All current Conference Talks courses in 2024
731 Courses
Cyber False Flags and Adversarial Counterintelligence - Oh My
Explore cyber false flags and adversarial counterintelligence techniques, uncovering deception strategies and countermeasures in the digital realm.
Collect All the Data - Protect All the Things
Explore comprehensive data collection and protection strategies, covering network analysis, endpoint security, and intelligence operations for robust cybersecurity implementation.
Rise of the Machines - Using Machine Learning with GRC
Explore machine learning applications in Governance, Risk, and Compliance (GRC) to enhance security and streamline processes in this insightful conference talk.
Stable 34 - Waking Up the Data Engineer in You
Explore threat intelligence, attack techniques, and data analysis for enhanced cybersecurity. Learn from an expert about remote services, OSEM, and effective data modeling strategies.
Social Engineering in Nonlinear Warfare
Explore social engineering tactics in non-linear warfare, examining case studies like Estonia and Ukraine to understand modern information warfare and cybersecurity challenges.
Judo Threat Intelligence - Frank Angiolelli
Explore threat intelligence principles, exploit kits, and custom alert building. Learn tactical actions and AI applications in cybersecurity from an experienced professional.
The Spider Economy - Emotet, Dridex, and TrickBot Oh My
Explore the interconnected world of malware families Emotet, Dridex, and TrickBot, understanding their evolution, tactics, and impact on cybersecurity landscapes.
The Importance of Relevant Timely and Qualitative Intelligence Analysis
Explore the critical aspects of intelligence analysis, focusing on relevance, timeliness, and qualitative methods to enhance threat assessment and risk management in cybersecurity.
How Hackers Evade Your AI-Enabled Endpoint Detection Tools
Explore techniques hackers use to bypass AI-enabled endpoint detection, including malware disguises and virtualization isolation. Learn about vulnerability exposure and privileged access management.
Dance Fancybear Dance - A Study in macOS Cat Self
Explore macOS security through the lens of art forgery, threat profiling, and red teaming. Learn practical techniques for information gathering, software development, and testing in cybersecurity.