Events Add an event Speakers Talks Collections
 

Talks about Cybersecurity

Watch best presentations on challenges, solutions, trends and outlook in Cybersecurity.

Sort by
Newest
Trending
1-30 of 507
1-30 of 507
Filter

Disinformation and Lawfare

04/20/2021
Views 96
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Ethics, Cyber, Election Manipulation

04/19/2021
Views 63
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Hostage Taking and Media Warfare

04/18/2021
Views 63
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Ethics of Grey Zone Operations

04/17/2021
Views 179
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Ethics of Human Intelligence Collection

04/16/2021
Views 151
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Ethics and Intelligence Gathering

04/15/2021
Views 198
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Ethics of Espionage

04/14/2021
Views 171
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Ethics of Intelligence Operations

04/13/2021
Views 567
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Locknote: Conclusions and Key Takeaways from Day 1

08/04/2021
Views 1.09 K
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Ripple Effect: Building a Diverse Security Research Team

08/04/2021
Views 1.3 K
0
building a diverse security research team, the ripple effect
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Keynote: Supply Chain Infections and the Future of Contactless Deliveries

08/04/2021
Views 3.19 K
0
contactless deliveries
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

HTTP/2: The Sequel is Always Worse

08/05/2021
Views 6.12 K
0
transport-layer protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Can You Hear Me Now? Remote Eavesdropping Vulnerabilities in Mobile Messaging Applications

08/05/2021
Views 5.44 K
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker

08/04/2021
Views 5.14 K
0
security errors
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Keynote: Hacking the Cybersecurity Puzzle

08/05/2021
Views 8.89 K
0
cybersecurity puzzle
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Back in Black Hat: The 7th Annual Black Hat USA NOC Report

08/05/2021
Views 13.61 K
0
annual black hat
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Locknote: Conclusions and Key Takeaways from Day 2

09/30/2020
Views 478
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Locknote: Conclusions and Key Takeaways from Day 1

09/29/2020
Views 188
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation

09/29/2020
Views 1.35 K
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Adversary Detection Pipelines: Finally Making Your Threat Intel Useful

09/30/2020
Views 473
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Inside Story: There are Apps in Apps and Here is How to Break Them

09/29/2020
Views 283
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Tracking the Criminal of Fake News Based on a Unified Embedding

09/29/2020
Views 250
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Win the 0-Day Racing Game Against Botnet in Public Cloud

09/30/2020
Views 275
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier

09/29/2020
Views 388
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community

09/29/2020
Views 186
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature

09/30/2020
Views 581
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

From an URGENT/11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet

09/30/2020
Views 559
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Kr00k: How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices

09/30/2020
Views 645
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
1-30 of 507
Featured Speakers
Suzanne Frey
Vice President, Engineering at Google Cloud
Alan Paller
President at SANS Technology Institute
Ed Skoudis
Instructor at SANS Institute
Heather Mahalik
Director of Forensics Engineering at ManTech
Johannes Ullrich
Dean of Research at SANS Technology Institute
Lenny Zeltser
Instructor / VP of Products at Minerva Labs & SANS