All current Conference Talks courses in 2024
731 Courses
How to Use 400M Endpoints to Build Strong AI Detection Systems
Explore AI-powered detection systems leveraging massive endpoint data for enhanced cybersecurity, presented by expert Filip Chytry at BSides Tampa 2019.
Comparing Malicious Files
Explore techniques for comparing malicious files, including sample identification, shared engines, and various metadata analysis methods to enhance threat detection and incident response.
Forensics Phish Tank - Breaking Down Analysis of Advanced Phishing Emails
Explore advanced techniques for analyzing sophisticated phishing emails, enhancing your ability to detect and mitigate cyber threats in this comprehensive forensics session.
SigInt for the Masses - Building and Using a Signals Intelligence Platform for Less than 15
Learn to build and utilize a cost-effective Signals Intelligence Platform, exploring innovative techniques for gathering and analyzing signal data on a budget.
Attribution
Explore advanced techniques for cyber threat attribution and learn to identify attackers' origins, methods, and motivations in this insightful presentation by security expert Xena Olsen.
How to Screw Up Your Incident Response Investigation in 10 Steps or Less
Learn common pitfalls in incident response investigations and how to avoid them, improving your cybersecurity preparedness and effectiveness in handling breaches.
Why Your Red Team Shouldn't Be Snowflakes
Explore strategies for effective red team operations, including maturity models, threat intel, and testing types. Learn to enhance cybersecurity preparedness and level up quickly.
The TIP of the Stinger - Efficiently Using Threat Intelligence With TheHive
Explore efficient threat intelligence utilization with TheHive platform, enhancing cybersecurity practices and incident response capabilities.
Well What Have We Here - A Year of Cyber Deception, Attribution, and Making Attackers Rethink Their Approach
Explore cyber deception techniques, attribution strategies, and methods to disrupt attacker behavior in this comprehensive cybersecurity presentation.
It Must Be Fancy Bear
Explore attribution challenges in cybersecurity, focusing on the complexities of identifying threat actors and the pitfalls of hasty conclusions in cyber attack investigations.