Parent directory/ | - | - |
Understanding the Latest Mitre Att&Ck Evaluation Data - Norm Chan.mp4 | 16.3 MiB | 2022 Mar 04 02:13 |
The Overlooked Security Risk 3rd Party Risk Management - Rose.mp4 | 44.1 MiB | 2022 Mar 04 02:13 |
Take Down Cyberthreat Dwell Time With Kaspersky Optimum Security - Eric Payne.mp4 | 26.5 MiB | 2022 Mar 04 02:13 |
Sysmon Monitoring Different Way - Marek Mikita.mp4 | 10.7 MiB | 2022 Mar 04 02:13 |
Social Engineering Tactics and Techniques - Savannah Lazzara.mp4 | 16.9 MiB | 2022 Mar 04 02:13 |
So You Cracked a Bunch of Passwords. Now What - Chris Timmons.mp4 | 22.3 MiB | 2022 Mar 04 02:13 |
Simulation Hacking, the Good, Bad and the Ugly - Jacques van zijl.mp4 | 45.0 MiB | 2022 Mar 04 02:13 |
Securing Kubernetes in the Cloud - Amiran Alavidze.mp4 | 31.9 MiB | 2022 Mar 04 02:13 |
Projects sanity check - Adele Farhadian.mp4 | 20.4 MiB | 2022 Mar 04 02:13 |
Privacy Concerns in the Connected Car Ecosystem - Ruchi Gautam.mp4 | 16.2 MiB | 2022 Mar 04 02:13 |
Presenting Technical Evidence in Court - Rob Slade.mp4 | 31.0 MiB | 2022 Mar 04 02:13 |
Measuring Cybersecurity Maturity with the NIST CSF - Josh Sokol.mp4 | 21.8 MiB | 2022 Mar 04 02:13 |
Linux Sessions for Monitoring and Reviewing Linux Workloads - Mike Sample.mp4 | 7.9 MiB | 2022 Mar 04 02:13 |
Kubernetes Security Attacking and Defending K8s Clusters - Magno Logan.mp4 | 29.2 MiB | 2022 Mar 04 02:13 |
Is the Power Grid a Huge Cybersecurity Risk - Vivek Ponnada.mp4 | 19.7 MiB | 2022 Mar 04 02:13 |
In-App Protection For Android Selecting the Right Platform - Patience Mpofu.mp4 | 10.0 MiB | 2022 Mar 04 02:13 |
Human Vulnerability Management and Assessment in the Age of Zero Trust - June Jeremiah.mp4 | 29.8 MiB | 2022 Mar 04 02:13 |
How to Secure Microservices Without Traditional Firewall - Petr McAllister.mp4 | 12.9 MiB | 2022 Mar 04 02:13 |
How Nation States Use Your Domain to Compromise Your Cloud Infrastructure - Alex Parsons.mp4 | 46.6 MiB | 2022 Mar 04 02:13 |
Get Smart on Smart Tech - Rossilyne Tan & Danielle Cheng.mp4 | 64.6 MiB | 2022 Mar 04 02:13 |
Discovering C&C in Malicious PDF with Obfuscation, Encoding and Other Techniques - Filipi Pires.mp4 | 54.1 MiB | 2022 Mar 04 02:13 |
DevSecOps The Good, the Bad and the Ugly - Nivedita Murthy.mp4 | 14.7 MiB | 2022 Mar 04 02:13 |
Damn GraphQL - Defending and Attacking APIs - Dolev Farhi.mp4 | 15.8 MiB | 2022 Mar 04 02:13 |
Current State of Exploit Mitigations in the Linux Kernel - Lucas Amorim.mp4 | 13.7 MiB | 2022 Mar 04 02:13 |
Challenging Barriers to Entry and Rejection - Aarti Gadhia.mp4 | 14.5 MiB | 2022 Mar 04 02:13 |
Building Security Champions - Tanya Janca.mp4 | 26.5 MiB | 2022 Mar 04 02:13 |
Attacking Zero Trust Designs in 2021 - Michael Cavallin.mp4 | 14.9 MiB | 2022 Mar 04 02:13 |
Attack of the Graph Visual Tools for Cyber Analysis - Christian Miles.mp4 | 13.4 MiB | 2022 Mar 04 02:13 |
A Study on Intrusion Detection Systems with a Practical Experiment on Snort - Vigneshwar Sethuraman.mp4 | 21.0 MiB | 2022 Mar 04 02:13 |