All current Conference Talks courses in 2024
731 Courses
Quantifying the Adversary - Introducing GuerillaSearch and GuerillaPivot
Explore innovative tools GuerillaSearch and GuerillaPivot for quantifying cyber adversaries and enhancing threat intelligence capabilities in this insightful presentation.
Securing Your Assets from Espionage
Learn strategies to protect your organization from business espionage, including key methods, scenarios, and countermeasures for safeguarding trade secrets and sensitive information.
Mirage Next Gen Honeyports
Explore next-generation honeyport technology with Mirage, enhancing network security through advanced deception techniques and threat intelligence gathering.
Open Source Threat Intelligence - Developing a Threat Intelligence Program Using Open Source Tool
Develop a comprehensive threat intelligence program using open-source tools. Learn to identify potential threats, enhance monitoring, and implement effective incident response strategies.
Seeing Purple - Hybrid Security Teams for the Enterprise
Explore hybrid security teams for enterprises, covering red teaming, blue teaming, and purple teaming strategies to enhance threat detection and response capabilities.
A Basic Guide to Advanced Incident Response
Advanced incident response techniques for effective cybersecurity defense, covering intelligence-driven strategies, active defense, network forensics, and collaborative approaches to enhance organizational security posture.
Special Teams01 Trolling Attackers for Fun Profit
Explore techniques for trolling cyber attackers, turning defense into an entertaining and potentially profitable endeavor. Learn strategies to frustrate and misdirect malicious actors.
Active Cyber Defense Cycle
Explore the Active Cyber Defense Cycle with expert Robert M. Lee, learning strategies to proactively protect networks and systems from cyber threats.
Real World Threats
Explore real-world cybersecurity threats and defense strategies with expert insights from Russ Ward's presentation at BSides Huntsville 2015.
Developing an Open Source Threat Intelligence Program
Learn to build an open-source threat intelligence program, enhancing cybersecurity through proactive information gathering and analysis techniques.