Cloud Device Insecurity
SAINTCon 2015
Cloud Device Insecurity
56:26
What your current vulnerability management program won't tell you about your security.
SAINTCon 2015
What your current vulnerability management program won't tell you about your security.
1:00:18
Virtualization Security 101: Basics of Securing a virtual infrastructure
SAINTCon 2015
Virtualization Security 101: Basics of Securing a virtual infrastructure
47:52
Solving the Mobile Security Gap
SAINTCon 2015
Solving the Mobile Security Gap
27:24
Beyond PCI : Why (and how) you should take control of your payments security
SAINTCon 2015
Beyond PCI : Why (and how) you should take control of your payments security
52:31
Social Engineering Re-hash!!
SAINTCon 2015
Social Engineering Re-hash!!
29:48
Introductory Netflow Analysis
SAINTCon 2015
Introductory Netflow Analysis
54:40
Intro to Hacking Web Apps
SAINTCon 2015
Intro to Hacking Web Apps
24:39
OSINT: Oh the places you'll go
SAINTCon 2015
OSINT: Oh the places you'll go
47:53
Decrypting SSL Traffic
SAINTCon 2015
Decrypting SSL Traffic
17:54
Randomness Matters
SAINTCon 2015
Randomness Matters
17:37
Mobile Device Security in the Enterprise
SAINTCon 2015
Mobile Device Security in the Enterprise
53:35
Tracking Ghosts Through the Fog
SAINTCon 2015
Tracking Ghosts Through the Fog
58:17
Always stay connected to IRC
SAINTCon 2015
Always stay connected to IRC
18:53
Fruit of the Poisonous Tree
SAINTCon 2015
Fruit of the Poisonous Tree
48:20
The Unpredictability of BYOD
SAINTCon 2015
The Unpredictability of BYOD
39:54
NeverLAN CTF... Teaching the Younger Generation to Hack
SAINTCon 2015
NeverLAN CTF... Teaching the Younger Generation to Hack
42:22
CyberPatriot: Have Fun Mentoring the Next Generation Blue Team
SAINTCon 2015
CyberPatriot: Have Fun Mentoring the Next Generation Blue Team
52:39
Anomalies and indicators: description vs. deviations vs. disrepute
SAINTCon 2015
Anomalies and indicators: description vs. deviations vs. disrepute
1:02:34
Basic concepts behind GPG
SAINTCon 2015
Basic concepts behind GPG
46:09
Infosec: Up and Running
SAINTCon 2015
Infosec: Up and Running
45:38
Stop bash-ing, you've got Perl
SAINTCon 2015
Stop bash-ing, you've got Perl
1:43:39
Systems hardening and automation using puppet
SAINTCon 2015
Systems hardening and automation using puppet
37:44
Rancid Pi: Version control your device configurations using a raspberry pi.
SAINTCon 2015
Rancid Pi: Version control your device configurations using a raspberry pi.
48:23
Become phishers of men (and women)
SAINTCon 2015
Become phishers of men (and women)
53:52
OSX Archaeology: Becoming Indiana Jones with OSXCollector and Strata
SAINTCon 2015
OSX Archaeology: Becoming Indiana Jones with OSXCollector and Strata
53:56
Intro to Windbg, i.e., how to win at minesweeper
SAINTCon 2015
Intro to Windbg, i.e., how to win at minesweeper
1:55:46
Introduction to DFIR and Malware Analysis
SAINTCon 2015
Introduction to DFIR and Malware Analysis
1:51:43
Ansible for beginners
SAINTCon 2015
Ansible for beginners
1:15:12
Hardening the LAMP Stack
SAINTCon 2015
Hardening the LAMP Stack
59:49
Network noise—scans, backscatter, and other impeding events
SAINTCon 2015
Network noise—scans, backscatter, and other impeding events
1:02:49
Software Defined Radio (SDR) Workshop
SAINTCon 2015
Software Defined Radio (SDR) Workshop
59:47
Cracking Wireless
SAINTCon 2015
Cracking Wireless
57:42
War Walking at BlackHat & Defcon
SAINTCon 2015
War Walking at BlackHat & Defcon
53:19
Cross site scripting and cross site request forgery a dangerous combination
SAINTCon 2015
Cross site scripting and cross site request forgery a dangerous combination
48:06
Attack of the DRONES and other ID10T’s with toys!!!
SAINTCon 2015
Attack of the DRONES and other ID10T’s with toys!!!
47:51
Fishing to Phishing: Adventures in chasing slimy creatures
SAINTCon 2015
Fishing to Phishing: Adventures in chasing slimy creatures
56:10
Building a Security Strategy Perimeter to Core – Firewall is no longer enough!
SAINTCon 2015
Building a Security Strategy Perimeter to Core – Firewall is no longer enough!
35:05
Owning Your Employees for Better Security
SAINTCon 2015
Owning Your Employees for Better Security
47:11
Understanding malware evolution using Neo4j
SAINTCon 2015
Understanding malware evolution using Neo4j
33:24
Rock Your SOCs Off: Network Security Monitoring Validation
SAINTCon 2015
Rock Your SOCs Off: Network Security Monitoring Validation
22:38
Advanced Threat Hunting
SAINTCon 2015
Advanced Threat Hunting
28:25
Cyber Incident Response Management: Breaking Glass
SAINTCon 2015
Cyber Incident Response Management: Breaking Glass
54:20
Stupid Malware Tricks: The weirdest ways attackers bypass your defenses
SAINTCon 2015
Stupid Malware Tricks: The weirdest ways attackers bypass your defenses
50:32
It was the best of encryption, it was the worst of encryption - SSL in the real world
SAINTCon 2015
It was the best of encryption, it was the worst of encryption - SSL in the real world
56:50
Managing Compliance in a DevOps environment
SAINTCon 2015
Managing Compliance in a DevOps environment
56:50
Palo Alto Networks firewall deep dive
SAINTCon 2015
Palo Alto Networks firewall deep dive
1:53:00
SAINTCON CLOSING SESSION - Camera
SAINTCon 2015
SAINTCON CLOSING SESSION - Camera
39:49
What do You Trust on the Internet?
SAINTCon 2015
What do You Trust on the Internet?
39:49
The State of HTTPS: securing web traffic is not what it used to be
SAINTCon 2015
The State of HTTPS: securing web traffic is not what it used to be
56:36
Cisco Threat-Centric Security
SAINTCon 2015
Cisco Threat-Centric Security
1:30:28
SAINTCON CLOSING SESSION
SAINTCon 2015
SAINTCON CLOSING SESSION
41:09
Pseudorandom Numbers
SAINTCon 2015
Pseudorandom Numbers
52:48
All about the SAINTCON 2015 Badge
SAINTCon 2015
All about the SAINTCON 2015 Badge
24:16