All current Conference Talks courses in 2024
731 Courses
What Lurks in the Shadow
Explore the hidden threats in cybersecurity with expert Cheryl Biswas as she uncovers lurking dangers and provides insights on protecting against unseen vulnerabilities.
The Programmatic Evolution of Technology Defense
Explore the evolution of technology defense, covering holistic security approaches, threat discovery, and intelligence-led strategies for effective business operations protection.
Honeypots for Active Defense
Explore active defense strategies using honeypots. Learn about various honeypot types, implementation techniques, and tools for enhancing network security and threat intelligence.
OSINT for AppSec Recon ng and Beyond - Tim Tomes
Explore OSINT techniques for AppSec reconnaissance using Recon-ng, covering data extraction, vulnerability scanning, and leveraging online resources for effective security assessments.
Losing Battles Winning Wars - Active Defense Rebooted
Explore active defense strategies, focusing on asset management, threat intelligence, and intelligent prioritization to effectively combat persistent threats and achieve real security.
Introducing the RITA VM - Hunting for Bad Guys on Your Network for Free with Math
Learn to detect network threats using RITA VM, a free tool that employs mathematical analysis for effective cybersecurity monitoring and intrusion detection.
Stable37 Malware is Hard - Let's Go Shopping
Explore the challenges of malware analysis and learn innovative techniques for investigating and understanding complex malicious software.
Fix Me16 DNS Miner - A Semi Automatic Incident Response and Threat Intelligence Tool for Small Over Wo
Semi-automatic incident response and threat intelligence tool for small organizations, enhancing cybersecurity capabilities through DNS analysis and automated workflows.
Building a Brain for Infosec
Explore innovative AI applications in cybersecurity, focusing on threat detection, incident response, and risk assessment. Learn how machine learning enhances InfoSec practices and improves overall security posture.
Fix Me - Beyond Bad IP Addresses, Hashes, and Domains
Explore advanced threat detection techniques beyond basic indicators, focusing on sophisticated methods to identify and mitigate complex cyber threats.