FileMood

Download RVAsec

RVAsec

Name

RVAsec

 DOWNLOAD Copy Link

Total Size

8.2 GB

Total Files

128

Hash

D5EC858CD6248ED42F980176DB090BC683DC421D

/RVAsec 2012/

RVASec 2012 Reverse Engineer an Obfuscated.Net Application (Travis Altman).mp4

48.8 MB

RVAsec 2012 Code Maturity Is SDL a Waste of Time (Carsten Eiram).mp4

110.0 MB

RVAsec 2012 Don't be a Cog in the Wheel (Chris Gerling).mp4

53.3 MB

RVAsec 2012 Errata Hits Puberty 13 Years of Chagrin (Jericho).mp4

139.2 MB

RVAsec 2012 I'm not a Doctor But I Play One On Your Network (Tim Elrod).mp4

136.7 MB

RVAsec 2012 Managing Security Within The Cloud (Adam Ely).mp4

119.5 MB

RVAsec 2012 PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).mp4

36.7 MB

RVAsec 2012 Why Do You Lock Your Door (Schuyler Towne).mp4

138.8 MB

RVAsec 2012 KeyNote The Easy Stuff is Done (Marcus Ranum).mp4

102.8 MB

/RVAsec 2013/

RVAsec 2013 Adam Ely -- BYOD Risks, Maturity and Solutions.mp4

97.7 MB

RVAsec 2013 Alex Hutton -- KEYNOTE Towards A Modern Approach To Risk Management.mp4

135.5 MB

RVAsec 2013 Brian Lockrey -- Social Media Digital Forensics.mp4

106.2 MB

RVAsec 2013 Chris Wysopal -- Keynote Future of Government Info Sharing.mp4

137.3 MB

RVAsec 2013 Colby Clark -- The Digital Battlefield.mp4

103.3 MB

RVAsec 2013 Dan Han -- SIEM implementation What to Expect.mp4

59.1 MB

RVAsec 2013 Dan Holden -- DDoS and Modern Threat Motives.mp4

117.7 MB

RVAsec 2013 Daniel Ramsbrock -- Web Application Vulnerabilities and Solutions.mp4

76.4 MB

RVAsec 2013 Gus Fritschie & Andrew Du -- How to Defend Against FISMA.mp4

116.8 MB

RVAsec 2013 Itzik Kotler -- Hack Like Its 2013.mp4

70.5 MB

RVAsec 2013 Jericho -- Our Straw House Vulnerabilities.mp4

100.7 MB

RVAsec 2013 Mike Shema -- JavaScript Security & HTML5.mp4

93.6 MB

RVAsec 2013 Paul Watson -- Cross Platform Network Access Control.mp4

78.8 MB

RVAsec 2013 Rockie Brockway--Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).mp4

105.8 MB

RVAsec 2013 Schuyler Towne -- Vulnerability Research Circa 1851.mp4

135.6 MB

RVAsec 2013 Sean Mason -- A Day in the Life of an Incident Responder at a Fortune 5.mp4

54.7 MB

/RVAsec 2014/

Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.mp4

49.7 MB

RVAs3c Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.mp4

77.4 MB

RVAs3c Brian Baskin - Introducing Intelligence into Malware Analysis.mp4

65.1 MB

RVAs3c Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.mp4

63.8 MB

RVAs3c David Bianco Pyramid of Pain Intel-Driven Detection Response to Increase Adversary's Cost.mp4

65.1 MB

RVAs3c David Kennedy - 2014 Keynote.mp4

105.3 MB

RVAs3c David Sharpe and Katherine Trame - Real World Intrusion Response.mp4

60.3 MB

RVAs3c Evan Booth - Terminal Cornucopia Demystifying the Mullet.mp4

78.7 MB

RVAs3c Gene Fishel - 2014 Keynote.mp4

84.5 MB

RVAs3c Inga Goddijn - Cyber Insurance -- Worth the Effort or Total Ripoff.mp4

74.0 MB

RVAs3c Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.mp4

51.6 MB

RVAs3c Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).mp4

84.5 MB

RVAs3c Joey Peloquin - Offensive Mobile Forensics.mp4

70.9 MB

RVAs3c Jonathan Dambrot - Third Party Risk Management and Cybersecurity.mp4

61.7 MB

RVAs3c Mubix- Attacker Ghost Stories Mostly Free Defenses That Gives Attackers Nightmares.mp4

75.7 MB

RVAs3c Nick Popovich - I Found a Thing and You Can Too ISP's Unauthenticated SOAP Service.mp4

61.1 MB

RVAs3c Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.mp4

72.3 MB

RVAs3c Ray Kelly - Man In The Front -- Modifying the Android OS for Mobile App Testing.mp4

53.9 MB

RVAs3c Schuyler Towne - How to Make a Lock.mp4

93.4 MB

RVAs3c Seth Hanford - CVSS v3 -- This One Goes to 11.mp4

78.2 MB

RVAs3c Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.mp4

58.2 MB

/RVAsec 2015/

RV4Ssec Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.mp4

63.6 MB

RV4sec Adam Crosby - Embracing the Cloud.mp4

45.9 MB

RV4sec Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.mp4

63.2 MB

RV4sec Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.mp4

47.8 MB

RV4sec David Bianco - Visual Hunting with Linked Data Graphs.mp4

54.7 MB

RV4sec Elissa Shevinsky - The Changing Legal Landscape for InfoSec What You Need to Know.mp4

55.2 MB

RV4sec Guy Broome - Foss Cryptographic Data Storage.mp4

50.2 MB

RV4sec Mark Painter - A year in the life of HP security research.mp4

48.9 MB

RV4sec Pete Herzog & Dave Lauer - Hacking the Market.mp4

104.7 MB

RV4sec Speed Debates.mp4

46.1 MB

RV4sec Virginia Governor Terry McAuliffe.mp4

41.2 MB

RV4sec Keynote G. Mark Hardy.mp4

84.5 MB

RV4sec Keynote Jennifer Steffens.mp4

46.4 MB

RVAsec Barry Kouns - Incident Response Management - Not a Fire Drill.mp4

68.1 MB

RVAsec Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.mp4

46.4 MB

RVAsec Caleb Chill Crable - The Art of Post-Infection Response and Mitigation.mp4

51.0 MB

RVAsec Jason Smith - Applied Detection and Analysis Using Flow Data.mp4

66.8 MB

RVAsec Kizz Myanthia - Into The Worm Hole Metasploit For Web PenTesting.mp4

66.5 MB

RVAsec Schuyler Towne - Selling Security in a Post Lock Society.mp4

54.0 MB

/RVAsec 2016/

RVA5ec 2016 Andrea Matwyshyn - CYBER!.mp4

30.2 MB

RVA5ec 2016 Andrew McNicol & Zack Meyers - Beyond Automated Testing.mp4

56.8 MB

RVA5ec 2016 Ben Smith - Measuring Security How Do I Know What a Valid Metric Looks Like.mp4

56.1 MB

RVA5ec 2016 Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.mp4

53.7 MB

RVA5ec 2016 Chris Romeo - AppSec Awareness A Blue Print for Security Culture Change.mp4

58.9 MB

RVA5ec 2016 David Sirrine - Open Source Identity Management From Password to Policy.mp4

51.4 MB

RVA5ec 2016 Dawn-Marie Hutchinson - Beyond the Security Team The Economics of Breach Response.mp4

71.5 MB

RVA5ec 2016 Evan Johnson - Staying Above A Rising Security Waterline.mp4

33.3 MB

RVA5ec 2016 Inga Goddijn & Becky Swanson - Show Me The Money! Uncovering The True Cost of a Breach.mp4

48.1 MB

RVA5ec 2016 Joey Peloquin - Deceptive Defense Beyond Honeypots.mp4

57.0 MB

RVA5ec 2016 Joshua Cole - Probability in Cyber Risk Assessment Holy Grail or Red Herring.mp4

98.4 MB

RVA5ec 2016 Juan Carlos - Reversing For Humans.mp4

57.1 MB

RVA5ec 2016 Karen R. Jackson, Virginia Secretary of Technology - Keynote.mp4

83.5 MB

RVA5ec 2016 Mark Weatherford (Your) Inevitable Path to the Cloud.mp4

41.4 MB

RVA5ec 2016 Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.mp4

55.9 MB

RVA5ec 2016 Rockie Brockway - Enterprise Threat Management Like a Boss.mp4

66.1 MB

RVA5ec 2016 Senator Mark Warner - Welcome To RVAsec!.mp4

9.8 MB

RVA5ec 2016 Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.mp4

58.3 MB

RVA5ec 2016 Trey Ford - Keynote.mp4

49.6 MB

RVA5ec 2016 Troy Wojewoda - Bro's Before Flows.mp4

59.3 MB

RVA5ec 2016 Wendy Nather - Keynote.mp4

53.1 MB

/RVAsec 2017/

RVAsec 2017 Alon Arvatz - OSINT The Secret Weapon in Hunting Nation-State Campaigns.mp4

51.4 MB

RVAsec 2017 Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.mp4

57.2 MB

RVAsec 2017 Dan Holden - Retailing Another Threat Landscape Story.mp4

44.0 MB

RVAsec 2017 Daniel Bohannon - Invoke-CradleCrafter Moar PowerShell obFUsk8tion & Detection.mp4

66.7 MB

RVAsec 2017 Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.mp4

39.1 MB

RVAsec 2017 Governor Terry McAuliffe.mp4

31.9 MB

RVAsec 2017 Grayson Walters - Building a pentest program on a shoestring budget.mp4

34.9 MB

RVAsec 2017 Greg Pepper - Best Practices for Securing the Hybrid Cloud.mp4

62.6 MB

RVAsec 2017 Jason Ross - DevOpSec - Killing the Buzz.mp4

34.7 MB

RVAsec 2017 Jason Wonn - TIP of the Spear A Threat Intelligence Platform Acquisition.mp4

49.4 MB

RVAsec 2017 Jeremy Dorrough - Zero Trust “Lite” Architecture to Securely Future-Proof Your Network.mp4

49.3 MB

RVAsec 2017 Ken Johnson AWS Survival Guide 2.0.mp4

34.1 MB

RVAsec 2017 Mike Shema - Managing Crowdsourced Security Testing.mp4

53.7 MB

RVAsec 2017 Mikko Hypponen - Keynote.mp4

95.7 MB

RVAsec 2017 Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.mp4

46.7 MB

RVAsec 2017 Robert Mitchell - Recent Developments in Linkography Based Cyber Security.mp4

64.1 MB

RVAsec 2017 Robert Wood - Maintainability + Security.mp4

48.4 MB

RVAsec 2017 Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.mp4

43.7 MB

RVAsec 2017 Ron Gula - Keynote.mp4

52.9 MB

RVAsec 2017 Seth Hanford - Defend the Defenders Managing and Participating in Excellent Teams.mp4

65.4 MB

RVAsec 2017 Troy Marshall - RoboCop- Bringing Law And Order To CICD.mp4

66.3 MB

/RVAsec 2018/

RVAsec 2018 Bob Siegel - GDPR and You.mp4

57.9 MB

RVAsec 2018 Chris Czub - OS X App Whitelisting Without Losing Your Job.mp4

41.2 MB

RVAsec 2018 Crane Hassold - Doxing Phishers Analyzing Phishing Attacks from Lure to Attribution.mp4

49.4 MB

RVAsec 2018 Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.mp4

57.0 MB

RVAsec 2018 Derek Banks & Beau Bullock - Red Team Apocalypse.mp4

62.6 MB

RVAsec 2018 Elissa Shevinsky - Container Security Vulnerabilities, Exploits and Defense.mp4

33.8 MB

RVAsec 2018 Galloway & Yunusov - Demystifying Payments Payment Technologies and Sec Risks.mp4

40.1 MB

RVAsec 2018 Josh Corman - Keynote.mp4

76.9 MB

RVAsec 2018 Karen Cole - From Grief to Enlightenment Getting the Executive Support for InfoSec.mp4

59.8 MB

RVAsec 2018 Katie Moussouris - Keynote.mp4

74.3 MB

RVAsec 2018 Ksenia Peguero - How to REACT to JavaScript [In]Security.mp4

50.7 MB

RVAsec 2018 Mark Arnold Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....mp4

37.4 MB

RVAsec 2018 Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.mp4

27.8 MB

RVAsec 2018 Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.mp4

19.9 MB

RVAsec 2018 Nathaniel Hirsch - Building a Better Catfish.mp4

42.9 MB

RVAsec 2018 Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.mp4

51.0 MB

RVAsec 2018 Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.mp4

54.9 MB

RVAsec 2018 Travis McCormack - From Web App to ATM Why the Basics Matter.mp4

35.6 MB

RVAsec 2018 Tyler Townes - Let's build an OSS vulnerability management program!.mp4

46.1 MB

/

RVAsec logo.jpg

10.4 KB

RVAsec thank you.txt

0.8 KB

 

Total files 128


Copyright © 2024 FileMood.com