FileMood

Download RVAsec

RVAsec

Name

RVAsec

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

12.0 GB

Total Files

556

Hash

3D254BD408000F6E3F57A8575590C55F889C1332

/

HEADER.md

0.4 KB

RVAsec 13 logo.png

52.3 KB

RVAsec logo.jpg

10.4 KB

RVAsec thank you.txt

0.9 KB

/RVAsec 1 - 2012/

Code Maturity - Is SDL a Waste of Time (Carsten Eiram).mp4

109.5 MB

Don't be a Cog in the Wheel (Chris Gerling).mp4

50.5 MB

Errata Hits Puberty - 13 Years of Chagrin (Jericho).mp4

132.3 MB

I'm not a Doctor But I Play One On Your Network (Tim Elrod).mp4

133.4 MB

KeyNote - The Easy Stuff is Done (Marcus Ranum).mp4

96.2 MB

Managing Security Within The Cloud (Adam Ely).mp4

105.4 MB

PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).mp4

42.7 MB

Reverse Engineer an Obfuscated.Net Application (Travis Altman).mp4

30.1 MB

Why Do You Lock Your Door (Schuyler Towne).mp4

140.7 MB

/.../RVAsec 1 - 2012 captions/

Code Maturity - Is SDL a Waste of Time (Carsten Eiram).eng.srt

119.7 KB

Don't be a Cog in the Wheel (Chris Gerling).eng.srt

53.5 KB

Errata Hits Puberty - 13 Years of Chagrin (Jericho).eng.srt

127.9 KB

I'm not a Doctor But I Play One On Your Network (Tim Elrod).eng.srt

140.9 KB

KeyNote - The Easy Stuff is Done (Marcus Ranum).eng.srt

165.8 KB

Managing Security Within The Cloud (Adam Ely).eng.json

3.7 MB

Managing Security Within The Cloud (Adam Ely).eng.lrc

98.7 KB

Managing Security Within The Cloud (Adam Ely).eng.srt

99.2 KB

Managing Security Within The Cloud (Adam Ely).eng.text

62.0 KB

Managing Security Within The Cloud (Adam Ely).eng.tsv

83.9 KB

Managing Security Within The Cloud (Adam Ely).eng.txt

100.1 KB

Managing Security Within The Cloud (Adam Ely).eng.vtt

88.4 KB

PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).eng.srt

55.0 KB

Reverse Engineer an Obfuscated.Net Application (Travis Altman).eng.srt

132.5 KB

Why Do You Lock Your Door (Schuyler Towne).eng.json

2.5 MB

Why Do You Lock Your Door (Schuyler Towne).eng.lrc

62.2 KB

Why Do You Lock Your Door (Schuyler Towne).eng.srt

70.3 KB

Why Do You Lock Your Door (Schuyler Towne).eng.text

48.2 KB

Why Do You Lock Your Door (Schuyler Towne).eng.tsv

56.4 KB

Why Do You Lock Your Door (Schuyler Towne).eng.txt

62.7 KB

Why Do You Lock Your Door (Schuyler Towne).eng.vtt

64.0 KB

/RVAsec 2 - 2013/

Adam Ely - BYOD - Risks, Maturity and Solutions.mp4

36.3 MB

Alex Hutton - KEYNOTE - Towards A Modern Approach To Risk Management.mp4

36.3 MB

Barry Kouns - Risk Assessment - The Heart of Information Security.mp4

23.8 MB

Brian Lockrey - Social Media Digital Forensics.mp4

27.1 MB

Chris Wysopal - Keynote - Future of Government Info Sharing.mp4

36.0 MB

Colby Clark - The Digital Battlefield.mp4

26.2 MB

Dan Han - SIEM implementation - What to Expect.mp4

16.7 MB

Dan Holden - DDoS and Modern Threat Motives.mp4

29.3 MB

Daniel Ramsbrock - Web Application Vulnerabilities and Solutions.mp4

24.8 MB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.mp4

20.7 MB

Gus Fritschie & Andrew Du - How to Defend Against FISMA.mp4

24.0 MB

Itzik Kotler - Hack Like Its 2013.mp4

24.3 MB

Jericho - Our Straw House - Vulnerabilities.mp4

23.6 MB

Mike Shema - JavaScript Security & HTML5.mp4

27.6 MB

Paul Watson - Cross Platform Network Access Control.mp4

20.9 MB

Rockie Brockway-Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).mp4

27.8 MB

Schuyler Towne - Vulnerability Research Circa 1851.mp4

44.7 MB

Sean Mason - A Day in the Life of an Incident Responder at a Fortune 5.mp4

18.7 MB

/.../RVAsec 2 - 2013 captions/

Adam Ely - BYOD - Risks, Maturity and Solutions.eng.srt

108.1 KB

Alex Hutton - KEYNOTE - Towards A Modern Approach To Risk Management.eng.srt

118.2 KB

Barry Kouns - Risk Assessment - The Heart of Information Security.eng.srt

77.0 KB

Brian Lockrey - Social Media Digital Forensics.eng.srt

82.8 KB

Chris Wysopal - Keynote - Future of Government Info Sharing.eng.srt

122.6 KB

Colby Clark - The Digital Battlefield.eng.srt

108.3 KB

Dan Han - SIEM implementation - What to Expect.eng.srt

77.5 KB

Dan Holden - DDoS and Modern Threat Motives.eng.srt

117.4 KB

Daniel Ramsbrock - Web Application Vulnerabilities and Solutions.eng.srt

103.3 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.json

2.1 MB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.lrc

51.2 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.srt

59.2 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.text

40.1 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.tsv

46.6 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.txt

51.6 KB

Don Allison-Observations on the Inadvertent Effect of Data Mgmt on Investigations.eng.vtt

53.8 KB

Gus Fritschie & Andrew Du - How to Defend Against FISMA.eng.srt

117.9 KB

Itzik Kotler - Hack Like Its 2013.eng.srt

115.2 KB

Jericho - Our Straw House - Vulnerabilities.eng.json

2.2 MB

Jericho - Our Straw House - Vulnerabilities.eng.lrc

51.8 KB

Jericho - Our Straw House - Vulnerabilities.eng.srt

70.8 KB

Jericho - Our Straw House - Vulnerabilities.eng.text

40.2 KB

Jericho - Our Straw House - Vulnerabilities.eng.tsv

47.0 KB

Jericho - Our Straw House - Vulnerabilities.eng.txt

52.3 KB

Jericho - Our Straw House - Vulnerabilities.eng.vtt

62.1 KB

Mike Shema - JavaScript Security & HTML5.eng.srt

118.8 KB

Paul Watson - Cross Platform Network Access Control.eng.srt

94.8 KB

Rockie Brockway-Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).eng.srt

74.2 KB

Schuyler Towne - Vulnerability Research Circa 1851.eng.srt

160.3 KB

Sean Mason - A Day in the Life of an Incident Responder at a Fortune 5.eng.srt

125.2 KB

/RVAsec 3 - 2014/

Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.mp4

48.0 MB

Brian Baskin - Introducing Intelligence into Malware Analysis.mp4

49.3 MB

Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.mp4

46.3 MB

David Bianco - Pyramid of Pain - Intel-Driven Detection Response to Increase Adversary's Cost.mp4

51.3 MB

David Kennedy - 2014 Keynote.mp4

61.5 MB

David Sharpe and Katherine Trame - Real World Intrusion Response.mp4

40.7 MB

Evan Booth - Terminal Cornucopia - Demystifying the Mullet.mp4

46.3 MB

Gene Fishel - 2014 Keynote.mp4

56.8 MB

Inga Goddijn - Cyber Insurance - Worth the Effort or Total Ripoff.mp4

49.3 MB

Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.mp4

36.7 MB

Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).mp4

60.1 MB

Joey Peloquin - Offensive Mobile Forensics.mp4

59.8 MB

Jonathan Dambrot - Third Party Risk Management and Cybersecurity.mp4

42.5 MB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.mp4

33.8 MB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.mp4

54.9 MB

Nick Popovich - I Found a Thing and You Can Too - ISP's Unauthenticated SOAP Service.mp4

49.0 MB

Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.mp4

44.9 MB

Ray Kelly - Man In The Front - Modifying the Android OS for Mobile App Testing.mp4

40.3 MB

Schuyler Towne - How to Make a Lock.mp4

57.5 MB

Seth Hanford - CVSS v3 - This One Goes to 11.mp4

46.2 MB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.mp4

44.2 MB

/.../RVAsec 3 - 2014 captions/

Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.eng.srt

120.3 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.json

3.1 MB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.lrc

75.9 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.srt

82.6 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.text

55.7 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.tsv

67.7 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.txt

76.7 KB

Brian Baskin - Introducing Intelligence into Malware Analysis.eng.vtt

74.9 KB

Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.eng.srt

113.4 KB

David Bianco - Pyramid of Pain - Intel-Driven Detection Response to Increase Adversary's Cost.eng.srt

131.4 KB

David Kennedy - 2014 Keynote.eng.srt

152.1 KB

David Sharpe and Katherine Trame - Real World Intrusion Response.eng.srt

114.0 KB

Evan Booth - Terminal Cornucopia - Demystifying the Mullet.eng.srt

110.6 KB

Gene Fishel - 2014 Keynote.eng.srt

111.1 KB

Inga Goddijn - Cyber Insurance - Worth the Effort or Total Ripoff.eng.srt

131.7 KB

Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.eng.srt

69.8 KB

Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).eng.srt

163.0 KB

Joey Peloquin - Offensive Mobile Forensics.eng.srt

103.9 KB

Jonathan Dambrot - Third Party Risk Management and Cybersecurity.eng.srt

104.6 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.en.transcribed.srt

83.2 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.json

2.0 MB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.lrc

57.9 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.srt

51.2 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.text

34.3 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.tsv

48.2 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.txt

58.9 KB

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.eng.vtt

46.3 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.json

2.8 MB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.lrc

79.9 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.srt

71.8 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.text

42.6 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.tsv

64.5 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.txt

81.3 KB

Mubix- Attacker Ghost Stories - Mostly Free Defenses That Gives Attackers Nightmares.eng.vtt

63.3 KB

Nick Popovich - I Found a Thing and You Can Too - ISP's Unauthenticated SOAP Service.eng.srt

91.9 KB

Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.eng.srt

94.2 KB

Ray Kelly - Man In The Front - Modifying the Android OS for Mobile App Testing.eng.srt

105.3 KB

Schuyler Towne - How to Make a Lock.eng.json

3.2 MB

Schuyler Towne - How to Make a Lock.eng.lrc

93.1 KB

Schuyler Towne - How to Make a Lock.eng.srt

72.2 KB

Schuyler Towne - How to Make a Lock.eng.text

51.9 KB

Schuyler Towne - How to Make a Lock.eng.tsv

76.4 KB

Schuyler Towne - How to Make a Lock.eng.txt

94.7 KB

Schuyler Towne - How to Make a Lock.eng.vtt

66.1 KB

Seth Hanford - CVSS v3 - This One Goes to 11.eng.srt

140.0 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.json

3.2 MB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.lrc

86.4 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.srt

86.6 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.text

57.6 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.tsv

74.6 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.txt

87.5 KB

Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.eng.vtt

78.2 KB

/RVAsec 4 - 2015/

Adam Crosby - Embracing the Cloud.mp4

35.4 MB

Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.mp4

50.6 MB

Barry Kouns - Incident Response Management - Not a Fire Drill.mp4

52.3 MB

Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.mp4

37.1 MB

Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.mp4

33.4 MB

Caleb - Chill - Crable - The Art of Post-Infection Response and Mitigation.mp4

40.5 MB

David Bianco - Visual Hunting with Linked Data Graphs.mp4

37.3 MB

Elissa Shevinsky - The Changing Legal Landscape for InfoSec - What You Need to Know.mp4

45.9 MB

Guy Broome - Foss Cryptographic Data Storage.mp4

35.4 MB

Jason Smith - Applied Detection and Analysis Using Flow Data.mp4

44.8 MB

Keynote - G. Mark Hardy.mp4

56.2 MB

Keynote Jennifer Steffens.mp4

36.0 MB

Kizz Myanthia - Into The Worm Hole - Metasploit For Web PenTesting.mp4

45.3 MB

Mark Pain'ter - A year in the life of HP security research.mp4

36.6 MB

Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.mp4

55.7 MB

Pete Herzog & Dave Lauer - Hacking the Market.mp4

30.7 MB

Schuyler Towne - Selling Security in a Post Lock Society.mp4

38.6 MB

Speed Debates.mp4

35.7 MB

Virginia Governor Terry McAuliffe.mp4

20.3 MB

/.../RVAsec 4 - 2015 captions/

Adam Crosby - Embracing the Cloud.eng.srt

110.9 KB

Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.eng.srt

120.4 KB

Barry Kouns - Incident Response Management - Not a Fire Drill.eng.srt

97.9 KB

Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.eng.srt

106.5 KB

Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.eng.srt

94.2 KB

Caleb - Chill - Crable - The Art of Post-Infection Response and Mitigation.eng.srt

100.1 KB

David Bianco - Visual Hunting with Linked Data Graphs.eng.srt

78.0 KB

Elissa Shevinsky - The Changing Legal Landscape for InfoSec - What You Need to Know.eng.srt

82.9 KB

Guy Broome - Foss Cryptographic Data Storage.eng.srt

102.7 KB

Jason Smith - Applied Detection and Analysis Using Flow Data.eng.srt

120.9 KB

Keynote - G. Mark Hardy.eng.srt

139.0 KB

Keynote Jennifer Steffens.eng.srt

70.9 KB

Kizz Myanthia - Into The Worm Hole - Metasploit For Web PenTesting.eng.srt

112.6 KB

Mark Pain'ter - A year in the life of HP security research.eng.srt

91.9 KB

Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.eng.srt

114.1 KB

Pete Herzog & Dave Lauer - Hacking the Market.eng.srt

134.3 KB

Schuyler Towne - Selling Security in a Post Lock Society.eng.srt

127.2 KB

Speed Debates.eng.srt

69.2 KB

Virginia Governor Terry McAuliffe.eng.srt

39.8 KB

/RVAsec 5 - 2016/

Andrea Matwyshyn - CYBER.mp4

23.4 MB

Andrew McNicol & Zack Meyers - Beyond Automated Testing.mp4

41.7 MB

Ben Smith - Measuring Security - How Do I Know What a Valid Metric Looks Like.mp4

37.4 MB

Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.mp4

36.0 MB

Chris Romeo - AppSec Awareness - A Blue Print for Security Culture Change.mp4

37.1 MB

David Sirrine - Open Source Identity Management - From Password to Policy.mp4

36.9 MB

Dawn-Marie Hutchinson - Beyond the Security Team - The Economics of Breach Response.mp4

42.2 MB

Evan Johnson - Staying Above A Rising Security Waterline.mp4

23.6 MB

Inga Goddijn & Becky Swanson - Show Me The Money Uncovering The True Cost of a Breach.mp4

39.3 MB

Joey Peloquin - Deceptive Defense - Beyond Honeypots.mp4

40.1 MB

Joshua Cole - Probability in Cyber Risk Assessment - Holy Grail or Red Herring.mp4

55.8 MB

Juan Carlos - Reversing For Humans.mp4

47.7 MB

Karen R. Jackson, Virginia Secretary of Technology - Keynote.mp4

40.0 MB

Mark Weatherford (Your) Inevitable Path to the Cloud.mp4

30.8 MB

Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.mp4

52.9 MB

Rockie Brockway - Enterprise Threat Management Like a Boss.mp4

51.5 MB

Senator Mark Warner - Welcome To RVAsec.mp4

4.2 MB

Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.mp4

45.3 MB

Trey Ford - Keynote.mp4

36.5 MB

Troy Wojewoda - Bro's Before Flows.mp4

42.5 MB

Wendy Nather - Keynote.mp4

38.1 MB

/.../RVAsec 5 - 2016 captions/

Andrea Matwyshyn - CYBER.eng.srt

75.1 KB

Andrew McNicol & Zack Meyers - Beyond Automated Testing.eng.srt

134.4 KB

Ben Smith - Measuring Security - How Do I Know What a Valid Metric Looks Like.eng.srt

115.6 KB

Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.eng.srt

95.9 KB

Chris Romeo - AppSec Awareness - A Blue Print for Security Culture Change.eng.srt

130.8 KB

David Sirrine - Open Source Identity Management - From Password to Policy.eng.srt

103.2 KB

Dawn-Marie Hutchinson - Beyond the Security Team - The Economics of Breach Response.eng.srt

93.5 KB

Evan Johnson - Staying Above A Rising Security Waterline.eng.srt

52.8 KB

Inga Goddijn & Becky Swanson - Show Me The Money Uncovering The True Cost of a Breach.eng.srt

117.3 KB

Joey Peloquin - Deceptive Defense - Beyond Honeypots.eng.srt

119.7 KB

Joshua Cole - Probability in Cyber Risk Assessment - Holy Grail or Red Herring.eng.srt

87.8 KB

Juan Carlos - Reversing For Humans.eng.srt

91.1 KB

Karen R. Jackson, Virginia Secretary of Technology - Keynote.eng.srt

130.1 KB

Mark Weatherford (Your) Inevitable Path to the Cloud.eng.srt

68.2 KB

Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.eng.srt

119.0 KB

Rockie Brockway - Enterprise Threat Management Like a Boss.eng.srt

84.2 KB

Senator Mark Warner - Welcome To RVAsec.eng.srt

9.5 KB

Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.eng.srt

94.4 KB

Trey Ford - Keynote.eng.srt

108.2 KB

Troy Wojewoda - Bro's Before Flows.eng.srt

122.9 KB

Wendy Nather - Keynote.eng.srt

112.0 KB

/RVAsec 6 - 2017/

Alon Arvatz - OSINT - The Secret Weapon in Hunting Nation-State Campaigns.mp4

39.6 MB

Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.mp4

42.2 MB

Dan Holden - Retailing Another Threat Landscape Story.mp4

33.6 MB

Daniel Bohannon - Invoke-CradleCrafter - Moar PowerShell obFUsk8tion & Detection.mp4

53.6 MB

Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.mp4

28.3 MB

Governor Terry McAuliffe.mp4

15.3 MB

Grayson Walters - Building a pentest program on a shoestring budget.mp4

26.8 MB

Greg Pepper - Best Practices for Securing the Hybrid Cloud.mp4

40.5 MB

Jason Ross - DevOpSec - Killing the Buzz.mp4

27.1 MB

Jason Wonn - TIP of the Spear - A Threat Intelligence Platform Acquisition.mp4

36.3 MB

Jeremy Dorrough - Zero Trust Lite Architecture to Securely Future-Proof Your Network.mp4

34.9 MB

Ken Johnson AWS Survival Guide 2.0.mp4

25.6 MB

Mike Shema - Managing Crowdsourced Security Testing.mp4

39.5 MB

Mikko Hypponen - Keynote.mp4

71.6 MB

Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.mp4

35.6 MB

Robert Mitchell - Recent Developments in Linkography Based Cyber Security.mp4

39.8 MB

Robert Wood - Main'tainability Security.mp4

35.8 MB

Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.mp4

38.9 MB

Ron Gula - Keynote.mp4

38.9 MB

Seth Hanford - Defend the Defenders - Managing and Participating in Excellent Teams.mp4

63.3 MB

Troy Marshall - RoboCop- Bringing Law And Order To CICD.mp4

39.4 MB

/.../RVAsec 6 - 2017 captions/

Alon Arvatz - OSINT - The Secret Weapon in Hunting Nation-State Campaigns.eng.srt

120.7 KB

Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.eng.srt

118.8 KB

Dan Holden - Retailing Another Threat Landscape Story.eng.srt

129.5 KB

Daniel Bohannon - Invoke-CradleCrafter - Moar PowerShell obFUsk8tion & Detection.eng.srt

172.1 KB

Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.eng.srt

116.7 KB

Governor Terry McAuliffe.eng.srt

45.6 KB

Grayson Walters - Building a pentest program on a shoestring budget.eng.srt

99.0 KB

Greg Pepper - Best Practices for Securing the Hybrid Cloud.eng.srt

147.6 KB

Jason Ross - DevOpSec - Killing the Buzz.eng.srt

108.1 KB

Jason Wonn - TIP of the Spear - A Threat Intelligence Platform Acquisition.eng.srt

119.3 KB

Jeremy Dorrough - Zero Trust Lite Architecture to Securely Future-Proof Your Network.eng.srt

134.5 KB

Ken Johnson AWS Survival Guide 2.0.eng.srt

92.4 KB

Mike Shema - Managing Crowdsourced Security Testing.eng.srt

127.7 KB

Mikko Hypponen - Keynote.eng.srt

161.5 KB

Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.eng.srt

103.0 KB

Robert Mitchell - Recent Developments in Linkography Based Cyber Security.eng.srt

138.6 KB

Robert Wood - Main'tainability Security.eng.srt

140.0 KB

Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.eng.srt

121.7 KB

Ron Gula - Keynote.eng.srt

180.1 KB

Seth Hanford - Defend the Defenders - Managing and Participating in Excellent Teams.eng.srt

174.2 KB

Troy Marshall - RoboCop- Bringing Law And Order To CICD.eng.srt

122.4 KB

/RVAsec 7 - 2018/

Bob Siegel - GDPR and You.mp4

82.1 MB

Chris Czub - OS X App Whitelisting Without Losing Your Job.mp4

51.6 MB

Crane Hassold - Doxing Phishers - Analyzing Phishing Attacks from Lure to Attribution.mp4

66.9 MB

Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.mp4

79.9 MB

Derek Banks & Beau Bullock - Red Team Apocalypse.mp4

88.9 MB

Elissa Shevinsky - Container Security - Vulnerabilities, Exploits and Defense.mp4

48.4 MB

Galloway & Yunusov - Demystifying Payments - Payment Technologies and Sec Risks.mp4

50.2 MB

Josh Corman - Keynote.mp4

97.0 MB

Karen Cole - From Grief to Enlightenment - Getting the Executive Support for InfoSec.mp4

68.2 MB

Katie Moussouris - Keynote.mp4

91.7 MB

Ksenia Peguero - How to REACT to JavaScript [In]Security.mp4

66.0 MB

Mark Arnold - Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....mp4

55.2 MB

Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.mp4

34.5 MB

Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.mp4

26.9 MB

Nathaniel Hirsch - Building a Better Catfish.mp4

55.3 MB

Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.mp4

62.3 MB

Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.mp4

65.1 MB

Travis McCormack - From Web App to ATM - Why the Basics Matter.mp4

50.3 MB

Tyler Townes - Let's build an OSS vulnerability management program.mp4

65.3 MB

/.../RVAsec 7 - 2018 captions/

Bob Siegel - GDPR and You.eng.srt

137.0 KB

Chris Czub - OS X App Whitelisting Without Losing Your Job.eng.srt

95.7 KB

Crane Hassold - Doxing Phishers - Analyzing Phishing Attacks from Lure to Attribution.eng.srt

138.6 KB

Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.eng.srt

98.0 KB

Derek Banks & Beau Bullock - Red Team Apocalypse.eng.srt

146.1 KB

Elissa Shevinsky - Container Security - Vulnerabilities, Exploits and Defense.eng.srt

81.2 KB

Galloway & Yunusov - Demystifying Payments - Payment Technologies and Sec Risks.eng.srt

88.8 KB

Josh Corman - Keynote.eng.srt

185.3 KB

Karen Cole - From Grief to Enlightenment - Getting the Executive Support for InfoSec.eng.srt

133.5 KB

Katie Moussouris - Keynote.eng.srt

141.0 KB

Ksenia Peguero - How to REACT to JavaScript [In]Security.eng.srt

124.6 KB

Mark Arnold - Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....eng.srt

90.4 KB

Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.eng.srt

68.7 KB

Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.eng.srt

47.1 KB

Nathaniel Hirsch - Building a Better Catfish.eng.srt

100.5 KB

Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.eng.srt

124.0 KB

Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.eng.srt

139.9 KB

Travis McCormack - From Web App to ATM - Why the Basics Matter.eng.srt

111.8 KB

Tyler Townes - Let's build an OSS vulnerability management program.eng.srt

131.7 KB

/RVAsec 8 - 2019/

Aaron Bishop - CSRF 101.mp4

41.3 MB

Brad Thornton - Droppin USBs like its hot.mp4

39.2 MB

Chandos Carrow - Security Mind Expansion.mp4

67.7 MB

Dan Holden - CISO of 2025.mp4

49.3 MB

Danny McCaslin - Automating Information Security.mp4

58.2 MB

David Sullivan - Vulnerability Assessments and Penetration Tests.mp4

47.3 MB

Derek Banks - Compliance, Techincal Controls, and You.mp4

79.8 MB

Eddie Glenn - Code Signing A Security Control That Isn’t Secured.mp4

63.2 MB

Jason Hill - Anatomy of a Government Red Team Assessment.mp4

80.0 MB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.mp4

47.0 MB

Jeff Tehovnik - Network Security Monitoring Experience and Lessons.mp4

63.8 MB

Jonathan Glass - Cybersecurity Zero to Hero with CyberChef.mp4

76.9 MB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.mp4

58.3 MB

Mandy Logan - Keynote.mp4

85.0 MB

Rick Lull - Network Security 101.mp4

39.7 MB

Robert Simmons - Comparing Malicious Files.mp4

70.4 MB

Robert Thompson - Breaking and Entering Emulating the Digital Adversary in 2019.mp4

83.4 MB

Sam Lanning - No More Whack-a-Mole How to Find and Prevent Entire Classes of Vulns.mp4

51.3 MB

/.../RVAsec 8 - 2019 captions/

Aaron Bishop - CSRF 101.eng.srt

43.8 KB

Brad Thornton - Droppin USBs like its hot.eng.json

2.6 MB

Brad Thornton - Droppin USBs like its hot.eng.lrc

67.9 KB

Brad Thornton - Droppin USBs like its hot.eng.srt

76.5 KB

Brad Thornton - Droppin USBs like its hot.eng.text

46.2 KB

Brad Thornton - Droppin USBs like its hot.eng.tsv

58.9 KB

Brad Thornton - Droppin USBs like its hot.eng.txt

68.7 KB

Brad Thornton - Droppin USBs like its hot.eng.vtt

67.8 KB

Chandos Carrow - Security Mind Expansion.eng.json

2.0 MB

Chandos Carrow - Security Mind Expansion.eng.lrc

53.3 KB

Chandos Carrow - Security Mind Expansion.eng.srt

52.3 KB

Chandos Carrow - Security Mind Expansion.eng.text

32.5 KB

Chandos Carrow - Security Mind Expansion.eng.tsv

44.7 KB

Chandos Carrow - Security Mind Expansion.eng.txt

54.1 KB

Chandos Carrow - Security Mind Expansion.eng.vtt

46.6 KB

Dan Holden - CISO of 2025.eng.srt

79.7 KB

Danny McCaslin - Automating Information Security.eng.srt

76.1 KB

David Sullivan - Vulnerability Assessments and Penetration Tests.eng.srt

74.7 KB

Derek Banks - Compliance, Techincal Controls, and You.eng.srt

82.1 KB

Eddie Glenn - Code Signing A Security Control That Isn’t Secured.eng.srt

76.1 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.json

2.9 MB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.lrc

73.6 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.srt

81.4 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.text

49.9 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.tsv

63.9 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.txt

74.5 KB

Jason Hill - Anatomy of a Government Red Team Assessment.eng.vtt

72.3 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.json

1.6 MB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.lrc

38.1 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.srt

41.0 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.text

27.8 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.tsv

33.6 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.txt

38.5 KB

Jeff Cummings - Preventing the Attack - DHCP and DNS for the Win.eng.vtt

37.2 KB

Jeff Tehovnik - Network Security Monitoring Experience and Lessons.eng.srt

72.9 KB

Jonathan Glass - Cybersecurity Zero to Hero with CyberChef.eng.srt

72.3 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.json

2.5 MB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.lrc

73.1 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.srt

59.8 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.text

43.5 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.tsv

61.0 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.txt

74.3 KB

Kashish Mittal - One Man Army How - to be the first Security Engineer at a co.eng.vtt

54.9 KB

Mandy Logan - Keynote.eng.srt

84.1 KB

Rick Lull - Network Security 101.eng.json

2.3 MB

Rick Lull - Network Security 101.eng.lrc

56.9 KB

Rick Lull - Network Security 101.eng.srt

64.9 KB

Rick Lull - Network Security 101.eng.text

39.4 KB

Rick Lull - Network Security 101.eng.tsv

49.7 KB

Rick Lull - Network Security 101.eng.txt

57.6 KB

Rick Lull - Network Security 101.eng.vtt

57.6 KB

Robert Simmons - Comparing Malicious Files.eng.srt

94.1 KB

Robert Thompson - Breaking and Entering Emulating the Digital Adversary in 2019.eng.srt

92.2 KB

Sam Lanning - No More Whack-a-Mole How to Find and Prevent Entire Classes of Vulns.eng.srt

62.2 KB

/RVAsec 10 - 2021/

Anthony Switzer - Why I love Purple Teams, even though they don't exist.mp4

34.1 MB

Caleb Mattingly - Bake Security into your Infrastructure-as-Code.mp4

38.1 MB

Chris Tignor - Keynote The Cybersecurity Days of Thunder Driving Faster w Good Brakes.mp4

40.8 MB

Evan Johnson - Zero Trust The Good Parts.mp4

66.1 MB

Jeff Tehovnik - Infrastructure as Code Theory and Concepts.mp4

51.6 MB

John Behen - 5.4 Million Vulnerabilities and Counting.mp4

59.1 MB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.mp4

69.6 MB

Karl Jankowski - Network Assessments Cybersecurity, quackery and fraud.mp4

64.0 MB

Maggie MacAlpine - What’s Next In The Fight Against Ransomware.mp4

60.4 MB

Richard Thayer - Three Worlds of Application - Cloud Security.mp4

59.3 MB

Steve Holliday-Why Should I Care Cybersecurity Maturity Model Certification DoD NonDoD.mp4

78.2 MB

Thor Draper Jr - Raising the Average - Finding and Managing Mentors.mp4

52.4 MB

/.../RVAsec 10 - 2021 captions/

Anthony Switzer - Why I love Purple Teams, even though they don't exist.eng.srt

44.8 KB

Caleb Mattingly - Bake Security into your Infrastructure-as-Code.eng.srt

60.6 KB

Chris Tignor - Keynote The Cybersecurity Days of Thunder Driving Faster w Good Brakes.eng.srt

79.3 KB

Evan Johnson - Zero Trust The Good Parts.eng.srt

91.5 KB

Jeff Tehovnik - Infrastructure as Code Theory and Concepts.eng.srt

67.8 KB

John Behen - 5.4 Million Vulnerabilities and Counting.eng.srt

96.6 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better..eng.srt

99.5 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.json

2.7 MB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.lrc

73.5 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.srt

66.8 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.text

46.4 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.tsv

62.4 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.txt

74.5 KB

Josh Wallace - Introduction to inner-loop security. Shifting left, but better.eng.vtt

60.8 KB

Karl Jankowski - Network Assessments Cybersecurity, quackery and fraud.eng.srt

95.8 KB

Maggie MacAlpine - What’s Next In The Fight Against Ransomware.eng.srt

101.6 KB

Richard Thayer - Three Worlds of Application - Cloud Security.eng.srt

73.3 KB

Steve Holliday-Why Should I Care Cybersecurity Maturity Model Certification DoD NonDoD.eng.srt

89.0 KB

Thor Draper Jr - Raising the Average - Finding and Managing Mentors.eng.srt

82.5 KB

/RVAsec 11 - 2022/

Alex Nette - Talk the Talk Communicating Business Risk During Cyber Incidents.mp4

57.5 MB

Andre Pitanga Basslines and Baselines The role of Anomaly Detection in Cloud Security.mp4

77.2 MB

Collin Berman - Slippery SOP Edge Cases in the Same Origin Policy.mp4

53.8 MB

David Girvin - Bootstrapping Your First AppSec Program.mp4

83.9 MB

Dorsey Levens - Keynote.mp4

111.6 MB

Ian Garrett - To Err is Human Combating Human Error in Healthcare Cybersecurity.mp4

80.0 MB

Justin Varner - Honeypot Boo Boo Understanding Adversaries with Deception Technology.mp4

77.5 MB

Kris Wall - Digital Forensics Reconstructing an Attack in Modern Web Apps.mp4

93.6 MB

Michael French & Christopher Cope - Working With The FBI - Keynote.mp4

97.7 MB

Nick Popovich - Warning This Message Originated from Outside of Your Organization.mp4

77.7 MB

Peter Partyka - Threat Intelligence 2022 Actionable.mp4

72.8 MB

Raymond Canzanese - Malware Where Does It Come From.mp4

61.7 MB

/.../RVAsec 11 - 2022 captions/

Alex Nette - Talk the Talk Communicating Business Risk During Cyber Incidents.eng.srt

77.7 KB

Andre Pitanga Basslines and Baselines The role of Anomaly Detection in Cloud Security.eng.srt

96.3 KB

Collin Berman - Slippery SOP Edge Cases in the Same Origin Policy.eng.srt

74.0 KB

David Girvin - Bootstrapping Your First AppSec Program.eng.srt

99.6 KB

Dorsey Levens - Keynote.eng.srt

112.5 KB

Ian Garrett - To Err is Human Combating Human Error in Healthcare Cybersecurity.eng.srt

103.0 KB

Justin Varner - Honeypot Boo Boo Understanding Adversaries with Deception Technology.eng.srt

80.6 KB

Kris Wall - Digital Forensics Reconstructing an Attack in Modern Web Apps.eng.srt

107.3 KB

Michael French & Christopher Cope - Working With The FBI - Keynote.eng.srt

100.2 KB

Nick Popovich - Warning This Message Originated from Outside of Your Organization.eng.srt

94.7 KB

Peter Partyka - Threat Intelligence 2022 Actionable.eng.srt

104.3 KB

Raymond Canzanese - Malware Where Does It Come From.eng.srt

87.1 KB

/RVAsec 12 - 2023/

Adrian Amos - I ❤️ My Password.mp4

96.3 MB

Aliscia Andrews - Cyber, the Commonwealth and You.mp4

60.6 MB

Amelia Szczuchniak - Why You Can't Call the Police.mp4

60.2 MB

Andrea Matwyshyn - Cybernation The FUD, Facts, & Future of Software Liability Security.mp4

84.2 MB

Andrew Hendela - Software Bills of Behaviors Why SBOMs aren't enough.mp4

64.8 MB

Andy Ellis - Keynote Building Leadership, 1% at a Time.mp4

102.9 MB

Brendan O'Leary - Shakespeare, Bacon, and the NSA.mp4

67.0 MB

Colin Estep - Insiders packing their bags with your data.mp4

46.8 MB

Dan Han - Beyond the pandemic How it shaped organizations and their sec architecture.mp4

64.4 MB

David Girvin - Hacking your Job Trying to cheat at life with ChatGPT.mp4

67.3 MB

Denis Mandich - Quantum Cybersecurity.mp4

91.8 MB

Drew Schmitt - Ransomware Rebranding So Hot Right Now.mp4

64.1 MB

Dwayne McDaniel - Who Goes There Actively Detecting Intruders w Cyber Deception Tools.mp4

64.0 MB

Fletcher Davis - Context Matters Tailoring Tradecraft to the Operational Environment.mp4

64.8 MB

Ian MacRae - The state of NIST CMMC compliance today.mp4

70.8 MB

Jason Wonn - Corporate Dungeon Master How to Lead Cyber Games at Work.mp4

84.6 MB

Josh Cigna - Everything you never knew you wanted to know about Passkeys.mp4

64.6 MB

Kate Collins - This is the Way A New Leadership Creed for Info-Sec professionals.mp4

70.0 MB

Kevin Massey - Heap Exploitation from First Principles.mp4

47.8 MB

Luke McOmie - A programmatic approach to enterprise security OR How to not waste.mp4

92.3 MB

Mark Arnold - TOP 5 CISO FINDINGS OF 2022.mp4

61.4 MB

Paul Asadoorian - Keynote.mp4

108.7 MB

Qasim Ijaz - Feature or a Vulnerability Tale of an Active Directory Pentest.mp4

94.2 MB

Rick Lull - Network 201 A Tour Through Network Security.mp4

51.1 MB

Scott Small - Adversary TTP Evolution & the Value of TTP Intelligence.mp4

74.9 MB

/.../RVAsec 12 - 2023 captions/

Adrian Amos - I ❤️ My Password.eng.srt

107.2 KB

Aliscia Andrews - Cyber, the Commonwealth and You.eng.srt

99.7 KB

Amelia Szczuchniak - Why You Can't Call the Police.eng.srt

86.0 KB

Andrea Matwyshyn - Cybernation The FUD, Facts, & Future of Software Liability Security.eng.srt

80.1 KB

Andrew Hendela - Software Bills of Behaviors Why SBOMs aren't enough.eng.srt

107.3 KB

Andy Ellis - Keynote Building Leadership, 1% at a Time.eng.srt

134.7 KB

Brendan O'Leary - Shakespeare, Bacon, and the NSA.eng.srt

91.7 KB

Colin Estep - Insiders packing their bags with your data.eng.srt

67.3 KB

Dan Han - Beyond the pandemic How it shaped organizations and their sec architecture.eng.srt

94.2 KB

David Girvin - Hacking your Job Trying to cheat at life with ChatGPT.eng.srt

91.4 KB

Denis Mandich - Quantum Cybersecurity.eng.srt

104.8 KB

Drew Schmitt - Ransomware Rebranding So Hot Right Now.eng.srt

99.0 KB

Dwayne McDaniel - Who Goes There Actively Detecting Intruders w Cyber Deception Tools.eng.srt

85.2 KB

Fletcher Davis - Context Matters Tailoring Tradecraft to the Operational Environment.eng.srt

107.8 KB

Ian MacRae - The state of NIST CMMC compliance today.eng.srt

85.1 KB

Jason Wonn - Corporate Dungeon Master How to Lead Cyber Games at Work.eng.srt

91.5 KB

Josh Cigna - Everything you never knew you wanted to know about Passkeys.eng.srt

91.6 KB

Kate Collins - This is the Way A New Leadership Creed for Info-Sec professionals.eng.srt

88.4 KB

Kevin Massey - Heap Exploitation from First Principles.eng.srt

79.4 KB

Luke McOmie - A programmatic approach to enterprise security OR How to not waste.eng.srt

103.2 KB

Mark Arnold - TOP 5 CISO FINDINGS OF 2022.eng.srt

70.5 KB

Paul Asadoorian - Keynote.eng.json

3.1 MB

Paul Asadoorian - Keynote.eng.lrc

79.9 KB

Paul Asadoorian - Keynote.eng.srt

78.0 KB

Paul Asadoorian - Keynote.eng.text

54.6 KB

Paul Asadoorian - Keynote.eng.tsv

69.7 KB

Paul Asadoorian - Keynote.eng.txt

80.9 KB

Paul Asadoorian - Keynote.eng.vtt

71.3 KB

Qasim Ijaz - Feature or a Vulnerability Tale of an Active Directory Pentest.eng.srt

84.2 KB

Rick Lull - Network 201 A Tour Through Network Security.eng.srt

88.4 KB

Scott Small - Adversary TTP Evolution & the Value of TTP Intelligence.eng.srt

96.9 KB

/RVAsec 13 - 2024/

Ali Ahmad - Hacking Exchange From The Outside In.mp4

33.2 MB

AM Grobelny - Secure Legends GameDay - A Cloud Security Danger Room.mp4

70.2 MB

Aqeel Yaseen - Mindfulness, Meditation, and Cybersecurity.mp4

44.7 MB

Ariyan Suroosh- Its Coming From Inside the House Guide to Physical Facility Pentesting.mp4

52.0 MB

Ben Haynes - Prioritization Myths Busted with Better Vulnerability Data.mp4

52.3 MB

Caleb Gross - Josh Shomo - Patch Perfect Harmonizing with LLMs to Find Security Vulns.mp4

50.2 MB

Caleb Sima - Keynote.mp4

53.7 MB

Chris Tillett - The Human Experience of Security Operations.mp4

44.2 MB

Corey Brennan - Embracing My Inner Cyber Wizard To Defeat Impostor Syndrome.mp4

45.7 MB

Corey Overstreet - That Shouldn't Have Worked - Payload Development 101.mp4

47.0 MB

Darryl MacLeod - Strategic Alliances How GRC Teams Empower Offensive Security Efforts.mp4

34.5 MB

David Girvin-Social Engineering the Social EngineersHow To Not Suck at Buying Software.mp4

43.7 MB

David J. Bianco - My Way is Not Very Sportsman-Like.mp4

42.3 MB

Ell Marquez - Once Upon a Cyber Threat The Brothers Grimms Teachings on APT Awareness.mp4

41.1 MB

Evan Booth - Scaling Your Creative Output with AI Lessons from SANS Holiday Hack 2023.mp4

47.9 MB

Jason Ross - Unlocking Generative AI Balancing Innovation with Security.mp4

50.6 MB

Jennifer Shannon - API-ocalypse.mp4

55.9 MB

Jimi Sebree - Evan Grant - Consumer Routers Still Suck.mp4

44.4 MB

Kevin Johnson - Orion's Quest Navigating Cyber Wilderness - Tales of Modern Pentesting.mp4

53.4 MB

Kymberlee Price - 2024 Keynote - Let Them Eat Cake.mp4

26.7 MB

Luke McOmie (Pyr0) - Apples to Apples.mp4

80.9 MB

Micah Parks - Reverse Engineering for Dummies The what if User.mp4

44.7 MB

Nick Copi- Some Assembly Required Weaponizing Chrome CVE-2023-2033 for RCE in Electron.mp4

48.2 MB

Oren Koren-Verified for Business Continuity How to Remediate Risk Across Enterprise.mp4

46.8 MB

Qasim Ijaz - Please Waste My Time.mp4

52.7 MB

Ross Merritt - Improv Comedy for Social Engineering.mp4

56.0 MB

Sam Panicker - Quickstart To Building Your Own Private AI Chat.mp4

63.8 MB

Steve Pressman - The ABCs of DevSecOps.mp4

53.2 MB

Tucker Mahan-Defending Against the Deep Is your workforce ready Gen AI Adversaries.mp4

62.5 MB

/.../RVAsec 13 - 2024 captions/

Ali Ahmad - Hacking Exchange From The Outside In.eng.srt

62.5 KB

AM Grobelny - Secure Legends GameDay - A Cloud Security Danger Room.eng.srt

77.8 KB

Aqeel Yaseen - Mindfulness, Meditation, and Cybersecurity.eng.srt

49.3 KB

Ariyan Suroosh- Its Coming From Inside the House Guide to Physical Facility Pentesting.eng.srt

112.8 KB

Ben Haynes - Prioritization Myths Busted with Better Vulnerability Data.eng.srt

98.3 KB

Caleb Gross - Josh Shomo - Patch Perfect Harmonizing with LLMs to Find Security Vulns.eng.srt

81.7 KB

Caleb Sima - Keynote.eng.srt

116.7 KB

Chris Tillett - The Human Experience of Security Operations.eng.srt

86.3 KB

Corey Brennan - Embracing My Inner Cyber Wizard To Defeat Impostor Syndrome.eng.srt

85.9 KB

Corey Overstreet - That Shouldn't Have Worked - Payload Development 101.eng.srt

86.7 KB

Darryl MacLeod - Strategic Alliances How GRC Teams Empower Offensive Security Efforts.eng.srt

87.1 KB

David Girvin-Social Engineering the Social EngineersHow To Not Suck at Buying Software.eng.srt

85.4 KB

David J. Bianco - My Way is Not Very Sportsman-Like.eng.srt

71.6 KB

Ell Marquez - Once Upon a Cyber Threat The Brothers Grimms Teachings on APT Awareness.eng.srt

90.0 KB

Evan Booth - Scaling Your Creative Output with AI Lessons from SANS Holiday Hack 2023.eng.srt

72.6 KB

Jason Ross - Unlocking Generative AI Balancing Innovation with Security.eng.srt

101.8 KB

Jennifer Shannon - API-ocalypse.eng.srt

81.8 KB

Jimi Sebree - Evan Grant - Consumer Routers Still Suck.eng.srt

86.5 KB

Kevin Johnson - Orion's Quest Navigating Cyber Wilderness - Tales of Modern Pentesting.eng.srt

91.0 KB

Kymberlee Price - 2024 Keynote - Let Them Eat Cake.eng.srt

52.4 KB

Luke McOmie (Pyr0) - Apples to Apples.eng.srt

110.3 KB

Micah Parks - Reverse Engineering for Dummies The what if User.eng.srt

82.5 KB

Nick Copi- Some Assembly Required Weaponizing Chrome CVE-2023-2033 for RCE in Electron.eng.srt

71.8 KB

Oren Koren-Verified for Business Continuity How to Remediate Risk Across Enterprise.eng.srt

75.4 KB

Qasim Ijaz - Please Waste My Time.eng.srt

72.1 KB

Ross Merritt - Improv Comedy for Social Engineering.eng.srt

56.7 KB

Sam Panicker - Quickstart To Building Your Own Private AI Chat.eng.srt

84.0 KB

Steve Pressman - The ABCs of DevSecOps.eng.srt

99.1 KB

Tucker Mahan-Defending Against the Deep Is your workforce ready Gen AI Adversaries.eng.srt

77.5 KB

 

Total files 556


Copyright © 2025 FileMood.com