/
|
HEADER.md
|
0.4 KB
|
RVAsec 13 logo.png
|
52.3 KB
|
RVAsec logo.jpg
|
10.4 KB
|
RVAsec thank you.txt
|
0.9 KB
|
/RVAsec 1 - 2012/
|
Code Maturity - Is SDL a Waste of Time (Carsten Eiram).mp4
|
109.5 MB
|
Don't be a Cog in the Wheel (Chris Gerling).mp4
|
50.5 MB
|
Errata Hits Puberty - 13 Years of Chagrin (Jericho).mp4
|
132.3 MB
|
I'm not a Doctor But I Play One On Your Network (Tim Elrod).mp4
|
133.4 MB
|
KeyNote - The Easy Stuff is Done (Marcus Ranum).mp4
|
96.2 MB
|
Managing Security Within The Cloud (Adam Ely).mp4
|
105.4 MB
|
PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).mp4
|
42.7 MB
|
Reverse Engineer an Obfuscated.Net Application (Travis Altman).mp4
|
30.1 MB
|
Why Do You Lock Your Door (Schuyler Towne).mp4
|
140.7 MB
|
/.../RVAsec 1 - 2012 captions/
|
Code Maturity - Is SDL a Waste of Time (Carsten Eiram).eng.srt
|
119.7 KB
|
Don't be a Cog in the Wheel (Chris Gerling).eng.srt
|
53.5 KB
|
Errata Hits Puberty - 13 Years of Chagrin (Jericho).eng.srt
|
127.9 KB
|
I'm not a Doctor But I Play One On Your Network (Tim Elrod).eng.srt
|
140.9 KB
|
KeyNote - The Easy Stuff is Done (Marcus Ranum).eng.srt
|
165.8 KB
|
Managing Security Within The Cloud (Adam Ely).eng.json
|
3.7 MB
|
Managing Security Within The Cloud (Adam Ely).eng.lrc
|
98.7 KB
|
Managing Security Within The Cloud (Adam Ely).eng.srt
|
99.2 KB
|
Managing Security Within The Cloud (Adam Ely).eng.text
|
62.0 KB
|
Managing Security Within The Cloud (Adam Ely).eng.tsv
|
83.9 KB
|
Managing Security Within The Cloud (Adam Ely).eng.txt
|
100.1 KB
|
Managing Security Within The Cloud (Adam Ely).eng.vtt
|
88.4 KB
|
PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).eng.srt
|
55.0 KB
|
Reverse Engineer an Obfuscated.Net Application (Travis Altman).eng.srt
|
132.5 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.json
|
2.5 MB
|
Why Do You Lock Your Door (Schuyler Towne).eng.lrc
|
62.2 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.srt
|
70.3 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.text
|
48.2 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.tsv
|
56.4 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.txt
|
62.7 KB
|
Why Do You Lock Your Door (Schuyler Towne).eng.vtt
|
64.0 KB
|
/RVAsec 2 - 2013/
|
Adam Ely - BYOD - Risks, Maturity and Solutions.mp4
|
36.3 MB
|
Alex Hutton - KEYNOTE - Towards A Modern Approach To Risk Management.mp4
|
36.3 MB
|
Barry Kouns - Risk Assessment - The Heart of Information Security.mp4
|
23.8 MB
|
Brian Lockrey - Social Media Digital Forensics.mp4
|
27.1 MB
|
Chris Wysopal - Keynote - Future of Government Info Sharing.mp4
|
36.0 MB
|
Colby Clark - The Digital Battlefield.mp4
|
26.2 MB
|
Dan Han - SIEM implementation - What to Expect.mp4
|
16.7 MB
|
Dan Holden - DDoS and Modern Threat Motives.mp4
|
29.3 MB
|
Daniel Ramsbrock - Web Application Vulnerabilities and Solutions.mp4
|
24.8 MB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.mp4
|
20.7 MB
|
Gus Fritschie & Andrew Du - How to Defend Against FISMA.mp4
|
24.0 MB
|
Itzik Kotler - Hack Like Its 2013.mp4
|
24.3 MB
|
Jericho - Our Straw House - Vulnerabilities.mp4
|
23.6 MB
|
Mike Shema - JavaScript Security & HTML5.mp4
|
27.6 MB
|
Paul Watson - Cross Platform Network Access Control.mp4
|
20.9 MB
|
Rockie Brockway-Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).mp4
|
27.8 MB
|
Schuyler Towne - Vulnerability Research Circa 1851.mp4
|
44.7 MB
|
Sean Mason - A Day in the Life of an Incident Responder at a Fortune 5.mp4
|
18.7 MB
|
/.../RVAsec 2 - 2013 captions/
|
Adam Ely - BYOD - Risks, Maturity and Solutions.eng.srt
|
108.1 KB
|
Alex Hutton - KEYNOTE - Towards A Modern Approach To Risk Management.eng.srt
|
118.2 KB
|
Barry Kouns - Risk Assessment - The Heart of Information Security.eng.srt
|
77.0 KB
|
Brian Lockrey - Social Media Digital Forensics.eng.srt
|
82.8 KB
|
Chris Wysopal - Keynote - Future of Government Info Sharing.eng.srt
|
122.6 KB
|
Colby Clark - The Digital Battlefield.eng.srt
|
108.3 KB
|
Dan Han - SIEM implementation - What to Expect.eng.srt
|
77.5 KB
|
Dan Holden - DDoS and Modern Threat Motives.eng.srt
|
117.4 KB
|
Daniel Ramsbrock - Web Application Vulnerabilities and Solutions.eng.srt
|
103.3 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.json
|
2.1 MB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.lrc
|
51.2 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.srt
|
59.2 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.text
|
40.1 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.tsv
|
46.6 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.txt
|
51.6 KB
|
Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.vtt
|
53.8 KB
|
Gus Fritschie & Andrew Du - How to Defend Against FISMA.eng.srt
|
117.9 KB
|
Itzik Kotler - Hack Like Its 2013.eng.srt
|
115.2 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.json
|
2.2 MB
|
Jericho - Our Straw House - Vulnerabilities.eng.lrc
|
51.8 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.srt
|
70.8 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.text
|
40.2 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.tsv
|
47.0 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.txt
|
52.3 KB
|
Jericho - Our Straw House - Vulnerabilities.eng.vtt
|
62.1 KB
|
Mike Shema - JavaScript Security & HTML5.eng.srt
|
118.8 KB
|
Paul Watson - Cross Platform Network Access Control.eng.srt
|
94.8 KB
|
Rockie Brockway-Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).eng.srt
|
74.2 KB
|
Schuyler Towne - Vulnerability Research Circa 1851.eng.srt
|
160.3 KB
|
Sean Mason - A Day in the Life of an Incident Responder at a Fortune 5.eng.srt
|
125.2 KB
|
/RVAsec 3 - 2014/
|
Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.mp4
|
48.0 MB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.mp4
|
49.3 MB
|
Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.mp4
|
46.3 MB
|
David Bianco - Pyramid of Pain - Intel-Driven Detection Response to Increase Adversary's Cost.mp4
|
51.3 MB
|
David Kennedy - 2014 Keynote.mp4
|
61.5 MB
|
David Sharpe and Katherine Trame - Real World Intrusion Response.mp4
|
40.7 MB
|
Evan Booth - Terminal Cornucopia - Demystifying the Mullet.mp4
|
46.3 MB
|
Gene Fishel - 2014 Keynote.mp4
|
56.8 MB
|
Inga Goddijn - Cyber Insurance - Worth the Effort or Total Ripoff.mp4
|
49.3 MB
|
Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.mp4
|
36.7 MB
|
Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).mp4
|
60.1 MB
|
Joey Peloquin - Offensive Mobile Forensics.mp4
|
59.8 MB
|
Jonathan Dambrot - Third Party Risk Management and Cybersecurity.mp4
|
42.5 MB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.mp4
|
33.8 MB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.mp4
|
54.9 MB
|
Nick Popovich - I Found a Thing and You Can Too - ISP's Unauthenticated SOAP Service.mp4
|
49.0 MB
|
Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.mp4
|
44.9 MB
|
Ray Kelly - Man In The Front - Modifying the Android OS for Mobile App Testing.mp4
|
40.3 MB
|
Schuyler Towne - How to Make a Lock.mp4
|
57.5 MB
|
Seth Hanford - CVSS v3 - This One Goes to 11.mp4
|
46.2 MB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.mp4
|
44.2 MB
|
/.../RVAsec 3 - 2014 captions/
|
Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.eng.srt
|
120.3 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.json
|
3.1 MB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.lrc
|
75.9 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.srt
|
82.6 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.text
|
55.7 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.tsv
|
67.7 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.txt
|
76.7 KB
|
Brian Baskin - Introducing Intelligence into Malware Analysis.eng.vtt
|
74.9 KB
|
Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.eng.srt
|
113.4 KB
|
David Bianco - Pyramid of Pain - Intel-Driven Detection Response to Increase Adversary's Cost.eng.srt
|
131.4 KB
|
David Kennedy - 2014 Keynote.eng.srt
|
152.1 KB
|
David Sharpe and Katherine Trame - Real World Intrusion Response.eng.srt
|
114.0 KB
|
Evan Booth - Terminal Cornucopia - Demystifying the Mullet.eng.srt
|
110.6 KB
|
Gene Fishel - 2014 Keynote.eng.srt
|
111.1 KB
|
Inga Goddijn - Cyber Insurance - Worth the Effort or Total Ripoff.eng.srt
|
131.7 KB
|
Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.eng.srt
|
69.8 KB
|
Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).eng.srt
|
163.0 KB
|
Joey Peloquin - Offensive Mobile Forensics.eng.srt
|
103.9 KB
|
Jonathan Dambrot - Third Party Risk Management and Cybersecurity.eng.srt
|
104.6 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.en.transcribed.srt
|
83.2 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.json
|
2.0 MB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.lrc
|
57.9 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.srt
|
51.2 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.text
|
34.3 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.tsv
|
48.2 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.txt
|
58.9 KB
|
Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.vtt
|
46.3 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.json
|
2.8 MB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.lrc
|
79.9 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.srt
|
71.8 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.text
|
42.6 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.tsv
|
64.5 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.txt
|
81.3 KB
|
Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.vtt
|
63.3 KB
|
Nick Popovich - I Found a Thing and You Can Too - ISP's Unauthenticated SOAP Service.eng.srt
|
91.9 KB
|
Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.eng.srt
|
94.2 KB
|
Ray Kelly - Man In The Front - Modifying the Android OS for Mobile App Testing.eng.srt
|
105.3 KB
|
Schuyler Towne - How to Make a Lock.eng.json
|
3.2 MB
|
Schuyler Towne - How to Make a Lock.eng.lrc
|
93.1 KB
|
Schuyler Towne - How to Make a Lock.eng.srt
|
72.2 KB
|
Schuyler Towne - How to Make a Lock.eng.text
|
51.9 KB
|
Schuyler Towne - How to Make a Lock.eng.tsv
|
76.4 KB
|
Schuyler Towne - How to Make a Lock.eng.txt
|
94.7 KB
|
Schuyler Towne - How to Make a Lock.eng.vtt
|
66.1 KB
|
Seth Hanford - CVSS v3 - This One Goes to 11.eng.srt
|
140.0 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.json
|
3.2 MB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.lrc
|
86.4 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.srt
|
86.6 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.text
|
57.6 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.tsv
|
74.6 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.txt
|
87.5 KB
|
Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.vtt
|
78.2 KB
|
/RVAsec 4 - 2015/
|
Adam Crosby - Embracing the Cloud.mp4
|
35.4 MB
|
Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.mp4
|
50.6 MB
|
Barry Kouns - Incident Response Management - Not a Fire Drill.mp4
|
52.3 MB
|
Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.mp4
|
37.1 MB
|
Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.mp4
|
33.4 MB
|
Caleb - Chill - Crable - The Art of Post-Infection Response and Mitigation.mp4
|
40.5 MB
|
David Bianco - Visual Hunting with Linked Data Graphs.mp4
|
37.3 MB
|
Elissa Shevinsky - The Changing Legal Landscape for InfoSec - What You Need to Know.mp4
|
45.9 MB
|
Guy Broome - Foss Cryptographic Data Storage.mp4
|
35.4 MB
|
Jason Smith - Applied Detection and Analysis Using Flow Data.mp4
|
44.8 MB
|
Keynote - G. Mark Hardy.mp4
|
56.2 MB
|
Keynote Jennifer Steffens.mp4
|
36.0 MB
|
Kizz Myanthia - Into The Worm Hole - Metasploit For Web PenTesting.mp4
|
45.3 MB
|
Mark Pain'ter - A year in the life of HP security research.mp4
|
36.6 MB
|
Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.mp4
|
55.7 MB
|
Pete Herzog & Dave Lauer - Hacking the Market.mp4
|
30.7 MB
|
Schuyler Towne - Selling Security in a Post Lock Society.mp4
|
38.6 MB
|
Speed Debates.mp4
|
35.7 MB
|
Virginia Governor Terry McAuliffe.mp4
|
20.3 MB
|
/.../RVAsec 4 - 2015 captions/
|
Adam Crosby - Embracing the Cloud.eng.srt
|
110.9 KB
|
Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.eng.srt
|
120.4 KB
|
Barry Kouns - Incident Response Management - Not a Fire Drill.eng.srt
|
97.9 KB
|
Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.eng.srt
|
106.5 KB
|
Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.eng.srt
|
94.2 KB
|
Caleb - Chill - Crable - The Art of Post-Infection Response and Mitigation.eng.srt
|
100.1 KB
|
David Bianco - Visual Hunting with Linked Data Graphs.eng.srt
|
78.0 KB
|
Elissa Shevinsky - The Changing Legal Landscape for InfoSec - What You Need to Know.eng.srt
|
82.9 KB
|
Guy Broome - Foss Cryptographic Data Storage.eng.srt
|
102.7 KB
|
Jason Smith - Applied Detection and Analysis Using Flow Data.eng.srt
|
120.9 KB
|
Keynote - G. Mark Hardy.eng.srt
|
139.0 KB
|
Keynote Jennifer Steffens.eng.srt
|
70.9 KB
|
Kizz Myanthia - Into The Worm Hole - Metasploit For Web PenTesting.eng.srt
|
112.6 KB
|
Mark Pain'ter - A year in the life of HP security research.eng.srt
|
91.9 KB
|
Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.eng.srt
|
114.1 KB
|
Pete Herzog & Dave Lauer - Hacking the Market.eng.srt
|
134.3 KB
|
Schuyler Towne - Selling Security in a Post Lock Society.eng.srt
|
127.2 KB
|
Speed Debates.eng.srt
|
69.2 KB
|
Virginia Governor Terry McAuliffe.eng.srt
|
39.8 KB
|
/RVAsec 5 - 2016/
|
Andrea Matwyshyn - CYBER.mp4
|
23.4 MB
|
Andrew McNicol & Zack Meyers - Beyond Automated Testing.mp4
|
41.7 MB
|
Ben Smith - Measuring Security - How Do I Know What a Valid Metric Looks Like.mp4
|
37.4 MB
|
Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.mp4
|
36.0 MB
|
Chris Romeo - AppSec Awareness - A Blue Print for Security Culture Change.mp4
|
37.1 MB
|
David Sirrine - Open Source Identity Management - From Password to Policy.mp4
|
36.9 MB
|
Dawn-Marie Hutchinson - Beyond the Security Team - The Economics of Breach Response.mp4
|
42.2 MB
|
Evan Johnson - Staying Above A Rising Security Waterline.mp4
|
23.6 MB
|
Inga Goddijn & Becky Swanson - Show Me The Money Uncovering The True Cost of a Breach.mp4
|
39.3 MB
|
Joey Peloquin - Deceptive Defense - Beyond Honeypots.mp4
|
40.1 MB
|
Joshua Cole - Probability in Cyber Risk Assessment - Holy Grail or Red Herring.mp4
|
55.8 MB
|
Juan Carlos - Reversing For Humans.mp4
|
47.7 MB
|
Karen R. Jackson, Virginia Secretary of Technology - Keynote.mp4
|
40.0 MB
|
Mark Weatherford (Your) Inevitable Path to the Cloud.mp4
|
30.8 MB
|
Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.mp4
|
52.9 MB
|
Rockie Brockway - Enterprise Threat Management Like a Boss.mp4
|
51.5 MB
|
Senator Mark Warner - Welcome To RVAsec.mp4
|
4.2 MB
|
Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.mp4
|
45.3 MB
|
Trey Ford - Keynote.mp4
|
36.5 MB
|
Troy Wojewoda - Bro's Before Flows.mp4
|
42.5 MB
|
Wendy Nather - Keynote.mp4
|
38.1 MB
|
/.../RVAsec 5 - 2016 captions/
|
Andrea Matwyshyn - CYBER.eng.srt
|
75.1 KB
|
Andrew McNicol & Zack Meyers - Beyond Automated Testing.eng.srt
|
134.4 KB
|
Ben Smith - Measuring Security - How Do I Know What a Valid Metric Looks Like.eng.srt
|
115.6 KB
|
Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.eng.srt
|
95.9 KB
|
Chris Romeo - AppSec Awareness - A Blue Print for Security Culture Change.eng.srt
|
130.8 KB
|
David Sirrine - Open Source Identity Management - From Password to Policy.eng.srt
|
103.2 KB
|
Dawn-Marie Hutchinson - Beyond the Security Team - The Economics of Breach Response.eng.srt
|
93.5 KB
|
Evan Johnson - Staying Above A Rising Security Waterline.eng.srt
|
52.8 KB
|
Inga Goddijn & Becky Swanson - Show Me The Money Uncovering The True Cost of a Breach.eng.srt
|
117.3 KB
|
Joey Peloquin - Deceptive Defense - Beyond Honeypots.eng.srt
|
119.7 KB
|
Joshua Cole - Probability in Cyber Risk Assessment - Holy Grail or Red Herring.eng.srt
|
87.8 KB
|
Juan Carlos - Reversing For Humans.eng.srt
|
91.1 KB
|
Karen R. Jackson, Virginia Secretary of Technology - Keynote.eng.srt
|
130.1 KB
|
Mark Weatherford (Your) Inevitable Path to the Cloud.eng.srt
|
68.2 KB
|
Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.eng.srt
|
119.0 KB
|
Rockie Brockway - Enterprise Threat Management Like a Boss.eng.srt
|
84.2 KB
|
Senator Mark Warner - Welcome To RVAsec.eng.srt
|
9.5 KB
|
Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.eng.srt
|
94.4 KB
|
Trey Ford - Keynote.eng.srt
|
108.2 KB
|
Troy Wojewoda - Bro's Before Flows.eng.srt
|
122.9 KB
|
Wendy Nather - Keynote.eng.srt
|
112.0 KB
|
/RVAsec 6 - 2017/
|
Alon Arvatz - OSINT - The Secret Weapon in Hunting Nation-State Campaigns.mp4
|
39.6 MB
|
Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.mp4
|
42.2 MB
|
Dan Holden - Retailing Another Threat Landscape Story.mp4
|
33.6 MB
|
Daniel Bohannon - Invoke-CradleCrafter - Moar PowerShell obFUsk8tion & Detection.mp4
|
53.6 MB
|
Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.mp4
|
28.3 MB
|
Governor Terry McAuliffe.mp4
|
15.3 MB
|
Grayson Walters - Building a pentest program on a shoestring budget.mp4
|
26.8 MB
|
Greg Pepper - Best Practices for Securing the Hybrid Cloud.mp4
|
40.5 MB
|
Jason Ross - DevOpSec - Killing the Buzz.mp4
|
27.1 MB
|
Jason Wonn - TIP of the Spear - A Threat Intelligence Platform Acquisition.mp4
|
36.3 MB
|
Jeremy Dorrough - Zero Trust Lite Architecture to Securely Future-Proof Your Network.mp4
|
34.9 MB
|
Ken Johnson AWS Survival Guide 2.0.mp4
|
25.6 MB
|
Mike Shema - Managing Crowdsourced Security Testing.mp4
|
39.5 MB
|
Mikko Hypponen - Keynote.mp4
|
71.6 MB
|
Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.mp4
|
35.6 MB
|
Robert Mitchell - Recent Developments in Linkography Based Cyber Security.mp4
|
39.8 MB
|
Robert Wood - Main'tainability Security.mp4
|
35.8 MB
|
Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.mp4
|
38.9 MB
|
Ron Gula - Keynote.mp4
|
38.9 MB
|
Seth Hanford - Defend the Defenders - Managing and Participating in Excellent Teams.mp4
|
63.3 MB
|
Troy Marshall - RoboCop- Bringing Law And Order To CICD.mp4
|
39.4 MB
|
/.../RVAsec 6 - 2017 captions/
|
Alon Arvatz - OSINT - The Secret Weapon in Hunting Nation-State Campaigns.eng.srt
|
120.7 KB
|
Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.eng.srt
|
118.8 KB
|
Dan Holden - Retailing Another Threat Landscape Story.eng.srt
|
129.5 KB
|
Daniel Bohannon - Invoke-CradleCrafter - Moar PowerShell obFUsk8tion & Detection.eng.srt
|
172.1 KB
|
Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.eng.srt
|
116.7 KB
|
Governor Terry McAuliffe.eng.srt
|
45.6 KB
|
Grayson Walters - Building a pentest program on a shoestring budget.eng.srt
|
99.0 KB
|
Greg Pepper - Best Practices for Securing the Hybrid Cloud.eng.srt
|
147.6 KB
|
Jason Ross - DevOpSec - Killing the Buzz.eng.srt
|
108.1 KB
|
Jason Wonn - TIP of the Spear - A Threat Intelligence Platform Acquisition.eng.srt
|
119.3 KB
|
Jeremy Dorrough - Zero Trust Lite Architecture to Securely Future-Proof Your Network.eng.srt
|
134.5 KB
|
Ken Johnson AWS Survival Guide 2.0.eng.srt
|
92.4 KB
|
Mike Shema - Managing Crowdsourced Security Testing.eng.srt
|
127.7 KB
|
Mikko Hypponen - Keynote.eng.srt
|
161.5 KB
|
Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.eng.srt
|
103.0 KB
|
Robert Mitchell - Recent Developments in Linkography Based Cyber Security.eng.srt
|
138.6 KB
|
Robert Wood - Main'tainability Security.eng.srt
|
140.0 KB
|
Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.eng.srt
|
121.7 KB
|
Ron Gula - Keynote.eng.srt
|
180.1 KB
|
Seth Hanford - Defend the Defenders - Managing and Participating in Excellent Teams.eng.srt
|
174.2 KB
|
Troy Marshall - RoboCop- Bringing Law And Order To CICD.eng.srt
|
122.4 KB
|
/RVAsec 7 - 2018/
|
Bob Siegel - GDPR and You.mp4
|
82.1 MB
|
Chris Czub - OS X App Whitelisting Without Losing Your Job.mp4
|
51.6 MB
|
Crane Hassold - Doxing Phishers - Analyzing Phishing Attacks from Lure to Attribution.mp4
|
66.9 MB
|
Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.mp4
|
79.9 MB
|
Derek Banks & Beau Bullock - Red Team Apocalypse.mp4
|
88.9 MB
|
Elissa Shevinsky - Container Security - Vulnerabilities, Exploits and Defense.mp4
|
48.4 MB
|
Galloway & Yunusov - Demystifying Payments - Payment Technologies and Sec Risks.mp4
|
50.2 MB
|
Josh Corman - Keynote.mp4
|
97.0 MB
|
Karen Cole - From Grief to Enlightenment - Getting the Executive Support for InfoSec.mp4
|
68.2 MB
|
Katie Moussouris - Keynote.mp4
|
91.7 MB
|
Ksenia Peguero - How to REACT to JavaScript [In]Security.mp4
|
66.0 MB
|
Mark Arnold - Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....mp4
|
55.2 MB
|
Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.mp4
|
34.5 MB
|
Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.mp4
|
26.9 MB
|
Nathaniel Hirsch - Building a Better Catfish.mp4
|
55.3 MB
|
Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.mp4
|
62.3 MB
|
Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.mp4
|
65.1 MB
|
Travis McCormack - From Web App to ATM - Why the Basics Matter.mp4
|
50.3 MB
|
Tyler Townes - Let's build an OSS vulnerability management program.mp4
|
65.3 MB
|
/.../RVAsec 7 - 2018 captions/
|
Bob Siegel - GDPR and You.eng.srt
|
137.0 KB
|
Chris Czub - OS X App Whitelisting Without Losing Your Job.eng.srt
|
95.7 KB
|
Crane Hassold - Doxing Phishers - Analyzing Phishing Attacks from Lure to Attribution.eng.srt
|
138.6 KB
|
Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.eng.srt
|
98.0 KB
|
Derek Banks & Beau Bullock - Red Team Apocalypse.eng.srt
|
146.1 KB
|
Elissa Shevinsky - Container Security - Vulnerabilities, Exploits and Defense.eng.srt
|
81.2 KB
|
Galloway & Yunusov - Demystifying Payments - Payment Technologies and Sec Risks.eng.srt
|
88.8 KB
|
Josh Corman - Keynote.eng.srt
|
185.3 KB
|
Karen Cole - From Grief to Enlightenment - Getting the Executive Support for InfoSec.eng.srt
|
133.5 KB
|
Katie Moussouris - Keynote.eng.srt
|
141.0 KB
|
Ksenia Peguero - How to REACT to JavaScript [In]Security.eng.srt
|
124.6 KB
|
Mark Arnold - Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....eng.srt
|
90.4 KB
|
Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.eng.srt
|
68.7 KB
|
Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.eng.srt
|
47.1 KB
|
Nathaniel Hirsch - Building a Better Catfish.eng.srt
|
100.5 KB
|
Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.eng.srt
|
124.0 KB
|
Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.eng.srt
|
139.9 KB
|
Travis McCormack - From Web App to ATM - Why the Basics Matter.eng.srt
|
111.8 KB
|
Tyler Townes - Let's build an OSS vulnerability management program.eng.srt
|
131.7 KB
|
/RVAsec 8 - 2019/
|
Aaron Bishop - CSRF 101.mp4
|
41.3 MB
|
Brad Thornton - Droppin USBs like its hot.mp4
|
39.2 MB
|
Chandos Carrow - Security Mind Expansion.mp4
|
67.7 MB
|
Dan Holden - CISO of 2025.mp4
|
49.3 MB
|
Danny McCaslin - Automating Information Security.mp4
|
58.2 MB
|
David Sullivan - Vulnerability Assessments and Penetration Tests.mp4
|
47.3 MB
|
Derek Banks - Compliance, Techincal Controls, and You.mp4
|
79.8 MB
|
Eddie Glenn - Code Signing A Security Control That Isn’t Secured.mp4
|
63.2 MB
|
Jason Hill - Anatomy of a Government Red Team Assessment.mp4
|
80.0 MB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.mp4
|
47.0 MB
|
Jeff Tehovnik - Network Security Monitoring Experience and Lessons.mp4
|
63.8 MB
|
Jonathan Glass - Cybersecurity Zero to Hero with CyberChef.mp4
|
76.9 MB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.mp4
|
58.3 MB
|
Mandy Logan - Keynote.mp4
|
85.0 MB
|
Rick Lull - Network Security 101.mp4
|
39.7 MB
|
Robert Simmons - Comparing Malicious Files.mp4
|
70.4 MB
|
Robert Thompson - Breaking and Entering Emulating the Digital Adversary in 2019.mp4
|
83.4 MB
|
Sam Lanning - No More Whack-a-Mole How to Find and Prevent Entire Classes of Vulns.mp4
|
51.3 MB
|
/.../RVAsec 8 - 2019 captions/
|
Aaron Bishop - CSRF 101.eng.srt
|
43.8 KB
|
Brad Thornton - Droppin USBs like its hot.eng.json
|
2.6 MB
|
Brad Thornton - Droppin USBs like its hot.eng.lrc
|
67.9 KB
|
Brad Thornton - Droppin USBs like its hot.eng.srt
|
76.5 KB
|
Brad Thornton - Droppin USBs like its hot.eng.text
|
46.2 KB
|
Brad Thornton - Droppin USBs like its hot.eng.tsv
|
58.9 KB
|
Brad Thornton - Droppin USBs like its hot.eng.txt
|
68.7 KB
|
Brad Thornton - Droppin USBs like its hot.eng.vtt
|
67.8 KB
|
Chandos Carrow - Security Mind Expansion.eng.json
|
2.0 MB
|
Chandos Carrow - Security Mind Expansion.eng.lrc
|
53.3 KB
|
Chandos Carrow - Security Mind Expansion.eng.srt
|
52.3 KB
|
Chandos Carrow - Security Mind Expansion.eng.text
|
32.5 KB
|
Chandos Carrow - Security Mind Expansion.eng.tsv
|
44.7 KB
|
Chandos Carrow - Security Mind Expansion.eng.txt
|
54.1 KB
|
Chandos Carrow - Security Mind Expansion.eng.vtt
|
46.6 KB
|
Dan Holden - CISO of 2025.eng.srt
|
79.7 KB
|
Danny McCaslin - Automating Information Security.eng.srt
|
76.1 KB
|
David Sullivan - Vulnerability Assessments and Penetration Tests.eng.srt
|
74.7 KB
|
Derek Banks - Compliance, Techincal Controls, and You.eng.srt
|
82.1 KB
|
Eddie Glenn - Code Signing A Security Control That Isn’t Secured.eng.srt
|
76.1 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.json
|
2.9 MB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.lrc
|
73.6 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.srt
|
81.4 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.text
|
49.9 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.tsv
|
63.9 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.txt
|
74.5 KB
|
Jason Hill - Anatomy of a Government Red Team Assessment.eng.vtt
|
72.3 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.json
|
1.6 MB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.lrc
|
38.1 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.srt
|
41.0 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.text
|
27.8 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.tsv
|
33.6 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.txt
|
38.5 KB
|
Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.vtt
|
37.2 KB
|
Jeff Tehovnik - Network Security Monitoring Experience and Lessons.eng.srt
|
72.9 KB
|
Jonathan Glass - Cybersecurity Zero to Hero with CyberChef.eng.srt
|
72.3 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.json
|
2.5 MB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.lrc
|
73.1 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.srt
|
59.8 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.text
|
43.5 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.tsv
|
61.0 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.txt
|
74.3 KB
|
Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.vtt
|
54.9 KB
|
Mandy Logan - Keynote.eng.srt
|
84.1 KB
|
Rick Lull - Network Security 101.eng.json
|
2.3 MB
|
Rick Lull - Network Security 101.eng.lrc
|
56.9 KB
|
Rick Lull - Network Security 101.eng.srt
|
64.9 KB
|
Rick Lull - Network Security 101.eng.text
|
39.4 KB
|
Rick Lull - Network Security 101.eng.tsv
|
49.7 KB
|
Rick Lull - Network Security 101.eng.txt
|
57.6 KB
|
Rick Lull - Network Security 101.eng.vtt
|
57.6 KB
|
Robert Simmons - Comparing Malicious Files.eng.srt
|
94.1 KB
|
Robert Thompson - Breaking and Entering Emulating the Digital Adversary in 2019.eng.srt
|
92.2 KB
|
Sam Lanning - No More Whack-a-Mole How to Find and Prevent Entire Classes of Vulns.eng.srt
|
62.2 KB
|
/RVAsec 10 - 2021/
|
Anthony Switzer - Why I love Purple Teams, even though they don't exist.mp4
|
34.1 MB
|
Caleb Mattingly - Bake Security into your Infrastructure-as-Code.mp4
|
38.1 MB
|
Chris Tignor - Keynote The Cybersecurity Days of Thunder Driving Faster w Good Brakes.mp4
|
40.8 MB
|
Evan Johnson - Zero Trust The Good Parts.mp4
|
66.1 MB
|
Jeff Tehovnik - Infrastructure as Code Theory and Concepts.mp4
|
51.6 MB
|
John Behen - 5.4 Million Vulnerabilities and Counting.mp4
|
59.1 MB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.mp4
|
69.6 MB
|
Karl Jankowski - Network Assessments Cybersecurity, quackery and fraud.mp4
|
64.0 MB
|
Maggie MacAlpine - What’s Next In The Fight Against Ransomware.mp4
|
60.4 MB
|
Richard Thayer - Three Worlds of Application - Cloud Security.mp4
|
59.3 MB
|
Steve Holliday-Why Should I Care Cybersecurity Maturity Model Certification DoD NonDoD.mp4
|
78.2 MB
|
Thor Draper Jr - Raising the Average - Finding and Managing Mentors.mp4
|
52.4 MB
|
/.../RVAsec 10 - 2021 captions/
|
Anthony Switzer - Why I love Purple Teams, even though they don't exist.eng.srt
|
44.8 KB
|
Caleb Mattingly - Bake Security into your Infrastructure-as-Code.eng.srt
|
60.6 KB
|
Chris Tignor - Keynote The Cybersecurity Days of Thunder Driving Faster w Good Brakes.eng.srt
|
79.3 KB
|
Evan Johnson - Zero Trust The Good Parts.eng.srt
|
91.5 KB
|
Jeff Tehovnik - Infrastructure as Code Theory and Concepts.eng.srt
|
67.8 KB
|
John Behen - 5.4 Million Vulnerabilities and Counting.eng.srt
|
96.6 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better..eng.srt
|
99.5 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.json
|
2.7 MB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.lrc
|
73.5 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.srt
|
66.8 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.text
|
46.4 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.tsv
|
62.4 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.txt
|
74.5 KB
|
Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.vtt
|
60.8 KB
|
Karl Jankowski - Network Assessments Cybersecurity, quackery and fraud.eng.srt
|
95.8 KB
|
Maggie MacAlpine - What’s Next In The Fight Against Ransomware.eng.srt
|
101.6 KB
|
Richard Thayer - Three Worlds of Application - Cloud Security.eng.srt
|
73.3 KB
|
Steve Holliday-Why Should I Care Cybersecurity Maturity Model Certification DoD NonDoD.eng.srt
|
89.0 KB
|
Thor Draper Jr - Raising the Average - Finding and Managing Mentors.eng.srt
|
82.5 KB
|
/RVAsec 11 - 2022/
|
Alex Nette - Talk the Talk Communicating Business Risk During Cyber Incidents.mp4
|
57.5 MB
|
Andre Pitanga Basslines and Baselines The role of Anomaly Detection in Cloud Security.mp4
|
77.2 MB
|
Collin Berman - Slippery SOP Edge Cases in the Same Origin Policy.mp4
|
53.8 MB
|
David Girvin - Bootstrapping Your First AppSec Program.mp4
|
83.9 MB
|
Dorsey Levens - Keynote.mp4
|
111.6 MB
|
Ian Garrett - To Err is Human Combating Human Error in Healthcare Cybersecurity.mp4
|
80.0 MB
|
Justin Varner - Honeypot Boo Boo Understanding Adversaries with Deception Technology.mp4
|
77.5 MB
|
Kris Wall - Digital Forensics Reconstructing an Attack in Modern Web Apps.mp4
|
93.6 MB
|
Michael French & Christopher Cope - Working With The FBI - Keynote.mp4
|
97.7 MB
|
Nick Popovich - Warning This Message Originated from Outside of Your Organization.mp4
|
77.7 MB
|
Peter Partyka - Threat Intelligence 2022 Actionable.mp4
|
72.8 MB
|
Raymond Canzanese - Malware Where Does It Come From.mp4
|
61.7 MB
|
/.../RVAsec 11 - 2022 captions/
|
Alex Nette - Talk the Talk Communicating Business Risk During Cyber Incidents.eng.srt
|
77.7 KB
|
Andre Pitanga Basslines and Baselines The role of Anomaly Detection in Cloud Security.eng.srt
|
96.3 KB
|
Collin Berman - Slippery SOP Edge Cases in the Same Origin Policy.eng.srt
|
74.0 KB
|
David Girvin - Bootstrapping Your First AppSec Program.eng.srt
|
99.6 KB
|
Dorsey Levens - Keynote.eng.srt
|
112.5 KB
|
Ian Garrett - To Err is Human Combating Human Error in Healthcare Cybersecurity.eng.srt
|
103.0 KB
|
Justin Varner - Honeypot Boo Boo Understanding Adversaries with Deception Technology.eng.srt
|
80.6 KB
|
Kris Wall - Digital Forensics Reconstructing an Attack in Modern Web Apps.eng.srt
|
107.3 KB
|
Michael French & Christopher Cope - Working With The FBI - Keynote.eng.srt
|
100.2 KB
|
Nick Popovich - Warning This Message Originated from Outside of Your Organization.eng.srt
|
94.7 KB
|
Peter Partyka - Threat Intelligence 2022 Actionable.eng.srt
|
104.3 KB
|
Raymond Canzanese - Malware Where Does It Come From.eng.srt
|
87.1 KB
|
/RVAsec 12 - 2023/
|
Adrian Amos - I ❤️ My Password.mp4
|
96.3 MB
|
Aliscia Andrews - Cyber, the Commonwealth and You.mp4
|
60.6 MB
|
Amelia Szczuchniak - Why You Can't Call the Police.mp4
|
60.2 MB
|
Andrea Matwyshyn - Cybernation The FUD, Facts, & Future of Software Liability Security.mp4
|
84.2 MB
|
Andrew Hendela - Software Bills of Behaviors Why SBOMs aren't enough.mp4
|
64.8 MB
|
Andy Ellis - Keynote Building Leadership, 1% at a Time.mp4
|
102.9 MB
|
Brendan O'Leary - Shakespeare, Bacon, and the NSA.mp4
|
67.0 MB
|
Colin Estep - Insiders packing their bags with your data.mp4
|
46.8 MB
|
Dan Han - Beyond the pandemic How it shaped organizations and their sec architecture.mp4
|
64.4 MB
|
David Girvin - Hacking your Job Trying to cheat at life with ChatGPT.mp4
|
67.3 MB
|
Denis Mandich - Quantum Cybersecurity.mp4
|
91.8 MB
|
Drew Schmitt - Ransomware Rebranding So Hot Right Now.mp4
|
64.1 MB
|
Dwayne McDaniel - Who Goes There Actively Detecting Intruders w Cyber Deception Tools.mp4
|
64.0 MB
|
Fletcher Davis - Context Matters Tailoring Tradecraft to the Operational Environment.mp4
|
64.8 MB
|
Ian MacRae - The state of NIST CMMC compliance today.mp4
|
70.8 MB
|
Jason Wonn - Corporate Dungeon Master How to Lead Cyber Games at Work.mp4
|
84.6 MB
|
Josh Cigna - Everything you never knew you wanted to know about Passkeys.mp4
|
64.6 MB
|
Kate Collins - This is the Way A New Leadership Creed for Info-Sec professionals.mp4
|
70.0 MB
|
Kevin Massey - Heap Exploitation from First Principles.mp4
|
47.8 MB
|
Luke McOmie - A programmatic approach to enterprise security OR How to not waste.mp4
|
92.3 MB
|
Mark Arnold - TOP 5 CISO FINDINGS OF 2022.mp4
|
61.4 MB
|
Paul Asadoorian - Keynote.mp4
|
108.7 MB
|
Qasim Ijaz - Feature or a Vulnerability Tale of an Active Directory Pentest.mp4
|
94.2 MB
|
Rick Lull - Network 201 A Tour Through Network Security.mp4
|
51.1 MB
|
Scott Small - Adversary TTP Evolution & the Value of TTP Intelligence.mp4
|
74.9 MB
|
/.../RVAsec 12 - 2023 captions/
|
Adrian Amos - I ❤️ My Password.eng.srt
|
107.2 KB
|
Aliscia Andrews - Cyber, the Commonwealth and You.eng.srt
|
99.7 KB
|
Amelia Szczuchniak - Why You Can't Call the Police.eng.srt
|
86.0 KB
|
Andrea Matwyshyn - Cybernation The FUD, Facts, & Future of Software Liability Security.eng.srt
|
80.1 KB
|
Andrew Hendela - Software Bills of Behaviors Why SBOMs aren't enough.eng.srt
|
107.3 KB
|
Andy Ellis - Keynote Building Leadership, 1% at a Time.eng.srt
|
134.7 KB
|
Brendan O'Leary - Shakespeare, Bacon, and the NSA.eng.srt
|
91.7 KB
|
Colin Estep - Insiders packing their bags with your data.eng.srt
|
67.3 KB
|
Dan Han - Beyond the pandemic How it shaped organizations and their sec architecture.eng.srt
|
94.2 KB
|
David Girvin - Hacking your Job Trying to cheat at life with ChatGPT.eng.srt
|
91.4 KB
|
Denis Mandich - Quantum Cybersecurity.eng.srt
|
104.8 KB
|
Drew Schmitt - Ransomware Rebranding So Hot Right Now.eng.srt
|
99.0 KB
|
Dwayne McDaniel - Who Goes There Actively Detecting Intruders w Cyber Deception Tools.eng.srt
|
85.2 KB
|
Fletcher Davis - Context Matters Tailoring Tradecraft to the Operational Environment.eng.srt
|
107.8 KB
|
Ian MacRae - The state of NIST CMMC compliance today.eng.srt
|
85.1 KB
|
Jason Wonn - Corporate Dungeon Master How to Lead Cyber Games at Work.eng.srt
|
91.5 KB
|
Josh Cigna - Everything you never knew you wanted to know about Passkeys.eng.srt
|
91.6 KB
|
Kate Collins - This is the Way A New Leadership Creed for Info-Sec professionals.eng.srt
|
88.4 KB
|
Kevin Massey - Heap Exploitation from First Principles.eng.srt
|
79.4 KB
|
Luke McOmie - A programmatic approach to enterprise security OR How to not waste.eng.srt
|
103.2 KB
|
Mark Arnold - TOP 5 CISO FINDINGS OF 2022.eng.srt
|
70.5 KB
|
Paul Asadoorian - Keynote.eng.json
|
3.1 MB
|
Paul Asadoorian - Keynote.eng.lrc
|
79.9 KB
|
Paul Asadoorian - Keynote.eng.srt
|
78.0 KB
|
Paul Asadoorian - Keynote.eng.text
|
54.6 KB
|
Paul Asadoorian - Keynote.eng.tsv
|
69.7 KB
|
Paul Asadoorian - Keynote.eng.txt
|
80.9 KB
|
Paul Asadoorian - Keynote.eng.vtt
|
71.3 KB
|
Qasim Ijaz - Feature or a Vulnerability Tale of an Active Directory Pentest.eng.srt
|
84.2 KB
|
Rick Lull - Network 201 A Tour Through Network Security.eng.srt
|
88.4 KB
|
Scott Small - Adversary TTP Evolution & the Value of TTP Intelligence.eng.srt
|
96.9 KB
|
/RVAsec 13 - 2024/
|
Ali Ahmad - Hacking Exchange From The Outside In.mp4
|
33.2 MB
|
AM Grobelny - Secure Legends GameDay - A Cloud Security Danger Room.mp4
|
70.2 MB
|
Aqeel Yaseen - Mindfulness, Meditation, and Cybersecurity.mp4
|
44.7 MB
|
Ariyan Suroosh- Its Coming From Inside the House Guide to Physical Facility Pentesting.mp4
|
52.0 MB
|
Ben Haynes - Prioritization Myths Busted with Better Vulnerability Data.mp4
|
52.3 MB
|
Caleb Gross - Josh Shomo - Patch Perfect Harmonizing with LLMs to Find Security Vulns.mp4
|
50.2 MB
|
Caleb Sima - Keynote.mp4
|
53.7 MB
|
Chris Tillett - The Human Experience of Security Operations.mp4
|
44.2 MB
|
Corey Brennan - Embracing My Inner Cyber Wizard To Defeat Impostor Syndrome.mp4
|
45.7 MB
|
Corey Overstreet - That Shouldn't Have Worked - Payload Development 101.mp4
|
47.0 MB
|
Darryl MacLeod - Strategic Alliances How GRC Teams Empower Offensive Security Efforts.mp4
|
34.5 MB
|
David Girvin-Social Engineering the Social EngineersHow To Not Suck at Buying Software.mp4
|
43.7 MB
|
David J. Bianco - My Way is Not Very Sportsman-Like.mp4
|
42.3 MB
|
Ell Marquez - Once Upon a Cyber Threat The Brothers Grimms Teachings on APT Awareness.mp4
|
41.1 MB
|
Evan Booth - Scaling Your Creative Output with AI Lessons from SANS Holiday Hack 2023.mp4
|
47.9 MB
|
Jason Ross - Unlocking Generative AI Balancing Innovation with Security.mp4
|
50.6 MB
|
Jennifer Shannon - API-ocalypse.mp4
|
55.9 MB
|
Jimi Sebree - Evan Grant - Consumer Routers Still Suck.mp4
|
44.4 MB
|
Kevin Johnson - Orion's Quest Navigating Cyber Wilderness - Tales of Modern Pentesting.mp4
|
53.4 MB
|
Kymberlee Price - 2024 Keynote - Let Them Eat Cake.mp4
|
26.7 MB
|
Luke McOmie (Pyr0) - Apples to Apples.mp4
|
80.9 MB
|
Micah Parks - Reverse Engineering for Dummies The what if User.mp4
|
44.7 MB
|
Nick Copi- Some Assembly Required Weaponizing Chrome CVE-2023-2033 for RCE in Electron.mp4
|
48.2 MB
|
Oren Koren-Verified for Business Continuity How to Remediate Risk Across Enterprise.mp4
|
46.8 MB
|
Qasim Ijaz - Please Waste My Time.mp4
|
52.7 MB
|
Ross Merritt - Improv Comedy for Social Engineering.mp4
|
56.0 MB
|
Sam Panicker - Quickstart To Building Your Own Private AI Chat.mp4
|
63.8 MB
|
Steve Pressman - The ABCs of DevSecOps.mp4
|
53.2 MB
|
Tucker Mahan-Defending Against the Deep Is your workforce ready Gen AI Adversaries.mp4
|
62.5 MB
|
/.../RVAsec 13 - 2024 captions/
|
Ali Ahmad - Hacking Exchange From The Outside In.eng.srt
|
62.5 KB
|
AM Grobelny - Secure Legends GameDay - A Cloud Security Danger Room.eng.srt
|
77.8 KB
|
Aqeel Yaseen - Mindfulness, Meditation, and Cybersecurity.eng.srt
|
49.3 KB
|
Ariyan Suroosh- Its Coming From Inside the House Guide to Physical Facility Pentesting.eng.srt
|
112.8 KB
|
Ben Haynes - Prioritization Myths Busted with Better Vulnerability Data.eng.srt
|
98.3 KB
|
Caleb Gross - Josh Shomo - Patch Perfect Harmonizing with LLMs to Find Security Vulns.eng.srt
|
81.7 KB
|
Caleb Sima - Keynote.eng.srt
|
116.7 KB
|
Chris Tillett - The Human Experience of Security Operations.eng.srt
|
86.3 KB
|
Corey Brennan - Embracing My Inner Cyber Wizard To Defeat Impostor Syndrome.eng.srt
|
85.9 KB
|
Corey Overstreet - That Shouldn't Have Worked - Payload Development 101.eng.srt
|
86.7 KB
|
Darryl MacLeod - Strategic Alliances How GRC Teams Empower Offensive Security Efforts.eng.srt
|
87.1 KB
|
David Girvin-Social Engineering the Social EngineersHow To Not Suck at Buying Software.eng.srt
|
85.4 KB
|
David J. Bianco - My Way is Not Very Sportsman-Like.eng.srt
|
71.6 KB
|
Ell Marquez - Once Upon a Cyber Threat The Brothers Grimms Teachings on APT Awareness.eng.srt
|
90.0 KB
|
Evan Booth - Scaling Your Creative Output with AI Lessons from SANS Holiday Hack 2023.eng.srt
|
72.6 KB
|
Jason Ross - Unlocking Generative AI Balancing Innovation with Security.eng.srt
|
101.8 KB
|
Jennifer Shannon - API-ocalypse.eng.srt
|
81.8 KB
|
Jimi Sebree - Evan Grant - Consumer Routers Still Suck.eng.srt
|
86.5 KB
|
Kevin Johnson - Orion's Quest Navigating Cyber Wilderness - Tales of Modern Pentesting.eng.srt
|
91.0 KB
|
Kymberlee Price - 2024 Keynote - Let Them Eat Cake.eng.srt
|
52.4 KB
|
Luke McOmie (Pyr0) - Apples to Apples.eng.srt
|
110.3 KB
|
Micah Parks - Reverse Engineering for Dummies The what if User.eng.srt
|
82.5 KB
|
Nick Copi- Some Assembly Required Weaponizing Chrome CVE-2023-2033 for RCE in Electron.eng.srt
|
71.8 KB
|
Oren Koren-Verified for Business Continuity How to Remediate Risk Across Enterprise.eng.srt
|
75.4 KB
|
Qasim Ijaz - Please Waste My Time.eng.srt
|
72.1 KB
|
Ross Merritt - Improv Comedy for Social Engineering.eng.srt
|
56.7 KB
|
Sam Panicker - Quickstart To Building Your Own Private AI Chat.eng.srt
|
84.0 KB
|
Steve Pressman - The ABCs of DevSecOps.eng.srt
|
99.1 KB
|
Tucker Mahan-Defending Against the Deep Is your workforce ready Gen AI Adversaries.eng.srt
|
77.5 KB
|
Total files 556
|