All current Conference Talks courses in 2024
731 Courses
Python For Infosec
Learn to leverage Python for information security tasks, enhancing your cybersecurity toolkit with practical coding skills and automation techniques.
Losing Battles Winning Wars - Active Defense Rebooted
Explore active defense strategies to improve cybersecurity, focusing on asset management, threat intelligence, and automated responses to enhance overall security posture and resilience.
More Technology More People No Process
Explore security operations, red team exercises, and core concepts in threat intelligence, with insights on metrics, automation, and quality in InfoSec.
Submerssion Therapy - Ticking Me Off From Threat Intel to Reversing
Explore threat intelligence and reverse engineering techniques with Juan Cortes, gaining insights into advanced cybersecurity practices and methodologies.
The Fox is in the Henhouse - Detecting a Breach Before the Damage is Done
Detect network breaches early using visibility tools, data analysis, and real-time decision-making. Learn to choose and integrate security solutions for proactive threat response.
How to Shot Web - Better Hacking in 2015
Explore advanced web hacking techniques, tools, and methodologies for improved vulnerability discovery and exploitation in modern web applications.
Open Secrets of the Defense Industry - Building Your Own Intelligence Program From the Ground
Learn to build an intelligence program from scratch, exploring open-source methods, data collection, and best practices for defending against cyber threats in the defense industry.
Digital Intelligence Gathering Using the Powers of OSINT for Both Blue and Red Teams
Explore advanced OSINT techniques for digital intelligence gathering, enhancing both defensive and offensive cybersecurity strategies.
The Ransomware Threat - Tracking the Digital Footprints
Explore ransomware threats, tracking methods, and digital footprints. Learn about various malware types, geolocation techniques, and intelligence tools for cybersecurity professionals.
Sharing is Caring - Understanding and Measuring Threat Intelligence Sharing Effectiveness
Explore threat intelligence sharing effectiveness through data-driven metrics, examining trust, limitations, and community dynamics in cybersecurity information exchange.