All current Conference Talks courses in 2024
731 Courses
Subversion and Espionage Directed Against You
Explore subversion and espionage tactics directed against individuals, enhancing awareness of personal security threats and countermeasures.
Rise of the Machines
Explore the future of AI and machine learning, their impact on cybersecurity, and potential risks and benefits in this thought-provoking talk by Aamir Lakhani.
Deploying Deceptive Systems - Luring Attackers from the Shadows
Explore deceptive cybersecurity strategies to lure and detect attackers, enhancing network defense through innovative shadow systems and attacker behavior analysis.
From DDoS to Mining - Chinese Cybercriminals Set Their Sights on Monero
Explore how Chinese cybercriminals are shifting focus from DDoS attacks to cryptocurrency mining, particularly targeting Monero, and the implications for cybersecurity.
ANTI OSINT AF - How to Become Untouchable
Learn techniques to protect your online privacy and become "untouchable" from open-source intelligence gathering methods. Discover strategies for safeguarding personal information in the digital age.
Active Defense - Helping Threat Actors Hack Themselves
Explore active defense strategies to turn the tables on cyber threats, empowering security teams to proactively protect networks and systems.
Raindance Raining Recon from the Microsoft Cloud
Explore techniques for gathering reconnaissance data from Microsoft Cloud services, enhancing your cybersecurity knowledge and skills.
The Marriage of Threat Intelligence and Incident Response or Threat Hunting for the Rest of Us
Learn to integrate threat intelligence with incident response and threat hunting, exploring detection, analysis, containment, and eradication strategies for effective cybersecurity.
Active Defense - Helping the Threat Actors Hack Themselves
Explore active defense strategies to turn the tables on cyber threats, empowering defenders to proactively counter and mislead potential attackers.
Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint
Explore advanced techniques used by attackers to hide within encrypted traffic at endpoints, covering threat evolution, APTs, and emerging cybersecurity challenges.