FileMood

Download O'Reilly Security Conference 2016 - Amsterdam, Netherlands

Reilly Security Conference 2016 Amsterdam Netherlands

Name

O'Reilly Security Conference 2016 - Amsterdam, Netherlands

 DOWNLOAD Copy Link

Total Size

16.4 GB

Total Files

44

Hash

2FACD82B029F883D93901232E84E13640E0AB021

/

Это очень важно!.txt

0.8 KB

Приватные видеокурсы.pdf

356.7 KB

/5. The human element/

Security by consent - Brendan O'Connor (Malice Afterthought, Inc.).mp4

391.6 MB

A technical dive into defensive trickery - Dan Kaminsky (White Ops).mp4

378.7 MB

Gamify security training with developer CTFs - Kyle Rankin (Final, Inc.).mp4

301.3 MB

Building a cross-functional incident response team - Jennifer Martin (Covington & Burling).mp4

528.7 MB

Security through design Making security better by designing for people - Jelle Niemantsverdriet (Deloitte).mp4

422.3 MB

Threading the needle of mobile security and user privacy - James Plouffe (MobileIron).mp4

379.0 MB

Who owns open source security - Guy Podjarny (Snyk).mp4

359.9 MB

rkt’s architecture and security features - Frederic Branczyk (CoreOS).mp4

319.9 MB

/3. Tech, tools, and processes/

Hands on with InSpec - Mandi Walls (Chef).mp4

722.7 MB

The industrial age of website bots How to detect and block automated attacks - Ido Safruti (PerimeterX) and Ariel Sirota (PerimeterX) - Part 2.mp4

593.0 MB

The industrial age of website bots How to detect and block automated attacks - Ido Safruti (PerimeterX) and Ariel Sirota (PerimeterX) - Part 1.mp4

436.0 MB

The bad things happen when you're not looking - Ryan Huber (Slack Technologies, Inc) and Nate Brown (Slack Technologies, Inc).mp4

286.5 MB

Practical tips for web application security in the age of Agile and DevOps - Zane Lackey (Signal Sciences).mp4

377.9 MB

PAL is your pal Bootstrapping secrets in Docker - Nick Sullivan (CloudFlare).mp4

320.8 MB

Macaroons More cookie than cookie - Brian Sletten (Bosatsu Consulting).mp4

430.4 MB

Integrating security into DevOps - Ernest Kim (MITRE Corp.).mp4

357.7 MB

Machine learning to improve random number generators - Richard Freytag (Freytag & Company, LLC).mp4

306.8 MB

From dev to production Security best practices on managing Amazon Web Services (AWS) environments - Dan Amiga (Fireglass) and Dor Knafo (Fireglass).mp4

363.3 MB

Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 1.mp4

668.8 MB

Developing a secure and scalable frontend - James Baker (LinkedIn) and Mira Thambireddy (LinkedIn).mp4

291.0 MB

Continuous auditing for effective compliance with Rudder - Jonathan Clarke (Normation).mp4

347.6 MB

Common vulnerabilities and exposures in containers What to know - Quentin Machu (CoreOS).mp4

347.5 MB

Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 2.mp4

605.1 MB

/4. Bridging business and security/

Link complex regulation to practical security - Wayne Anderson (Avanade).mp4

341.0 MB

US and EU data security and data privacy issues in M&A transactions - Shannon Yavorsky (Kirkland & Ellis LLP).mp4

398.4 MB

Speak security and enter Making security make sense for nontechnical users - Jessy Irwin (Mercury Public Affairs).mp4

418.0 MB

Scalable threat modeling with risk patterns - Stephen de Vries (ContinuumSecurity).mp4

365.0 MB

Leveraging isolation technologies for improved security and productivity - Dan Amiga (Fireglass) and Dor Knafo (Fireglass).mp4

399.7 MB

Continuous security - Stein Inge Morisbak (Bekk Consulting AS) and Erlend Oftedal (Blank Oslo).mp4

348.3 MB

/1. O'Reilly Security Conference Keynotes/

From possible to practical The path for defense - Dan Kaminsky (White Ops).mp4

142.9 MB

The world will see (and just saw) an Internet zombie apocalypse - Phil Stanhope (Dyn).mp4

207.0 MB

My heart depends on your code - Marie Moe (SINTEF).mp4

250.4 MB

Lessons learned from running big bug bounty programs - Katie Moussouris (Luta Security).mp4

269.2 MB

Innovation versus invasion Inserting privacy controls and due process into semi-autonomous algorithms - Matthew Carroll (Immuta Inc).mp4

34.3 MB

Conceptualizing attribution and why it matters - Benjamin Buchanan (Harvard University).mp4

212.0 MB

/2. Security in context (security datasci)/

Practical network forensics - Marcelle Lee (Fractal Security Group, LLC) and Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu) - Part 2.mp4

738.3 MB

Security analytics using big data and Apache Hadoop Beyond the hype - Eddie Garcia (Cloudera).mp4

351.6 MB

Practical network forensics - Marcelle Lee (Fractal Security Group, LLC) and Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu) - Part 1.mp4

732.5 MB

Moving beyond Threatbutt or Threat Landscape 2039 - Trey Darley (Kingfisher Operations, sprl).mp4

428.9 MB

Expanding the blue team by building a security culture program - Masha Sedova (Salesforce).mp4

392.3 MB

Beyond matching Applying data science techniques to IOC-based detection - Alex Pinto (Niddel).mp4

460.9 MB

Architectural design for legal analytics - Steve Touw (Immuta).mp4

388.2 MB

 

Total files 44


Copyright © 2024 FileMood.com