.mp4
|
88.0 MB
|
Invited - Dan Cornell - Drivers for Software Supply Chain Security Programs.eng.srt
|
116.3 KB
|
Invited - Dan Cornell - Drivers for Software Supply Chain Security Programs.mp4
|
85.2 MB
|
Invited - Garrett Gross - 10lbs of tacos in a 5lb bag Lessons Learned from Security Operations.mp4
|
79.8 MB
|
Invited - Garrett Gross - 10lbs of tacos in a 5lb bag Lessons Learned from Security Operationseng.srt
|
117.7 KB
|
Invited - James Wickett - DevSecOps Warning Signs and What to Do About Them.eng.srt
|
71.8 KB
|
Invited - James Wickett - DevSecOps Warning Signs and What to Do About Them.mp4
|
48.9 MB
|
Invited - Jeff Williams - The Case for Runtime Protection.eng.srt
|
97.0 KB
|
Invited - Jeff Williams - The Case for Runtime Protection.mp4
|
82.6 MB
|
Invited - Josh Sokol - The Security Practitioner’s Guide to Going from No to Whoa.eng.srt
|
85.3 KB
|
Invited - Josh Sokol - The Security Practitioner’s Guide to Going from No to Whoa.mp4
|
69.4 MB
|
Invited - Marcus J. Carey - Hacking Blockchain & Hacking Blockchain.eng.srt
|
94.1 KB
|
Invited - Marcus J. Carey - Hacking Blockchain & Hacking Blockchain.mp4
|
63.5 MB
|
Invited - Rafal Los- - Irrational by Effective - Applying Parenthood Lessons to Cybersecurity.eng.srt
|
80.0 KB
|
Invited - Rafal Los- - Irrational by Effective - Applying Parenthood Lessons to Cybersecurity.mp4
|
25.3 MB
|
Invited - Robert Hansen - Infosec is Sick.eng.srt
|
101.7 KB
|
Invited - Robert Hansen - Infosec is Sick.mp4
|
76.5 MB
|
Invited - Theresa Lanowitz - Securing the Edge.eng.srt
|
76.1 KB
|
Invited - Theresa Lanowitz - Securing the Edge.mp4
|
69.4 MB
|
Keynote - Adrian Sanabria - Indistinguishable from Magic How the Cybersecurity Market Reached.eng.srt
|
100.5 KB
|
Keynote - Adrian Sanabria - Indistinguishable from Magic How the Cybersecurity Market Reached.mp4
|
89.3 MB
|
Keynote - Jim Manico - The Abridged History of Application Security.eng.srt
|
67.9 KB
|
Keynote - Jim Manico - The Abridged History of Application Security.mp4
|
65.4 MB
|
Knowing What Risks Matter - And Don’t - In Your Open Source - Naomi Buckwalter.eng.srt
|
82.0 KB
|
Knowing What Risks Matter - And Don’t - In Your Open Source - Naomi Buckwalter.mp4
|
68.3 MB
|
LASCON 2022 Video Introduction.mp4
|
1.6 MB
|
Lessons Learned Building a Software Supply Chain Security Team - Josh Wallace.eng.srt
|
112.9 KB
|
Lessons Learned Building a Software Supply Chain Security Team - Josh Wallace.mp4
|
94.3 MB
|
No Code No Risk What Happens When We Leave No Code up for Grabs - Michael Bargury.eng.srt
|
89.0 KB
|
No Code No Risk What Happens When We Leave No Code up for Grabs - Michael Bargury.mp4
|
60.3 MB
|
No, We Won't Be Threat Modeling - Izar Tarandach.eng.srt
|
109.4 KB
|
No, We Won't Be Threat Modeling - Izar Tarandach.mp4
|
96.1 MB
|
Social Engineering Your Metrics Using Data Science to Provide Value in Reporting - Joe Gray.eng.srt
|
82.9 KB
|
Social Engineering Your Metrics Using Data Science to Provide Value in Reporting - Joe Gray.mp4
|
62.2 MB
|
Spies, Saboteurs & ScoundrelsHow Russia, China & Nefarious Actors Are Hacking IOT,- John Vecchi.mp4
|
118.7 MB
|
The DevSecOps Playbook A step-by-step guide to implementing DevSecOps - Paul McCarty.eng.srt
|
108.5 KB
|
The DevSecOps Playbook A step-by-step guide to implementing DevSecOps - Paul McCarty.mp4
|
87.0 MB
|
Tips and Tactics for Creating Your Own CTF Event - Adam Schaal.eng.srt
|
95.7 KB
|
Tips and Tactics for Creating Your Own CTF Event - Adam Schaal.mp4
|
88.1 MB
|
Using your API Specs to attack your APIs - Jason Kent.eng.srt
|
101.6 KB
|
Using your API Specs to attack your APIs - Jason Kent.mp4
|
112.9 MB
|
Who watches the watchers - Including ITSM, ITOM, APM, and CMDB in your audits - Joseph Konieczka.eng.srt
|
48.9 KB
|
Who watches the watchers - Including ITSM, ITOM, APM, and CMDB in your audits - Joseph Konieczka.mp4
|
52.4 MB
|
Working through your trust issues - Niclas Kjellin.eng.srt
|
86.3 KB
|
Working through your trust issues - Niclas Kjellin.mp4
|
74.0 MB
|
/LASCON 2023/
|
Aaron Guzman - System Assurance with the IoT Security Testing Guide.eng.srt
|
89.1 KB
|
Aaron Guzman - System Assurance with the IoT Security Testing Guide.mp4
|
92.8 MB
|
Abraham Aranguren - Leave Home Safe The Good, the Bad, the Ugly.eng.srt
|
111.6 KB
|
Abraham Aranguren - Leave Home Safe The Good, the Bad, the Ugly.mp4
|
112.5 MB
|
Akanksha Pathak - Unlocking Startup Success The Vitality of Security Assessments and How to ..mp4
|
73.6 MB
|
Akanksha Pathak - Unlocking Startup Success The Vitality of Security Assessments and How toeng.srt
|
85.0 KB
|
Amish Shah - Unveiling the Vulnerabilities Hacking Cloud Native Apps and Discovering ..mp4
|
93.5 MB
|
Amish Shah - Unveiling the Vulnerabilities Hacking Cloud Native Apps and Discoveringeng.srt
|
80.2 KB
|
Andy Lewis - 3cx lessons learned.eng.srt
|
70.5 KB
|
Andy Lewis - 3cx lessons learned.mp4
|
98.8 MB
|
Anton Aleksandrov - A visual journey to reverse-engineering the Enigma Machine - preventing MITM ..mp4
|
78.2 MB
|
Anton Aleksandrov - A visual journey to reverse-engineering the Enigma Machine - preventing MITMeng.srt
|
87.0 KB
|
Baruch Mettler - Easy-bake IR - Automated incident response using the power of APIs.eng.srt
|
49.0 KB
|
Baruch Mettler - Easy-bake IR - Automated incident response using the power of APIs.mp4
|
55.2 MB
|
Benoit Famechon & Karen Lu - Who IAM - a Closer Look at IAM and CIAM.eng.srt
|
67.8 KB
|
Benoit Famechon & Karen Lu - Who IAM - a Closer Look at IAM and CIAM.mp4
|
77.4 MB
|
Bertold Kolics - Defensive API development techniques for Gophers.eng.srt
|
86.8 KB
|
Bertold Kolics - Defensive API development techniques for Gophers.mp4
|
101.5 MB
|
Brian Reed - Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project.eng.srt
|
113.2 KB
|
Brian Reed - Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project.mp4
|
98.1 MB
|
Chris Koehnecke - Velocity - Safety Security Metrics All DevOps Should Care About.eng.srt
|
88.9 KB
|
Chris Koehnecke - Velocity - Safety Security Metrics All DevOps Should Care About.mp4
|
65.8 MB
|
Chris McGranahan - Cybersecurity Architecture in the Age of Covid.eng.srt
|
71.3 KB
|
Chris McGranahan - Cybersecurity Architecture in the Age of Covid.mp4
|
70.2 MB
|
Dave Ferguson - Beyond Vulnerabilities Analyzing Behaviors to Spot Malware in Your Release.eng.srt
|
86.2 KB
|
Dave Ferguson - Beyond Vulnerabilities Analyzing Behaviors to Spot Malware in Your Release.mp4
|
86.7 MB
|
Eitan Mobb - Why can't tools automatically fix security vulnerabilities Or can they.eng.srt
|
86.8 KB
|
Eitan Mobb - Why can't tools automatically fix security vulnerabilities Or can they.mp4
|
69.6 MB
|
Invited - Garrett Gross - Invited-Full of SaaS and TOTALLY SECURE.eng.srt
|
102.4 KB
|
Invited - Garrett Gross - Invited-Full of SaaS and TOTALLY SECURE.mp4
|
90.0 MB
|
Invited - Jason Kent - All Day All Night API Security Endpoint Analytics.eng.srt
|
87.2 KB
|
Invited - Jason Kent - All Day All Night API Security Endpoint Analytics.mp4
|
90.0 MB
|
Invited - Jim Manico - Enhancing ReactJS Application Security XSS Scripting and Client-Side Defense.eng.srt
|
106.3 KB
|
Invited - Jim Manico - Enhancing ReactJS Application Security XSS Scripting and Client-Side Defense.mp4
|
89.6 MB
|
Invited - Karen Lu - A new recipe for security risk evaluation.eng.srt
|
71.4 KB
|
Invited - Karen Lu - A new recipe for security risk evaluation.mp4
|
75.9 MB
|
Invited - Marc Spears.eng.srt
|
90.6 KB
|
Invited - Marc Spears.mp4
|
69.0 MB
|
Invited - Marcus Carey - It's a Bird, It's a Plane, It's A.I..eng.srt
|
95.5 KB
|
Invited - Marcus Carey - It's a Bird, It's a Plane, It's A.I.mp4
|
81.4 MB
|
Invited - Matt Tesauro - Tenants for Going at DevSecOps Speed.eng.srt
|
91.6 KB
|
Invited - Matt Tesauro - Tenants for Going at DevSecOps Speed.mp4
|
79.2 MB
|
Invited - Theresa Lanowitz - 2023 AT&T Cybersecurity Insights Report Edge Ecosystem.eng.srt
|
78.8 KB
|
Invited - Theresa Lanowitz - 2023 AT&T Cybersecurity Insights Report Edge Ecosystem.mp4
|
78.1 MB
|
Invited Alan Proctor, Josh Sokol - From Zero to ISO 27k Compliance.eng.srt
|
91.6 KB
|
Invited Alan Proctor, Josh Sokol - From Zero to ISO 27k Compliance.mp4
|
60.4 MB
|
Jamon Camisso - Wolfi A Secure-by-Default Distro for Curing Container CVE Chaos.eng.srt
|
115.1 KB
|
Jamon Camisso - Wolfi A Secure-by-Default Distro for Curing Container CVE Chaos.mp4
|
103.8 MB
|
Josh Dreyfuss - The road to AppSec Maturity is through Unification.eng.srt
|
57.9 KB
|
Josh Dreyfuss - The road to AppSec Maturity is through Unification.mp4
|
49.5 MB
|
Keith Thomas - How To Apply DevSecOps Shift-Left Security with OWASP ZAP.eng.srt
|
40.9 KB
|
Keith Thomas - How To Apply DevSecOps Shift-Left Security with OWASP ZAP.mp4
|
36.9 MB
|
Ken Johnson, Seth Law - State of {Absolute} AppSec.eng.srt
|
109.5 KB
|
Ken Johnson, Seth Law - State of {Absolute} AppSec.mp4
|
108.5 MB
|
Keynote - Shannon Lietz.eng.srt
|
95.0 KB
|
Keynote - Shannon Lietz.mp4
|
88.9 MB
|
Kiran Kamity - Reducing Alert Fatigue with Container Scans Correlate, Prioritize and Filter ..mp4
|
70.1 MB
|
Kiran Kamity - Reducing Alert Fatigue with Container Scans Correlate, Prioritize and Filtereng.srt
|
84.0 KB
|
Louis Barrett - Small Language Models for Application Security - Beyond ChatGPT.eng.srt
|
122.3 KB
|
Louis Barrett - Small Language Models for Application Security - Beyond ChatGPT.mp4
|
105.7 MB
|
Matthew Rose - The Monsters in Your Software Supply Chain That SCA Can't Find.eng.srt
|
56.0 KB
|
Matthew Rose - The Monsters in Your Software Supply Chain That SCA Can't Find.mp4
|
61.2 MB
|
Mike McCabe - Infrastructure as Remote Code Execution How to abuse Terraform to elevate access.eng.srt
|
68.3 KB
|
Mike McCabe - Infrastructure as Remote Code Execution How to abuse Terraform to elevate access.mp4
|
56.5 MB
|
Nick Leghorn - Building a Risk Based Vulnerability Management Program.eng.srt
|
78.2 KB
|
Nick Leghorn - Building a Risk Based Vulnerability Management Program.mp4
|
84.6 MB
|
Oleg Gryb - Five Pillars of Security Automation.eng.srt
|
84.4 KB
|
Oleg Gryb - Five Pillars of Security Automation.mp4
|
91.2 MB
|
Petr Sidopulos - Discovering and Empowering the Expert-Level Cybersecurity Talent Within Your Team.eng.srt
|
67.8 KB
|
Petr Sidopulos - Discovering and Empowering the Expert-Level Cybersecurity Talent Within Your Team.mp4
|
65.9 MB
|
Ragasharee M C, Anoop Chandra B N - Security Safari A Journey Through the Wilderness of Securing ..mp4
|
35.8 MB
|
Ragasharee M C, Anoop Chandra B N - Security Safari A Journey Through the Wilderness of Securingeng.srt
|
38.5 KB
|
Rob Mixer - Top Gun's unsung hero - a surprising lesson for CI CD security.eng.srt
|
81.2 KB
|
Rob Mixer - Top Gun's unsung hero - a surprising lesson for CI CD security.mp4
|
69.4 MB
|
Rob Truesdell - Securing Generative AI - Back to the Future Edition.eng.srt
|
63.7 KB
|
Rob Truesdell - Securing Generative AI - Back to the Future Edition.mp4
|
53.9 MB
|
Robert Hurlbut - Advancing Your Threat Modeling Approaches in an Agile - DevOps World.eng.srt
|
84.5 KB
|
Robert Hurlbut - Advancing Your Threat Modeling Approaches in an Agile - DevOps World.mp4
|
61.4 MB
|
Sean Poris - All About the Benjamins Building a Business-Critical Bug Bounty Program.eng.srt
|
102.6 KB
|
Sean Poris - All About the Benjamins Building a Business-Critical Bug Bounty Program.mp4
|
81.4 MB
|
Tony UV - PASTA Threat Modeling & Leveraging IR, Threat Intelligence as Means for Tactical Pen Test.eng.srt
|
93.0 KB
|
Tony UV - PASTA Threat Modeling & Leveraging IR, Threat Intelligence as Means for Tactical Pen Test.mp4
|
81.6 MB
|
Vinay Prabhushanker, Murali Vadakke Puthanveetil - Navigating Sec pitfalls during M&APlaybooks &..mp4
|
82.0 MB
|
Vinay Prabhushanker, Murali Vadakke Puthanveetil - Navigating Sec pitfalls during M&APlaybooks &eng.srt
|
85.5 KB
|
Viswanath S Chirravuri - Fortifying DevOps Unveiling Security Activities and Maturity Models for ..mp4
|
77.7 MB
|
Viswanath S Chirravuri - Fortifying DevOps Unveiling Security Activities and Maturity Models foreng.srt
|
96.9 KB
|
Total files 840
|