All current Conference Talks courses in 2024
731 Courses
A Reporter's Look at Open Source Intelligence
Explore open-source intelligence techniques for investigative reporting, including browser extensions, search strategies, and accessing public records to uncover valuable information.
Value of Threat Intelligence - Stealthcare
Explore the value of threat intelligence in cybersecurity, focusing on ZDL's approach to predicting and preventing global cyber threats through advanced intelligence gathering and sharing.
Modern Day Vandals and Thieves - Wireless Edition
Explore wireless security vulnerabilities in smart homes, including network exploitation, device intelligence, and metadata analysis for potential intrusions and theft.
The Value of Design in Cyber Threat Intelligence
Explore design principles in cyber threat intelligence, enhancing communication and impact of intelligence products through visual and written techniques.
DNC Hacked Data in the Hands of a Trained Intelligence Professional
Explore the DNC hack through the lens of trained intelligence professionals, analyzing data breaches and their implications for cybersecurity and political landscapes.
Deceptive Techniques to Derail OSINT Attempts
Explore deceptive techniques to protect against OSINT, including disinformation, secure internet usage, and deceptive technologies. Learn mitigation strategies and best practices for online privacy.
Active Defense - Helping Threat Actors Hack Themselves
Explore innovative active defense strategies to turn the tables on cyber threats, helping attackers inadvertently compromise themselves while protecting legitimate users.
Deep Learning for Enterprise - Solving Business Problems with AI
Explore deep learning's enterprise applications, AI market trends, and essential tools for building AI solutions. Learn about classification, machine learning, and cybersecurity implications.
Emotet Banking Malware With A Bite
Explore Emotet banking malware's tactics, impacts, and defense strategies in this comprehensive analysis of a potent cyber threat.
Active Defense - Helping Threat Actors Hack Themselves
Explore innovative active defense strategies to turn the tables on cyber threats, including clever traps and misdirections to protect systems and confuse attackers.