All current Conference Talks courses in 2024
731 Courses
Of Flags, Frogs, 4chan, OPSec vs Weaponized Autism
Explore the clash between online anonymity and collective intelligence in internet communities, examining the impact on privacy, security, and digital culture.
Security Analytics - The New Game in Cyber Security
Explore evolving cyber threats, actors, and solutions. Delve into technological shifts, privacy concerns, and innovative approaches to cybersecurity education and workforce development.
Bots, Trolls, and Warriors - The Modern Adversary Playbook
Explore the tactics of modern digital adversaries, including bots, trolls, and warriors, and learn strategies to counter their influence and protect against cyber threats.
Demonstrating the HRES Process
Explore embedded device security, network pin tests, and hardware research. Learn about firmware analysis, intelligence gathering, and lateral movement in IoT systems.
Mobile APTs - A Look at Nation State Attacks and Techniques for Gathering Intelligence from Milita
Explore nation-state mobile attacks and intelligence gathering techniques, including directory indexing, client analysis, SMS, Open Cell ID, and infrastructure.
Become the Puppet Master - The Battle of Cognition Between Man and Machine
Explore cognitive battles between humans and machines, learning strategies to leverage AI while maintaining human advantage in decision-making and problem-solving processes.
Full Contact Recon
Explore advanced reconnaissance techniques with int0x80 of Dual Core, focusing on innovative methods for gathering intelligence and enhancing cybersecurity strategies.
Atlas of Doom
Explore the intriguing "Atlas of Doom" presentation, where the content adapts based on the audience composition, offering a unique and dynamic learning experience.
Stealing Domain Admin or How I Learned to Stop Worrying and Love the CSSF
Explore techniques for compromising domain admin privileges, including social engineering, password spraying, and hash attacks. Learn defensive strategies and the importance of system hardening.
Threat Intelligence Zero to Basics in Presentation
Explore threat intelligence fundamentals, from data collection to actionable insights, with emphasis on free resources, contextual analysis, and effective information sharing techniques.