FileMood

Download LASCON

LASCON

Name

LASCON

 DOWNLOAD Copy Link

Total Size

29.3 GB

Total Files

840

Last Seen

2024-11-19 23:24

Hash

311D5AF1C8CD78995089C26DE58D5C7B524E30D2

/

LASCON Logo.jpg

37.7 KB

LASCON thank you.txt

0.9 KB

/LASCON 2011/

Automated vs. Manual Security - You can't scan for The Stupid - charles and david.mp4

30.3 MB

Beautiful Payment Systems with OAuth - Tom Brown.eng.srt

17.3 KB

Beautiful Payment Systems with OAuth - Tom Brown.mp4

29.8 MB

Ghosts of XSS Past, Present and Future - Jim Manico.eng.srt

108.0 KB

Ghosts of XSS Past, Present and Future - Jim Manico.mp4

45.5 MB

Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.eng.srt

137.5 KB

Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.mp4

42.7 MB

Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.eng.srt

96.1 KB

Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.mp4

34.4 MB

How to build a secure login - Ben Broussard.eng.srt

102.0 KB

How to build a secure login - Ben Broussard.mp4

38.6 MB

Infosec In The New World Order - Rugged DevOps And More ... - Gene Kim.eng.srt

123.9 KB

Infosec In The New World Order - Rugged DevOps And More ... - Gene Kim.mp4

40.5 MB

Matt Tesauro Keynote.eng.srt

120.2 KB

Matt Tesauro Keynote.mp4

41.5 MB

Obfuscation in Javascript- herrera.eng.srt

95.0 KB

Obfuscation in Javascript- herrera.mp4

31.6 MB

opensamm in the Real World- Philip J.Beyer, Scott Stevens.eng.srt

119.1 KB

opensamm in the Real World- Philip J.Beyer, Scott Stevens.mp4

42.3 MB

PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.eng.srt

111.4 KB

PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.mp4

40.8 MB

Reversing Web Applications - Andrew Wilson.eng.srt

141.9 KB

Reversing Web Applications - Andrew Wilson.mp4

44.0 MB

SDL- A History -Michael Howard.eng.srt

103.6 KB

SDL- A History -Michael Howard.mp4

47.7 MB

Social Engineering - David Hughes.eng.srt

93.6 KB

Social Engineering - David Hughes.mp4

40.5 MB

Software Assurance- Joe Jarzombek.eng.srt

18.7 KB

Software Assurance- Joe Jarzombek.mp4

5.9 MB

You're Going to Need a Bigger Shovel - Rafa Los.eng.srt

41.7 KB

You're Going to Need a Bigger Shovel - Rafa Los.mp4

17.7 MB

/LASCON 2012/

An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts.eng.srt

180.9 KB

An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts.mp4

54.2 MB

Android Security, or this is not the kind of 'open' I meant with Mike Park, Trustwave SpiderLabs.mp4

32.4 MB

Application Security & User Experience with Alex Smolen.mp4

25.1 MB

Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti.eng.srt

1.4 KB

Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti.mp4

53.0 MB

Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode.eng.srt

1.5 KB

Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode.mp4

26.9 MB

AppSec Inception Exploiting Software Culture with Jeff Williams, Aspect Security, CEO.mp4

36.1 MB

Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems.eng.srt

80.2 KB

Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems.mp4

25.7 MB

Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw.eng.srt

50.5 KB

Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw.mp4

26.2 MB

Community The Killer App with Mark Curphey, OWASP.mp4

46.1 MB

Coud Sec 12 Step with Adrian Lane, Securosis, LLC.eng.srt

99.7 KB

Coud Sec 12 Step with Adrian Lane, Securosis, LLC.mp4

31.3 MB

Emerging Threats in Mobile Computing with Adam Meyers SRA International.mp4

43.2 MB

Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal.eng.srt

101.0 KB

Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal.mp4

41.2 MB

Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall, ESAPI Project co owner.mp4

9.9 MB

Ghosts of XSS Past, Present & Future with Jim Manico, WhiteHat Security.mp4

30.8 MB

Gray, the New Black, Gray Box Vulnerability Testing with Brian Chess, Ph D.mp4

27.7 MB

Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs.mp4

29.6 MB

Hacking NET Applications, The Black Arts with Jon McCoy, DigitalBodyGuard.com.mp4

57.9 MB

How To Recruit Spies on the Internet with Ira Winkler, CISSP.mp4

37.1 MB

Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs.eng.srt

112.9 KB

Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs.mp4

40.1 MB

Improve your SDLC with CAPEC and CWE with Ryan Stinson, KCG.mp4

24.5 MB

Keeping Up with the Web Application Security with Ganesh Devarajan & Todd Redfoot.mp4

34.0 MB

Lesson Learned Building Secure ASP NET Applications with Tom Fischer.mp4

28.4 MB

Messaging Security Using GlassFish & Open Message Queue with Srini Penchikala.mp4

21.8 MB

Mobile Web Services with Gunnar Peterson.eng.srt

0.4 KB

Mobile Web Services with Gunnar Peterson.mp4

47.2 MB

Next Generation Web Attacks HTML 5, DOM L3 and XHR L2 with Shreeraj Shah, Blueinfy Solutions Pvt.mp4

38.7 MB

OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates.eng.srt

1.7 KB

OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates.mp4

32.4 MB

OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier.eng.srt

116.5 KB

OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier.mp4

35.0 MB

Panel Discussion Making it in Information Security & Application Security.eng.srt

1.5 KB

Panel Discussion Making it in Information Security & Application Security.mp4

45.4 MB

Principles of Patrolling, Applying Ranger School Lessons to Information Security with Patrick Tatro.mp4

26.4 MB

Recap and Looking Ahead to the Next ten Years and Appsec USA 2012.mp4

11.3 MB

Secure Development Considerations for Cloud Virtual Environments with Andrew Murren.eng.srt

74.1 KB

Secure Development Considerations for Cloud Virtual Environments with Andrew Murren.mp4

29.2 MB

Secure Programming Support in IDE with Bill Chu and Jing Xie.eng.srt

101.7 KB

Secure Programming Support in IDE with Bill Chu and Jing Xie.mp4

35.4 MB

Simplifying Threat Modeling with Mike Ware, Cigital.mp4

29.6 MB

Six Key Metrics A Look at the Future of AppSec with Arian Evans.mp4

35.4 MB

Software Assurance Automation Throughout the Lifecycle with Richard Struse.mp4

35.6 MB

Software Security Is OK Good Enough with John B Dickson, CISSP.mp4

31.5 MB

SSL And The Future of Authenticity with Moxie Marlinspike -Keynote.eng.srt

141.5 KB

SSL And The Future of Authenticity with Moxie Marlinspike -Keynote.mp4

28.6 MB

STAAF An Efficient Distributed Framework for Performing Large Scale Android Application Analysis.mp4

35.4 MB

Sticking to the Facts Scientific Study of Static Analysis Tools with Britton Willis.mp4

33.4 MB

Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member.eng.srt

47.1 KB

Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member.mp4

15.2 MB

The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody.eng.srt

113.4 KB

The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody.mp4

29.5 MB

Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu.eng.srt

86.4 KB

Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu.mp4

31.0 MB

Web Application Security Payloads with Andres Riancho, RAPID 7.mp4

37.3 MB

Why Do Developers Make Dangerous Software Errors with Michele Moss & Nadya Bartol.mp4

31.5 MB

You're Not Done Yet Turning Securable Apps into Secure Installations using SCAP with Charles Schmi.mp4

29.1 MB

/LASCON 2013/

5 Proven Success Strategies for your Software Security Program -Bankim Tejani.eng.srt

108.9 KB

5 Proven Success Strategies for your Software Security Program -Bankim Tejani.mp4

72.8 MB

Big Data, Little Security - Practical Steps for securing Big Data -Manoj Tripathi.eng.srt

99.5 KB

Big Data, Little Security - Practical Steps for securing Big Data -Manoj Tripathi.mp4

80.8 MB

Blindspots Keynote with Robert Hansen.eng.srt

104.4 KB

Blindspots Keynote with Robert Hansen.mp4

61.6 MB

Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.eng.srt

117.2 KB

Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.mp4

83.3 MB

Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.eng.srt

107.5 KB

Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.mp4

65.2 MB

DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.eng.srt

69.4 KB

DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.mp4

48.1 MB

Do you have a Scanner, or a Scanning Program -Dan Cornell.eng.srt

121.4 KB

Do you have a Scanner, or a Scanning Program -Dan Cornell.mp4

80.2 MB

Drawing the map Outlining Android permissions mechanism -Andrew Reiter.eng.srt

89.8 KB

Drawing the map Outlining Android permissions mechanism -Andrew Reiter.mp4

42.0 MB

Enforcing Authorization with Cryptography -Amit Sethi.eng.srt

60.6 KB

Enforcing Authorization with Cryptography -Amit Sethi.mp4

42.7 MB

From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.eng.srt

111.1 KB

From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.mp4

79.9 MB

Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.eng.srt

98.7 KB

Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.mp4

69.6 MB

Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.eng.srt

91.8 KB

Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.mp4

56.0 MB

How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.eng.srt

115.5 KB

How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.mp4

64.4 MB

How overlay networks can make public clouds your global WAN network - Ryan Koop.eng.srt

90.2 KB

How overlay networks can make public clouds your global WAN network - Ryan Koop.mp4

79.9 MB

Ice Cream 'sudo make me a' Sandwich -Max Sobell.eng.srt

82.6 KB

Ice Cream 'sudo make me a' Sandwich -Max Sobell.mp4

54.3 MB

Malware Automation -Christopher Elisan.eng.srt

97.8 KB

Malware Automation -Christopher Elisan.mp4

64.2 MB

Million Browser Botnet -Matt Johansen.eng.srt

106.0 KB

Million Browser Botnet -Matt Johansen.mp4

65.4 MB

Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.eng.srt

95.2 KB

Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.mp4

58.8 MB

Mobile AppSec Development and Alphabet Soup -David Lindner.eng.srt

100.4 KB

Mobile AppSec Development and Alphabet Soup -David Lindner.mp4

55.4 MB

No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.eng.srt

118.4 KB

No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.mp4

63.0 MB

OWASP Top Ten Proactive Controls -Jim Manico.eng.srt

153.0 KB

OWASP Top Ten Proactive Controls -Jim Manico.mp4

80.3 MB

Penetration Testing The Other Stuff -David Hughes.eng.srt

121.6 KB

Penetration Testing The Other Stuff -David Hughes.mp4

80.6 MB

Practical PKI -Steven Bernstein.eng.srt

93.6 KB

Practical PKI -Steven Bernstein.mp4

58.3 MB

Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.eng.srt

70.2 KB

Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.mp4

43.8 MB

Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.eng.srt

87.4 KB

Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.mp4

59.3 MB

Riding the Magical Code Injection Rainbow -Daniel Crowley.eng.srt

70.8 KB

Riding the Magical Code Injection Rainbow -Daniel Crowley.mp4

58.9 MB

Rugged Driven Development with Gauntlt -James Wickett.eng.srt

64.9 KB

Rugged Driven Development with Gauntlt -James Wickett.mp4

51.0 MB

Securing Redis with Sedona -Will Urbanski.eng.srt

61.3 KB

Securing Redis with Sedona -Will Urbanski.mp4

45.7 MB

Software and Supply Chain Assurance SSCA -Joe Jarzombek.eng.srt

137.4 KB

Software and Supply Chain Assurance SSCA -Joe Jarzombek.mp4

84.4 MB

Speed Debates -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.eng.srt

109.3 KB

Speed Debates -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.mp4

84.4 MB

Stalking a City for Fun and Frivolity -Brendan O'Connor.eng.srt

172.2 KB

Stalking a City for Fun and Frivolity -Brendan O'Connor.mp4

71.0 MB

Stupid webappsec Tricks -Zane Lackey.eng.srt

119.4 KB

Stupid webappsec Tricks -Zane Lackey.mp4

65.1 MB

The Origins of Insecurity Keynote with Nick Galbreath.mp4

62.4 MB

The Real Cost of Security -Wendy Nather.eng.srt

86.8 KB

The Real Cost of Security -Wendy Nather.mp4

59.3 MB

User Auth for Winners, how to get it right the first time -Karthik Gaekwad.eng.srt

90.1 KB

User Auth for Winners, how to get it right the first time -Karthik Gaekwad.mp4

55.5 MB

View this abstract in your browser -PHIL PURVIANCE.eng.srt

64.5 KB

View this abstract in your browser -PHIL PURVIANCE.mp4

34.8 MB

We are the Cavalry Why it has to be us & why now -Adam Brand.eng.srt

79.2 KB

We are the Cavalry Why it has to be us & why now -Adam Brand.mp4

45.6 MB

Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.eng.srt

87.4 KB

Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.mp4

60.6 MB

/LASCON 2014/

Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.eng.srt

111.2 KB

Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.mp4

88.5 MB

Breach Assessments Are you 0wned You can find out- Jessey Bullock, Kevin Dunn.eng.srt

108.2 KB

Breach Assessments Are you 0wned You can find out- Jessey Bullock, Kevin Dunn.mp4

66.9 MB

Building a Security Engineering Organization for the Modern World- Zane Lackey.eng.srt

131.0 KB

Building a Security Engineering Organization for the Modern World- Zane Lackey.mp4

58.4 MB

Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.eng.srt

97.1 KB

Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.mp4

66.8 MB

Derived Credentials - A better user experience for secure applications in the mobile world.eng.srt

70.9 KB

Derived Credentials - A better user experience for secure applications in the mobile world.mp4

72.4 MB

DevOps, CI, APIs, Oh My Security Gone Agile - Matt Tesauro.eng.srt

121.4 KB

DevOps, CI, APIs, Oh My Security Gone Agile - Matt Tesauro.mp4

89.7 MB

DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.eng.srt

77.9 KB

DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.mp4

47.6 MB

Fireside chat with RSnake.eng.srt

107.4 KB

Fireside chat with RSnake.mp4

67.5 MB

Historical Lessons for Improving Cyber Security Marty Hellman.eng.srt

84.6 KB

Historical Lessons for Improving Cyber Security Marty Hellman.mp4

72.0 MB

How to use adaptive hashes without making yourself vulnerable to DoS attacks.eng.srt

111.8 KB

How to use adaptive hashes without making yourself vulnerable to DoS attacks.mp4

71.0 MB

Implementing a large scale identity theft prevention solution using the cloud.eng.srt

122.7 KB

Implementing a large scale identity theft prevention solution using the cloud.mp4

66.8 MB

In AppSec, Fast Is Everything.eng.srt

101.1 KB

In AppSec, Fast Is Everything.mp4

62.5 MB

Intro to GPG and the Web of Trust.eng.srt

115.3 KB

Intro to GPG and the Web of Trust.mp4

43.5 MB

Is this your pipe Hijacking the build pipeline.eng.srt

39.2 KB

Is this your pipe Hijacking the build pipeline.mp4

33.5 MB

Keynote by Chris Nickerson.eng.srt

109.7 KB

Keynote by Chris Nickerson.mp4

63.1 MB

Methodology for Creation and Practical Applications of Polyglots.eng.srt

71.7 KB

Methodology for Creation and Practical Applications of Polyglots.mp4

69.2 MB

Multi Factor Authentication Weeding Out the Snake Oil - YouTube.eng.srt

79.6 KB

Multi Factor Authentication Weeding Out the Snake Oil - YouTube.mp4

64.2 MB

OpenStack API Security Testing Automation in Action.eng.srt

60.3 KB

OpenStack API Security Testing Automation in Action.mp4

95.6 MB

OWASP Top 10 Proactive Controls.eng.srt

105.0 KB

OWASP Top 10 Proactive Controls.mp4

87.5 MB

Practical AppSec Quick Wins for More Secure Software.eng.srt

76.1 KB

Practical AppSec Quick Wins for More Secure Software.mp4

63.4 MB

Privacy-Re-framing what we think we know.eng.srt

102.2 KB

Privacy-Re-framing what we think we know.mp4

67.2 MB

Risk management for teams that get things done - YouTube.eng.srt

72.3 KB

Risk management for teams that get things done - YouTube.mp4

49.7 MB

Ruby Meta programming Here's how to do it wrong.eng.srt

82.6 KB

Ruby Meta programming Here's how to do it wrong.mp4

49.8 MB

Securing The Android Apps On Your Wrist and Face.mp4

70.0 MB

Security from Inception.mp4

87.9 MB

Security Shark Tank.eng.srt

91.2 KB

Security Shark Tank.mp4

65.9 MB

Seven Grades of Perfect Forward Secrecy.mp4

68.5 MB

Speed Debates.eng.srt

94.1 KB

Speed Debates.mp4

88.1 MB

The State of Crypto in Python.eng.srt

117.4 KB

The State of Crypto in Python.mp4

64.5 MB

Threat Modeling for Linux Containers LXC, Docker and the Cloud.eng.srt

68.7 KB

Threat Modeling for Linux Containers LXC, Docker and the Cloud.mp4

35.4 MB

Understanding and Implementing Rugged.eng.srt

88.5 KB

Understanding and Implementing Rugged.mp4

97.5 MB

Warning Ahead Security Storms are Brewing in Your JavaScript.eng.srt

31.3 KB

Warning Ahead Security Storms are Brewing in Your JavaScript.mp4

26.9 MB

Welcome to the blue team How building a better hacker accidentally built a better defender.eng.srt

64.3 KB

Welcome to the blue team How building a better hacker accidentally built a better defender.mp4

44.7 MB

What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.eng.srt

100.5 KB

What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.mp4

58.3 MB

/LASCON 2015/

Agile Security - The fails that nobody told you about.eng.srt

117.1 KB

Agile Security - The fails that nobody told you about.mp4

63.0 MB

Authz is the new Authn - Trust Elevation with UMA and OpenID Connect.eng.srt

79.5 KB

Authz is the new Authn - Trust Elevation with UMA and OpenID Connect.mp4

59.0 MB

Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.eng.srt

98.6 KB

Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.mp4

66.4 MB

Big Data, What's the Big Deal.eng.srt

90.8 KB

Big Data, What's the Big Deal.mp4

49.4 MB

Connected Vehicle Security.eng.srt

123.5 KB

Connected Vehicle Security.mp4

81.3 MB

Designing Flexibility in Software to Increase Security.eng.srt

104.3 KB

Designing Flexibility in Software to Increase Security.mp4

92.4 MB

Docker Docker Docker Security Docker.eng.srt

95.2 KB

Docker Docker Docker Security Docker.mp4

63.2 MB

Hack the Cloud Hack the Company - the Cloud Impact on Enterprise Security.eng.srt

118.6 KB

Hack the Cloud Hack the Company - the Cloud Impact on Enterprise Security.mp4

54.0 MB

Hack Wars - A New Hope.mp4

35.7 MB

How Google Turned Me Into My Mother - The Proxy Paradox In Security.eng.srt

97.0 KB

How Google Turned Me Into My Mother - The Proxy Paradox In Security.mp4

62.9 MB

Httpillage - Calling all nodes.eng.srt

80.9 KB

Httpillage - Calling all nodes.mp4

57.2 MB

It Takes a Village - Effective Collaboration in Security.eng.srt

104.5 KB

It Takes a Village - Effective Collaboration in Security.mp4

67.7 MB

Keynote - Jack Daniel.eng.srt

79.7 KB

Keynote - Jack Daniel.mp4

35.5 MB

Keynote - Kelly Lum.eng.srt

77.0 KB

Keynote - Kelly Lum.mp4

53.5 MB

Keynote - Pete Cheslock.eng.srt

110.8 KB

Keynote - Pete Cheslock.mp4

48.0 MB

Managing Certificates and TLS Endpoints.eng.srt

75.7 KB

Managing Certificates and TLS Endpoints.mp4

49.6 MB

Mobile Connect - A better and secure user experience for online authentication..eng.srt

79.2 KB

Mobile Connect - A better and secure user experience for online authentication..mp4

69.7 MB

Mobile Landscape - The Security of Wearables.eng.srt

92.6 KB

Mobile Landscape - The Security of Wearables.mp4

72.4 MB

MQTT and CoAP - A Story about IoT Protocol Security.eng.srt

110.8 KB

MQTT and CoAP - A Story about IoT Protocol Security.mp4

45.0 MB

New Farming Methods for the Epistemological Wasteland of Application Security.eng.srt

123.3 KB

New Farming Methods for the Epistemological Wasteland of Application Security.mp4

77.1 MB

PHP Security Redefined.eng.srt

112.3 KB

PHP Security Redefined.mp4

79.8 MB

PHP WAF - Intercept and Monitor Application Attacks.eng.srt

101.4 KB

PHP WAF - Intercept and Monitor Application Attacks.mp4

84.1 MB

Problems you'll face when building a software security program.eng.srt

100.4 KB

Problems you'll face when building a software security program.mp4

47.7 MB

Rugged Software Engineering - Nick Galbreath.eng.srt

86.7 KB

Rugged Software Engineering - Nick Galbreath.mp4

40.5 MB

Security Automation in the Agile SDLC - Real World Cases.eng.srt

86.4 KB

Security Automation in the Agile SDLC - Real World Cases.mp4

53.4 MB

Security for Non-Unicorns-Ben Hughes.eng.srt

98.2 KB

Security for Non-Unicorns-Ben Hughes.mp4

59.5 MB

Speed Debates.eng.srt

101.3 KB

Speed Debates.mp4

100.0 MB

Static Analysis Security Testing for Dummies and You.eng.srt

131.3 KB

Static Analysis Security Testing for Dummies and You.mp4

63.3 MB

Technology, Privacy and the Law - New Challenges for Non-Profits.eng.srt

95.2 KB

Technology, Privacy and the Law - New Challenges for Non-Profits.mp4

79.2 MB

Testing Modern Applications with Hackazon.eng.srt

82.9 KB

Testing Modern Applications with Hackazon.mp4

64.4 MB

The Culture of Security.eng.srt

35.6 KB

The Culture of Security.mp4

27.2 MB

The Illusion of Control - Secrets Within Your Software Supply Chain.eng.srt

90.3 KB

The Illusion of Control - Secrets Within Your Software Supply Chain.mp4

86.6 MB

The Node.js Highway - Attacks Are At Full Throttle.eng.srt

39.8 KB

The Node.js Highway - Attacks Are At Full Throttle.mp4

51.5 MB

What Do You Mean My Security Tools Don’t Work on APIs.eng.srt

118.9 KB

What Do You Mean My Security Tools Don’t Work on APIs.mp4

98.4 MB

Why Some Multi-Factor Authentication Technology is Irresponsible.eng.srt

81.7 KB

Why Some Multi-Factor Authentication Technology is Irresponsible.mp4

74.0 MB

Your Last Manual Assessment.eng.srt

42.1 KB

Your Last Manual Assessment.mp4

29.5 MB

/LASCON 2016/

Architecting a Security Program for the Future - Karen Lu & Josh Sokol.eng.srt

103.5 KB

Architecting a Security Program for the Future - Karen Lu & Josh Sokol.mp4

73.8 MB

Avoiding Application Security Program Pitfalls - Cap Diebel.eng.srt

112.6 KB

Avoiding Application Security Program Pitfalls - Cap Diebel.mp4

57.9 MB

Be Ready for BeyondCorp - enterprise identity, perimeters and your application- Jason Kent.eng.srt

74.0 KB

Be Ready for BeyondCorp - enterprise identity, perimeters and your application- Jason Kent.mp4

40.3 MB

Building Information Security Program from Scratch - Josh Sokol.eng.srt

130.3 KB

Building Information Security Program from Scratch - Josh Sokol.mp4

53.2 MB

Could a few links of code f@#k it all up.eng.srt

51.0 KB

Could a few links of code f@#k it all up.mp4

33.9 MB

Cryptography 101 - A History and the Basics of Cryptography - Bryant Hagen.eng.srt

91.3 KB

Cryptography 101 - A History and the Basics of Cryptography - Bryant Hagen.mp4

80.6 MB

Demystifying a Malware Attack - Christopher Elisan.eng.srt

94.4 KB

Demystifying a Malware Attack - Christopher Elisan.mp4

63.2 MB

Doing Security in 100 milliseconds-The Speed of Serverless Computing.mp4

65.8 MB

Don't Touch Me That Way - David Linder.eng.srt

66.9 KB

Don't Touch Me That Way - David Linder.mp4

52.9 MB

Easy Mobile Hacking - Native and Hybrid Pitfalls - Aaron Guzman.eng.srt

88.6 KB

Easy Mobile Hacking - Native and Hybrid Pitfalls - Aaron Guzman.mp4

72.1 MB

Eradicating the Weakest Link in Global Corporation - Tomohisa Ishikawa.mp4

39.3 MB

Go Purple Adopt purple team strategy to augment Application Security Programs - Trupti Shiralkar.mp4

78.9 MB

Hindsight isn't good enough - LANGSEC helps you take control of your security - Kunal Anand.4f1ec8e5-84dc-4ba4-99c3-3ade330d562c.part

848.8 MB

Hindsight isn't good enough - LANGSEC helps you take control of your security - Kunal Anand.mp4

62.6 MB

Invited Speaker - Dave Kennedy.eng.srt

135.9 KB

Invited Speaker - Dave Kennedy.mp4

83.0 MB

Invited Speaker - Ryan Huber.eng.srt

122.6 KB

Invited Speaker - Ryan Huber.mp4

57.6 MB

IOT and AppSec- Jason Kent.mp4

69.3 MB

It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.eng.srt

86.8 KB

It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.mp4

50.3 MB

Key Note - Shannon Lietz.eng.srt

104.5 KB

Key Note - Shannon Lietz.mp4

77.0 MB

LangSec for the Masses - Joe Rozner.eng.srt

95.6 KB

LangSec for the Masses - Joe Rozner.mp4

53.4 MB

Lean Security - Ernest Mueller.eng.srt

88.6 KB

Lean Security - Ernest Mueller.mp4

60.4 MB

Leveling up your bug bounty program- Charles Valentine.eng.srt

94.1 KB

Leveling up your bug bounty program- Charles Valentine.mp4

32.1 MB

Making Invisible Things Visible - Tracking Down Known Vulnerabilities - Derek E. Weeks.eng.srt

90.3 KB

Making Invisible Things Visible - Tracking Down Known Vulnerabilities - Derek E. Weeks.mp4

93.2 MB

Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.eng.srt

90.1 KB

Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.mp4

67.7 MB

Mind the CSP Gap - Challenges developing a meaningful Content-Security-Policy - Garett Held.eng.srt

79.4 KB

Mind the CSP Gap - Challenges developing a meaningful Content-Security-Policy - Garett Held.mp4

50.8 MB

Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.eng.srt

113.8 KB

Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.mp4

65.9 MB

Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.eng.srt

55.9 KB

Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.mp4

36.3 MB

Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.eng.srt

89.9 KB

Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.mp4

50.3 MB

Scanning IPv4 for Free Data and Free Shells - Jordan Wright.eng.srt

110.0 KB

Scanning IPv4 for Free Data and Free Shells - Jordan Wright.mp4

63.4 MB

Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.eng.srt

103.6 KB

Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.mp4

54.0 MB

Six myths of Information Security - Steve Horstman.eng.srt

98.9 KB

Six myths of Information Security - Steve Horstman.mp4

52.1 MB

Sk8ing in Thin Ice - A crash course in Kubernetes & Security- Matt Johansen.eng.srt

86.6 KB

Sk8ing in Thin Ice - A crash course in Kubernetes & Security- Matt Johansen.mp4

45.2 MB

Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.eng.srt

83.2 KB

Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.mp4

81.7 MB

Trusted Execution - A Deterministic Approach to AppSec for Zero-Day Threat Prevention - Satya Gupta.mp4

70.6 MB

What if IOT is Dumped in Your Lap - - Chris Walker.mp4

80.5 MB

Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.eng.srt

96.7 KB

Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.mp4

67.2 MB

/LASCON 2016 OWASP Top 10/

OWASP Top 10 Free Training - LASCON 2016 [3 4].eng.srt

188.7 KB

OWASP Top 10 Free Training - LASCON 2016 [3 4].mp4

102.8 MB

OWASP Top 10 Free Training - LASCON 2016 [4 4].mp4

107.8 MB

/LASCON 2017/

A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.eng.srt

114.5 KB

A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.mp4

85.6 MB

Abusing Normality - Data Exfiltration in Plain Site.eng.srt

101.0 KB

Abusing Normality - Data Exfiltration in Plain Site.mp4

93.3 MB

AppSec Pipelines and Event-based Security - Moving beyond a traditional security test. - Matt Tesauro.eng.srt

131.5 KB

AppSec Pipelines and Event-based Security - Moving beyond a traditional security test. - Matt Tesauro.mp4

62.7 MB

Architecting for Security in the Cloud - Josh Sokol.eng.srt

126.9 KB

Architecting for Security in the Cloud - Josh Sokol.mp4

54.5 MB

Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.eng.srt

136.0 KB

Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.mp4

89.8 MB

Attack Vectors in Biometric Recognition Systems - Clare Nelson.eng.srt

111.4 KB

Attack Vectors in Biometric Recognition Systems - Clare Nelson.mp4

72.3 MB

Breaking into Security - Tommy Dew, Gisela Hinojosa.eng.srt

127.7 KB

Breaking into Security - Tommy Dew, Gisela Hinojosa.mp4

53.9 MB

Cloud Ops MasterClass - Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.eng.srt

169.0 KB

Cloud Ops MasterClass - Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.mp4

94.7 MB

Core Rule Set for the Masses - Lessons from taming ModSecurity rules at massive scale - Tin Zaw.eng.srt

135.5 KB

Core Rule Set for the Masses - Lessons from taming ModSecurity rules at massive scale - Tin Zaw.mp4

68.7 MB

Demystifying the Ransomware and IoT Threat - Christopher Elisan.eng.srt

94.5 KB

Demystifying the Ransomware and IoT Threat - Christopher Elisan.mp4

56.2 MB

From Zero to Zero-Trust - Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.eng.srt

101.1 KB

From Zero to Zero-Trust - Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.mp4

62.6 MB

How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.eng.srt

87.7 KB

How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.mp4

48.9 MB

How to put Sec in Devops - Igor Matlin.eng.srt

63.2 KB

How to put Sec in Devops - Igor Matlin.mp4

59.8 MB

Invited Speaker - Chris Roberts.eng.srt

142.6 KB

Invited Speaker - Chris Roberts.mp4

83.7 MB

IoT and the Security of That Mobile App - Mark Loveless.eng.srt

132.2 KB

IoT and the Security of That Mobile App - Mark Loveless.mp4

89.4 MB

IOT Assimilation - Resistance is Futile - Mark Szewczul.eng.srt

155.7 KB

IOT Assimilation - Resistance is Futile - Mark Szewczul.mp4

90.6 MB

Keynote - Chris Nickerson.eng.srt

121.2 KB

Keynote - Chris Nickerson.mp4

62.9 MB

Keynote - Georgia Weidman.eng.srt

149.4 KB

Keynote - Georgia Weidman.mp4

90.5 MB

Layer 8 and Why People are the Most Important Security Tool.eng.srt

115.3 KB

Layer 8 and Why People are the Most Important Security Tool.mp4

75.8 MB

Leveraging Social Engineering in physical security assessment - Snow.eng.srt

140.9 KB

Leveraging Social Engineering in physical security assessment - Snow.mp4

65.1 MB

Malware Clustering - Srivathsan Srinivasagopalan.eng.srt

115.4 KB

Malware Clustering - Srivathsan Srinivasagopalan.mp4

67.0 MB

No one left behind - Security Defense through Gamification including CTFs - Kashish Mittal.mp4

55.4 MB

OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.eng.srt

75.3 KB

OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.mp4

69.2 MB

Pen Testing for Humans - Rajan Kapoor.eng.srt

90.9 KB

Pen Testing for Humans - Rajan Kapoor.mp4

57.9 MB

Phishing - It's Not Just for Pentesters - Joe Gray.eng.srt

153.4 KB

Phishing - It's Not Just for Pentesters - Joe Gray.mp4

90.6 MB

Realizing Software Security Maturity - The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.eng.srt

133.8 KB

Realizing Software Security Maturity - The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.mp4

67.4 MB

Security Evaluation of Libraries.eng.srt

85.5 KB

Security Evaluation of Libraries.mp4

65.6 MB

Security for DevOps - Shannon Lietz.eng.srt

156.7 KB

Security for DevOps - Shannon Lietz.mp4

82.2 MB

Serverless security - A pragmatic primer for builders and defenders - James Wickett.eng.srt

149.8 KB

Serverless security - A pragmatic primer for builders and defenders - James Wickett.mp4

64.4 MB

Startup Security - Making Everyone Happy - Michael McCabe, Brian Henderson.eng.srt

136.9 KB

Startup Security - Making Everyone Happy - Michael McCabe, Brian Henderson.mp4

64.5 MB

The Rest of the Story - Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.eng.srt

75.9 KB

The Rest of the Story - Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.mp4

59.2 MB

The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.eng.srt

118.3 KB

The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.mp4

67.3 MB

Threat Modeling For Secure Software Design.eng.srt

158.9 KB

Threat Modeling For Secure Software Design.mp4

91.4 MB

Using Identity to Evolve Application Security - Kevin Paige.eng.srt

128.6 KB

Using Identity to Evolve Application Security - Kevin Paige.mp4

77.3 MB

Where we’re going we won’t need passwords - Matt Hajda.eng.srt

169.2 KB

Where we’re going we won’t need passwords - Matt Hajda.mp4

87.4 MB

Won't somebody please think of the data - Sarah-Jane Madden.eng.srt

128.6 KB

Won't somebody please think of the data - Sarah-Jane Madden.mp4

94.3 MB

/LASCON 2017 OWASP Top 10/

OWASP Top 10 @ LASCON 2017 [3 5].eng.srt

188.1 KB

OWASP Top 10 @ LASCON 2017 [3 5].mp4

98.4 MB

OWASP Top 10 @ LASCON 2017 [4 5].eng.srt

152.0 KB

OWASP Top 10 @ LASCON 2017 [4 5].mp4

86.3 MB

OWASP Top 10 @ LASCON 2017 [5 5].eng.srt

127.9 KB

OWASP Top 10 @ LASCON 2017 [5 5].mp4

61.3 MB

/LASCON 2018/

Adapting Your AppSec - Brian Glas.eng.srt

147.7 KB

Adapting Your AppSec - Brian Glas.mp4

84.1 MB

Be Prepared - Things you can do today for the brea.eng.srt

142.1 KB

Be Prepared - Things you can do today for the brea.mp4

54.2 MB

Bridging GDPR from your Application to your Cloud (2).eng.srt

139.7 KB

Bridging GDPR from your Application to your Cloud (2).mp4

87.4 MB

Bridging GDPR from your Application to your Cloud.eng.srt

74.4 KB

Bridging GDPR from your Application to your Cloud.mp4

62.6 MB

Building An AppSec Program From The Ground Up An H.eng.srt

180.7 KB

Building An AppSec Program From The Ground Up An H.mp4

83.1 MB

Building Products People Trust Designing Privacy,.eng.srt

147.2 KB

Building Products People Trust Designing Privacy,.mp4

68.7 MB

Conducting Table Top Exercises to Get Your Team Ba.eng.srt

169.3 KB

Conducting Table Top Exercises to Get Your Team Ba.mp4

79.4 MB

Cryptography may or may not protect you - how it i.eng.srt

87.1 KB

Cryptography may or may not protect you - how it i.mp4

55.1 MB

Data Protection at Scale.eng.srt

143.7 KB

Data Protection at Scale.mp4

73.5 MB

Denial of Trust - The New Attacks - Wendy Nather.eng.srt

113.5 KB

Denial of Trust - The New Attacks - Wendy Nather.mp4

61.2 MB

DevSecOps without DevOps is Just Security.eng.srt

170.4 KB

DevSecOps without DevOps is Just Security.mp4

89.0 MB

Don't @ Me - Hunting Twitter Bots at Scale.eng.srt

153.1 KB

Don't @ Me - Hunting Twitter Bots at Scale.mp4

63.2 MB

Eisenhower and the Internet.eng.srt

81.5 KB

Eisenhower and the Internet.mp4

42.8 MB

Empathy & Vulnerability in SecOps.eng.srt

133.8 KB

Empathy & Vulnerability in SecOps.mp4

69.7 MB

Evolving Your Security Mindset to Embrace DevSecOp.eng.srt

135.5 KB

Evolving Your Security Mindset to Embrace DevSecOp.mp4

80.7 MB

How to Assess the Maturity of your Security Progra.eng.srt

91.0 KB

How to Assess the Maturity of your Security Progra.mp4

70.7 MB

How To Kick Butt in InfoSec Blogging - Kate Brew.eng.srt

109.8 KB

How To Kick Butt in InfoSec Blogging - Kate Brew.mp4

78.9 MB

It takes a village to get security right Building.eng.srt

109.9 KB

It takes a village to get security right Building.mp4

51.5 MB

Keynote Jayson Street.eng.srt

127.0 KB

Keynote Jayson Street.mp4

73.9 MB

Making Continuous Security a Reality with OWASP's.eng.srt

102.8 KB

Making Continuous Security a Reality with OWASP's.mp4

44.8 MB

Microservices Security Landscape - Prabath Siriwar.mp4

65.2 MB

ML-Based Detection Engine of Device Network Attack.eng.srt

115.0 KB

ML-Based Detection Engine of Device Network Attack.mp4

88.9 MB

Orchestrating Security Tools with AWS Step Functio.eng.srt

113.1 KB

Orchestrating Security Tools with AWS Step Functio.mp4

54.7 MB

Pentesting for Developers.eng.srt

120.1 KB

Pentesting for Developers.mp4

62.2 MB

Poking Holes in the Cloud Auditing AWS Security.eng.srt

159.3 KB

Poking Holes in the Cloud Auditing AWS Security.mp4

77.8 MB

Practical DevSecOps - the simple free pipeline any.eng.srt

161.8 KB

Practical DevSecOps - the simple free pipeline any.mp4

86.0 MB

Red Team Pen Testing Panel Discussion.eng.srt

169.6 KB

Red Team Pen Testing Panel Discussion.mp4

100.8 MB

Rethinking Role-Based Security Education - Kat Swe.eng.srt

86.0 KB

Rethinking Role-Based Security Education - Kat Swe.mp4

41.3 MB

Running at Light Speed Cloud Native Security Patte.eng.srt

171.1 KB

Running at Light Speed Cloud Native Security Patte.mp4

22.4 MB

Secure Configuration in the Cloud.eng.srt

109.6 KB

Secure Configuration in the Cloud.mp4

56.3 MB

Securing Legacy Applications.eng.srt

144.1 KB

Securing Legacy Applications.mp4

73.6 MB

Securing the Future of TLS - What's new in TLS 1.3.eng.srt

104.2 KB

Securing the Future of TLS - What's new in TLS 1.3.mp4

59.0 MB

Security Testing Is Automation Failing US Heather.eng.srt

111.9 KB

Security Testing Is Automation Failing US Heather.mp4

66.8 MB

SEOWNING The Internet Part 2- Robert Hansen.eng.srt

153.0 KB

SEOWNING The Internet Part 2- Robert Hansen.mp4

75.0 MB

Speed with confidence - Shannon Lietz.eng.srt

139.4 KB

Speed with confidence - Shannon Lietz.mp4

68.9 MB

The DevSecOps Builders Guide to the CI CD PIPELINE.eng.srt

154.0 KB

The DevSecOps Builders Guide to the CI CD PIPELINE.mp4

74.1 MB

The FaaS and the Curious.eng.srt

122.2 KB

The FaaS and the Curious.mp4

59.0 MB

The Mitre ATT&CK Framework is for all of us, and i.eng.srt

186.8 KB

The Mitre ATT&CK Framework is for all of us, and i.mp4

89.8 MB

The White Hat’s Advantage Open-source OWASP tools.eng.srt

102.4 KB

The White Hat’s Advantage Open-source OWASP tools.mp4

49.3 MB

Threat Modeling for IoT Systems.eng.srt

159.7 KB

Threat Modeling for IoT Systems.mp4

80.0 MB

Vulnerability Management You're doing it wrong.eng.srt

138.1 KB

Vulnerability Management You're doing it wrong.mp4

76.6 MB

Year[0] AppSec at a Startup - Leif Dreizler.eng.srt

172.1 KB

Year[0] AppSec at a Startup - Leif Dreizler.mp4

57.8 MB

/LASCON 2019/

A DevOps View of AppSec.en.srt

82.9 KB

A DevOps View of AppSec.mp4

106.8 MB

A Stratagem on Strategy Rolling Testing into Product Testing.en.srt

111.5 KB

A Stratagem on Strategy Rolling Testing into Product Testing.mp4

112.1 MB

Achieve AI-powered API Privacy using Open Source.en.srt

98.2 KB

Achieve AI-powered API Privacy using Open Source.mp4

41.0 MB

Application Logging in the Era of GDPR.en.srt

68.5 KB

Application Logging in the Era of GDPR.mp4

80.7 MB

Assessing Maturity OpenSAMM and BSIMM.en.srt

91.9 KB

Assessing Maturity OpenSAMM and BSIMM.mp4

62.0 MB

Baited Canaries - Monitoring attackers with active beacons.en.srt

31.6 KB

Baited Canaries - Monitoring attackers with active beacons.mp4

37.0 MB

Being Powerful While Powerless Elevating Security by Leading Without Authority.en.srt

64.5 KB

Being Powerful While Powerless Elevating Security by Leading Without Authority.mp4

75.9 MB

Breaking Into Red Teaming.en.srt

103.8 KB

Breaking Into Red Teaming.mp4

58.8 MB

Choosing the Right Static Code Analyzers Based on Hard Data.en.srt

60.8 KB

Choosing the Right Static Code Analyzers Based on Hard Data.mp4

59.7 MB

Cloud Security At Scale Managing the Chaos.en.srt

91.2 KB

Cloud Security At Scale Managing the Chaos.mp4

74.0 MB

Cloudy with a chance of Persistence.en.srt

55.5 KB

Cloudy with a chance of Persistence.mp4

37.7 MB

Detect Insider Threats Using Blockchains.mp4

50.4 MB

Face Recognition & Privacy.en.srt

93.4 KB

Face Recognition & Privacy.mp4

66.5 MB

How to Build an Effective Malware Protection Architecture for File Uploads in Modern Web Apps.en.srt

44.7 KB

How to Build an Effective Malware Protection Architecture for File Uploads in Modern Web Apps.mp4

51.3 MB

How to Secure a nodejs Application End-to-End.en.srt

71.4 KB

How to Secure a nodejs Application End-to-End.mp4

82.8 MB

Invited Speaker - Josh Sokol.en.srt

86.1 KB

Invited Speaker - Josh Sokol.mp4

69.0 MB

Keynote John Bambenek.en.srt

110.1 KB

Keynote John Bambenek.mp4

91.5 MB

Keynote Purple is the new black Modern Approaches to Application Security.en.srt

90.9 KB

Keynote Purple is the new black Modern Approaches to Application Security.mp4

69.9 MB

Kubernetes Ingress-Nginx Security from Beginner to Expert.en.srt

55.6 KB

Kubernetes Ingress-Nginx Security from Beginner to Expert.mp4

70.7 MB

Learning the Power of the Not My Responsibility Mindset.en.srt

75.4 KB

Learning the Power of the Not My Responsibility Mindset.mp4

74.4 MB

Living in AppSec [Promised Fantasy Wonder]land.en.srt

80.1 KB

Living in AppSec [Promised Fantasy Wonder]land.mp4

74.3 MB

Lost in Translation Communicating Outside of Security.en.srt

43.1 KB

Lost in Translation Communicating Outside of Security.mp4

48.8 MB

Micro-services Challenges - Istio to the Rescue.en.srt

62.9 KB

Micro-services Challenges - Istio to the Rescue.mp4

99.0 MB

NetFlow Where We're Going, We Don't Need... NetFlow.en.srt

66.0 KB

NetFlow Where We're Going, We Don't Need... NetFlow.mp4

52.6 MB

Nifty Network Discovery.en.srt

127.3 KB

Nifty Network Discovery.mp4

69.0 MB

Offensive Threat Models Against the Supply Chain.en.srt

90.4 KB

Offensive Threat Models Against the Supply Chain.mp4

69.8 MB

On the Internet, nobody knows you're a dog - Revisiting the meme after 25 years.en.srt

106.2 KB

On the Internet, nobody knows you're a dog - Revisiting the meme after 25 years.mp4

95.4 MB

Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol.en.srt

61.8 KB

Reversing Client Side JavaScript Using the Chrome Dev Tools Protocol.mp4

34.9 MB

Running FaaS with Scissors.en.srt

75.3 KB

Running FaaS with Scissors.mp4

86.3 MB

Securability - Shannon Leitz.en.srt

91.1 KB

Securability - Shannon Leitz.mp4

72.9 MB

Securing Modern API and Microservice Based Applications by Design..en.srt

110.5 KB

Securing Modern API and Microservice Based Applications by Design..mp4

110.2 MB

Security Code Analysis is for Everyone.mp4

80.5 MB

Security Instrumentation Is the Future of All Software.en.srt

102.6 KB

Security Instrumentation Is the Future of All Software.mp4

84.6 MB

Security Management 101 Practical Techniques They Should've Taught You.en.srt

96.1 KB

Security Management 101 Practical Techniques They Should've Taught You.mp4

35.0 MB

Sexy Mobile App Attacks by Example.en.srt

77.9 KB

Sexy Mobile App Attacks by Example.mp4

90.7 MB

Soft Skills Panel.en.srt

92.5 KB

Soft Skills Panel.mp4

94.5 MB

The A's, B's, and Four C's ofTesting Cloud-Native Applications.en.srt

109.0 KB

The A's, B's, and Four C's ofTesting Cloud-Native Applications.mp4

19.7 MB

The Battle to Address Mobile in the Endpoint Security Space.en.srt

41.2 KB

The Battle to Address Mobile in the Endpoint Security Space.mp4

46.7 MB

The End of the AppSec Team.en.srt

81.0 KB

The End of the AppSec Team.mp4

94.7 MB

Threat Modelling Stories from the Trenches.en.srt

95.8 KB

Threat Modelling Stories from the Trenches.mp4

48.9 MB

Thwarting Intruders with Ever Morphing Infrastructure.mp4

44.4 MB

/LASCON 2021/

A Hacker's Guide to Blockchain, Smart Contracts, and NFTs.eng.srt

120.2 KB

A Hacker's Guide to Blockchain, Smart Contracts, and NFTs.mp4

98.5 MB

API Security Is it the new application attack surface and how to secure at enterprise scale.eng.srt

55.4 KB

API Security Is it the new application attack surface and how to secure at enterprise scale.mp4

52.1 MB

BRICK'D - Making End User AppSec Training Awesome with building bricks.eng.srt

62.6 KB

BRICK'D - Making End User AppSec Training Awesome with building bricks.mp4

66.5 MB

Climbing AppSec Mountains (and how to summit).eng.srt

100.6 KB

Climbing AppSec Mountains (and how to summit).mp4

81.4 MB

Cloud security and Compliance.eng.srt

103.6 KB

Cloud security and Compliance.mp4

89.0 MB

Cloud Security Scaled The Chaos Continues.eng.srt

99.3 KB

Cloud Security Scaled The Chaos Continues.mp4

56.1 MB

Comparing WAF and RASP, Why.eng.srt

102.8 KB

Comparing WAF and RASP, Why.mp4

75.2 MB

Detection Engineering Methodologies.eng.srt

94.3 KB

Detection Engineering Methodologies.mp4

98.2 MB

Developing and Managing an OWASP Project (Projects 101).eng.srt

66.0 KB

Developing and Managing an OWASP Project (Projects 101).mp4

50.7 MB

Doing This One Crazy Thing Will Change Your AppSec Program Forever.eng.srt

112.2 KB

Doing This One Crazy Thing Will Change Your AppSec Program Forever.mp4

32.5 MB

Get funding for your Security Initiatives by thinking like a MBA not a CISSP.eng.srt

93.4 KB

Get funding for your Security Initiatives by thinking like a MBA not a CISSP.mp4

58.7 MB

How security can keep pace with continuously evolving cloud-native applications.eng.srt

88.7 KB

How security can keep pace with continuously evolving cloud-native applications.mp4

62.4 MB

Infosec metrics that your bosses will love.eng.srt

68.6 KB

Infosec metrics that your bosses will love.mp4

53.9 MB

Insiders Guide to Mobile AppSec with OWASP MASVS.eng.srt

117.7 KB

Insiders Guide to Mobile AppSec with OWASP MASVS.mp4

69.0 MB

Introduction to inner-loop security. Shifting left, but better..eng.srt

101.1 KB

Introduction to inner-loop security. Shifting left, but better.mp4

70.8 MB

Invited Speaker - Charisse Castagnoli.eng.srt

111.5 KB

Invited Speaker - Charisse Castagnoli.mp4

88.9 MB

JWTs - Patterns & Anti-patterns.eng.srt

63.3 KB

JWTs - Patterns & Anti-patterns.mp4

34.3 MB

Keynote - Dan Cornell.eng.srt

89.4 KB

Keynote - Dan Cornell.mp4

71.6 MB

Manual JavaScript Analysis is a Bug.eng.srt

96.4 KB

Manual JavaScript Analysis is a Bug.mp4

78.8 MB

Privacy Impact Assessments - how much privacy is enough.eng.srt

81.4 KB

Privacy Impact Assessments - how much privacy is enough.mp4

61.9 MB

Security Observability 101 Thinking Inside the Box.eng.srt

108.1 KB

Security Observability 101 Thinking Inside the Box.mp4

97.8 MB

Security while scaling Agile - lessons learned.eng.srt

85.0 KB

Security while scaling Agile - lessons learned.mp4

74.3 MB

Shifting Engineering Right What security engineers can learn from DevSecOps.eng.srt

97.6 KB

Shifting Engineering Right What security engineers can learn from DevSecOps.mp4

67.6 MB

SSL Hell.eng.srt

60.2 KB

SSL Hell.mp4

46.5 MB

The Final Frontier, Automating DYNAMIC Security Testing.eng.srt

87.0 KB

The Final Frontier, Automating DYNAMIC Security Testing.mp4

66.4 MB

The Software Security Testing Lifecycle The framework testers need.eng.srt

103.4 KB

The Software Security Testing Lifecycle The framework testers need.mp4

90.6 MB

TMI, the kinds of data your applications are leaking.eng.srt

82.4 KB

TMI, the kinds of data your applications are leaking.mp4

93.4 MB

Using the Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program.eng.srt

139.0 KB

Using the Threat Modeling Manifesto to Build an Enterprise Threat Modeling Program.mp4

79.8 MB

WAF - Your frontier defense.eng.srt

97.1 KB

WAF - Your frontier defense.mp4

42.0 MB

Writing Policies That Aren’t Miserable for Everyone Involved.eng.srt

68.4 KB

Writing Policies That Aren’t Miserable for Everyone Involved.mp4

52.1 MB

/LASCON 2022/

'Who allowed you to do that' Detecting and Controlling Rogue Third-Party Scripts - Brad Burkle.eng.srt

83.2 KB

'Who allowed you to do that' Detecting and Controlling Rogue Third-Party Scripts - Brad Burkle.mp4

76.7 MB

A visual journey to demystifying OAuth2 and OIDC - Anton Aleksandrov.eng.srt

92.2 KB

A visual journey to demystifying OAuth2 and OIDC - Anton Aleksandrov.mp4

93.1 MB

API Security Through External Attack Surface Management - Phillip Wylie.eng.srt

69.1 KB

API Security Through External Attack Surface Management - Phillip Wylie.mp4

53.1 MB

Automating App Security Tests in Development, with Docker - Gabe Schuyler.eng.srt

71.6 KB

Automating App Security Tests in Development, with Docker - Gabe Schuyler.mp4

73.4 MB

Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi.eng.srt

107.0 KB

Build more secure apps by harnessing the power of OWASP SKF & ASVS on Kubernetes - Farshad Abasi.mp4

85.7 MB

Can you keep a secret - An Overview of the OWASP Secrets Management Cheat Sheet - Jet Anderson.eng.srt

59.0 KB

Can you keep a secret - An Overview of the OWASP Secrets Management Cheat Sheet - Jet Anderson.mp4

54.5 MB

Close Encounters of the Vulnerable Kind A DevSecOps Odyssey - Pranshu Bajpai.eng.srt

103.7 KB

Close Encounters of the Vulnerable Kind A DevSecOps Odyssey - Pranshu Bajpai.mp4

98.8 MB

Defense-in-Depth Engineering - John Poulin.eng.srt

100.3 KB

Defense-in-Depth Engineering - John Poulin.mp4

67.9 MB

Design-Level Supply Chain Attacks In The Real World - Moshe Zioni.mp4

81.1 MB

DSOMM from Theory to Enforcement - Chris Koehnecke.eng.srt

86.9 KB

DSOMM from Theory to Enforcement - Chris Koehnecke.mp4

64.3 MB

Elite Security Champions Build Strong Security Culture - Chris Romeo.eng.srt

108.4 KB

Elite Security Champions Build Strong Security Culture - Chris Romeo.mp4

77.4 MB

FAIR STRIDE - Building business relevant AppSec threat models - Arthur Loris.eng.srt

91.9 KB

FAIR STRIDE - Building business relevant AppSec threat models - Arthur Loris.mp4

57.4 MB

Fuzzers, analyzers, and other Gophers insecticides - Alex (hex0punk) Useche.eng.srt

99.9 KB

Fuzzers, analyzers, and other Gophers insecticides - Alex (hex0punk) Useche.mp4

83.4 MB

Hacking and Defending APIs - Red and Blue make Purple. - Matt Tesauro.eng.srt

107.5 KB

Hacking and Defending APIs - Red and Blue make Purple. - Matt Tesauro.mp4

97.4 MB

Hacking JavaScript Desktop apps with XSS and RCE - Abraham Aranguren.eng.srt

82.9 KB

Hacking JavaScript Desktop apps with XSS and RCE - Abraham Aranguren.mp4

61.7 MB

How To Hack An API In 15 Minutes - Igor Matlin.eng.srt

61.3 KB

How To Hack An API In 15 Minutes - Igor Matlin.mp4

79.8 MB

How to scan at scale with OWASP ZAP - Tiago Mendo.eng.srt

89.2 KB

How to scan at scale with OWASP ZAP - Tiago Mendo.mp4

95.3 MB

Invited - Amiran Alavidze - Securing Managed Kubernetes Clusters.eng.srt

92.3 KB

Invited - Amiran Alavidze - Securing Managed Kubernetes Clusters.mp4

80.5 MB

Invited - Chris Roberts - Charles Valentine.eng.srt

104.4 KB

Invited - Chris Roberts - Charles Valentine.mp4

88.0 MB

Invited - Dan Cornell - Drivers for Software Supply Chain Security Programs.eng.srt

116.3 KB

Invited - Dan Cornell - Drivers for Software Supply Chain Security Programs.mp4

85.2 MB

Invited - Garrett Gross - 10lbs of tacos in a 5lb bag Lessons Learned from Security Operations.mp4

79.8 MB

Invited - Garrett Gross - 10lbs of tacos in a 5lb bag Lessons Learned from Security Operationseng.srt

117.7 KB

Invited - James Wickett - DevSecOps Warning Signs and What to Do About Them.eng.srt

71.8 KB

Invited - James Wickett - DevSecOps Warning Signs and What to Do About Them.mp4

48.9 MB

Invited - Jeff Williams - The Case for Runtime Protection.eng.srt

97.0 KB

Invited - Jeff Williams - The Case for Runtime Protection.mp4

82.6 MB

Invited - Josh Sokol - The Security Practitioner’s Guide to Going from No to Whoa.eng.srt

85.3 KB

Invited - Josh Sokol - The Security Practitioner’s Guide to Going from No to Whoa.mp4

69.4 MB

Invited - Marcus J. Carey - Hacking Blockchain & Hacking Blockchain.eng.srt

94.1 KB

Invited - Marcus J. Carey - Hacking Blockchain & Hacking Blockchain.mp4

63.5 MB

Invited - Rafal Los- - Irrational by Effective - Applying Parenthood Lessons to Cybersecurity.eng.srt

80.0 KB

Invited - Rafal Los- - Irrational by Effective - Applying Parenthood Lessons to Cybersecurity.mp4

25.3 MB

Invited - Robert Hansen - Infosec is Sick.eng.srt

101.7 KB

Invited - Robert Hansen - Infosec is Sick.mp4

76.5 MB

Invited - Theresa Lanowitz - Securing the Edge.eng.srt

76.1 KB

Invited - Theresa Lanowitz - Securing the Edge.mp4

69.4 MB

Keynote - Adrian Sanabria - Indistinguishable from Magic How the Cybersecurity Market Reached.eng.srt

100.5 KB

Keynote - Adrian Sanabria - Indistinguishable from Magic How the Cybersecurity Market Reached.mp4

89.3 MB

Keynote - Jim Manico - The Abridged History of Application Security.eng.srt

67.9 KB

Keynote - Jim Manico - The Abridged History of Application Security.mp4

65.4 MB

Knowing What Risks Matter - And Don’t - In Your Open Source - Naomi Buckwalter.eng.srt

82.0 KB

Knowing What Risks Matter - And Don’t - In Your Open Source - Naomi Buckwalter.mp4

68.3 MB

LASCON 2022 Video Introduction.mp4

1.6 MB

Lessons Learned Building a Software Supply Chain Security Team - Josh Wallace.eng.srt

112.9 KB

Lessons Learned Building a Software Supply Chain Security Team - Josh Wallace.mp4

94.3 MB

No Code No Risk What Happens When We Leave No Code up for Grabs - Michael Bargury.eng.srt

89.0 KB

No Code No Risk What Happens When We Leave No Code up for Grabs - Michael Bargury.mp4

60.3 MB

No, We Won't Be Threat Modeling - Izar Tarandach.eng.srt

109.4 KB

No, We Won't Be Threat Modeling - Izar Tarandach.mp4

96.1 MB

Social Engineering Your Metrics Using Data Science to Provide Value in Reporting - Joe Gray.eng.srt

82.9 KB

Social Engineering Your Metrics Using Data Science to Provide Value in Reporting - Joe Gray.mp4

62.2 MB

Spies, Saboteurs & ScoundrelsHow Russia, China & Nefarious Actors Are Hacking IOT,- John Vecchi.mp4

118.7 MB

The DevSecOps Playbook A step-by-step guide to implementing DevSecOps - Paul McCarty.eng.srt

108.5 KB

The DevSecOps Playbook A step-by-step guide to implementing DevSecOps - Paul McCarty.mp4

87.0 MB

Tips and Tactics for Creating Your Own CTF Event - Adam Schaal.eng.srt

95.7 KB

Tips and Tactics for Creating Your Own CTF Event - Adam Schaal.mp4

88.1 MB

Using your API Specs to attack your APIs - Jason Kent.eng.srt

101.6 KB

Using your API Specs to attack your APIs - Jason Kent.mp4

112.9 MB

Who watches the watchers - Including ITSM, ITOM, APM, and CMDB in your audits - Joseph Konieczka.eng.srt

48.9 KB

Who watches the watchers - Including ITSM, ITOM, APM, and CMDB in your audits - Joseph Konieczka.mp4

52.4 MB

Working through your trust issues - Niclas Kjellin.eng.srt

86.3 KB

Working through your trust issues - Niclas Kjellin.mp4

74.0 MB

/LASCON 2023/

Aaron Guzman - System Assurance with the IoT Security Testing Guide.eng.srt

89.1 KB

Aaron Guzman - System Assurance with the IoT Security Testing Guide.mp4

92.8 MB

Abraham Aranguren - Leave Home Safe The Good, the Bad, the Ugly.eng.srt

111.6 KB

Abraham Aranguren - Leave Home Safe The Good, the Bad, the Ugly.mp4

112.5 MB

Akanksha Pathak - Unlocking Startup Success The Vitality of Security Assessments and How to ..mp4

73.6 MB

Akanksha Pathak - Unlocking Startup Success The Vitality of Security Assessments and How toeng.srt

85.0 KB

Amish Shah - Unveiling the Vulnerabilities Hacking Cloud Native Apps and Discovering ..mp4

93.5 MB

Amish Shah - Unveiling the Vulnerabilities Hacking Cloud Native Apps and Discoveringeng.srt

80.2 KB

Andy Lewis - 3cx lessons learned.eng.srt

70.5 KB

Andy Lewis - 3cx lessons learned.mp4

98.8 MB

Anton Aleksandrov - A visual journey to reverse-engineering the Enigma Machine - preventing MITM ..mp4

78.2 MB

Anton Aleksandrov - A visual journey to reverse-engineering the Enigma Machine - preventing MITMeng.srt

87.0 KB

Baruch Mettler - Easy-bake IR - Automated incident response using the power of APIs.eng.srt

49.0 KB

Baruch Mettler - Easy-bake IR - Automated incident response using the power of APIs.mp4

55.2 MB

Benoit Famechon & Karen Lu - Who IAM - a Closer Look at IAM and CIAM.eng.srt

67.8 KB

Benoit Famechon & Karen Lu - Who IAM - a Closer Look at IAM and CIAM.mp4

77.4 MB

Bertold Kolics - Defensive API development techniques for Gophers.eng.srt

86.8 KB

Bertold Kolics - Defensive API development techniques for Gophers.mp4

101.5 MB

Brian Reed - Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project.eng.srt

113.2 KB

Brian Reed - Mobile Rules the World - Jump into Mobile AppSec with the OWASP MAS Project.mp4

98.1 MB

Chris Koehnecke - Velocity - Safety Security Metrics All DevOps Should Care About.eng.srt

88.9 KB

Chris Koehnecke - Velocity - Safety Security Metrics All DevOps Should Care About.mp4

65.8 MB

Chris McGranahan - Cybersecurity Architecture in the Age of Covid.eng.srt

71.3 KB

Chris McGranahan - Cybersecurity Architecture in the Age of Covid.mp4

70.2 MB

Dave Ferguson - Beyond Vulnerabilities Analyzing Behaviors to Spot Malware in Your Release.eng.srt

86.2 KB

Dave Ferguson - Beyond Vulnerabilities Analyzing Behaviors to Spot Malware in Your Release.mp4

86.7 MB

Eitan Mobb - Why can't tools automatically fix security vulnerabilities Or can they.eng.srt

86.8 KB

Eitan Mobb - Why can't tools automatically fix security vulnerabilities Or can they.mp4

69.6 MB

Invited - Garrett Gross - Invited-Full of SaaS and TOTALLY SECURE.eng.srt

102.4 KB

Invited - Garrett Gross - Invited-Full of SaaS and TOTALLY SECURE.mp4

90.0 MB

Invited - Jason Kent - All Day All Night API Security Endpoint Analytics.eng.srt

87.2 KB

Invited - Jason Kent - All Day All Night API Security Endpoint Analytics.mp4

90.0 MB

Invited - Jim Manico - Enhancing ReactJS Application Security XSS Scripting and Client-Side Defense.eng.srt

106.3 KB

Invited - Jim Manico - Enhancing ReactJS Application Security XSS Scripting and Client-Side Defense.mp4

89.6 MB

Invited - Karen Lu - A new recipe for security risk evaluation.eng.srt

71.4 KB

Invited - Karen Lu - A new recipe for security risk evaluation.mp4

75.9 MB

Invited - Marc Spears.eng.srt

90.6 KB

Invited - Marc Spears.mp4

69.0 MB

Invited - Marcus Carey - It's a Bird, It's a Plane, It's A.I..eng.srt

95.5 KB

Invited - Marcus Carey - It's a Bird, It's a Plane, It's A.I.mp4

81.4 MB

Invited - Matt Tesauro - Tenants for Going at DevSecOps Speed.eng.srt

91.6 KB

Invited - Matt Tesauro - Tenants for Going at DevSecOps Speed.mp4

79.2 MB

Invited - Theresa Lanowitz - 2023 AT&T Cybersecurity Insights Report Edge Ecosystem.eng.srt

78.8 KB

Invited - Theresa Lanowitz - 2023 AT&T Cybersecurity Insights Report Edge Ecosystem.mp4

78.1 MB

Invited Alan Proctor, Josh Sokol - From Zero to ISO 27k Compliance.eng.srt

91.6 KB

Invited Alan Proctor, Josh Sokol - From Zero to ISO 27k Compliance.mp4

60.4 MB

Jamon Camisso - Wolfi A Secure-by-Default Distro for Curing Container CVE Chaos.eng.srt

115.1 KB

Jamon Camisso - Wolfi A Secure-by-Default Distro for Curing Container CVE Chaos.mp4

103.8 MB

Josh Dreyfuss - The road to AppSec Maturity is through Unification.eng.srt

57.9 KB

Josh Dreyfuss - The road to AppSec Maturity is through Unification.mp4

49.5 MB

Keith Thomas - How To Apply DevSecOps Shift-Left Security with OWASP ZAP.eng.srt

40.9 KB

Keith Thomas - How To Apply DevSecOps Shift-Left Security with OWASP ZAP.mp4

36.9 MB

Ken Johnson, Seth Law - State of {Absolute} AppSec.eng.srt

109.5 KB

Ken Johnson, Seth Law - State of {Absolute} AppSec.mp4

108.5 MB

Keynote - Shannon Lietz.eng.srt

95.0 KB

Keynote - Shannon Lietz.mp4

88.9 MB

Kiran Kamity - Reducing Alert Fatigue with Container Scans Correlate, Prioritize and Filter ..mp4

70.1 MB

Kiran Kamity - Reducing Alert Fatigue with Container Scans Correlate, Prioritize and Filtereng.srt

84.0 KB

Louis Barrett - Small Language Models for Application Security - Beyond ChatGPT.eng.srt

122.3 KB

Louis Barrett - Small Language Models for Application Security - Beyond ChatGPT.mp4

105.7 MB

Matthew Rose - The Monsters in Your Software Supply Chain That SCA Can't Find.eng.srt

56.0 KB

Matthew Rose - The Monsters in Your Software Supply Chain That SCA Can't Find.mp4

61.2 MB

Mike McCabe - Infrastructure as Remote Code Execution How to abuse Terraform to elevate access.eng.srt

68.3 KB

Mike McCabe - Infrastructure as Remote Code Execution How to abuse Terraform to elevate access.mp4

56.5 MB

Nick Leghorn - Building a Risk Based Vulnerability Management Program.eng.srt

78.2 KB

Nick Leghorn - Building a Risk Based Vulnerability Management Program.mp4

84.6 MB

Oleg Gryb - Five Pillars of Security Automation.eng.srt

84.4 KB

Oleg Gryb - Five Pillars of Security Automation.mp4

91.2 MB

Petr Sidopulos - Discovering and Empowering the Expert-Level Cybersecurity Talent Within Your Team.eng.srt

67.8 KB

Petr Sidopulos - Discovering and Empowering the Expert-Level Cybersecurity Talent Within Your Team.mp4

65.9 MB

Ragasharee M C, Anoop Chandra B N - Security Safari A Journey Through the Wilderness of Securing ..mp4

35.8 MB

Ragasharee M C, Anoop Chandra B N - Security Safari A Journey Through the Wilderness of Securingeng.srt

38.5 KB

Rob Mixer - Top Gun's unsung hero - a surprising lesson for CI CD security.eng.srt

81.2 KB

Rob Mixer - Top Gun's unsung hero - a surprising lesson for CI CD security.mp4

69.4 MB

Rob Truesdell - Securing Generative AI - Back to the Future Edition.eng.srt

63.7 KB

Rob Truesdell - Securing Generative AI - Back to the Future Edition.mp4

53.9 MB

Robert Hurlbut - Advancing Your Threat Modeling Approaches in an Agile - DevOps World.eng.srt

84.5 KB

Robert Hurlbut - Advancing Your Threat Modeling Approaches in an Agile - DevOps World.mp4

61.4 MB

Sean Poris - All About the Benjamins Building a Business-Critical Bug Bounty Program.eng.srt

102.6 KB

Sean Poris - All About the Benjamins Building a Business-Critical Bug Bounty Program.mp4

81.4 MB

Tony UV - PASTA Threat Modeling & Leveraging IR, Threat Intelligence as Means for Tactical Pen Test.eng.srt

93.0 KB

Tony UV - PASTA Threat Modeling & Leveraging IR, Threat Intelligence as Means for Tactical Pen Test.mp4

81.6 MB

Vinay Prabhushanker, Murali Vadakke Puthanveetil - Navigating Sec pitfalls during M&APlaybooks &..mp4

82.0 MB

Vinay Prabhushanker, Murali Vadakke Puthanveetil - Navigating Sec pitfalls during M&APlaybooks &eng.srt

85.5 KB

Viswanath S Chirravuri - Fortifying DevOps Unveiling Security Activities and Maturity Models for ..mp4

77.7 MB

Viswanath S Chirravuri - Fortifying DevOps Unveiling Security Activities and Maturity Models foreng.srt

96.9 KB

 

Total files 840


Copyright © 2024 FileMood.com