A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Converge 2017 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

Converge 2017 Videos

These are the videos from the Converge Information Security Conference. Thanks to Ryan Harp (@th3b00st), Dan Falk (@dnfalk), Wolfgang Goerlich (@jwgoerlich), Matt Johnson (@mwjcomputing), Kyle Andrus (@chaoticflaws), Kate Vajda (@vajkat) and Chris Maddalena (@cmaddalena) for having me out and Samuel Bradstreet, Daniel Ebbutt, Luke Gorczyca, James Green,  David Sornig, Steven Balagna, Brandon Robinson, Brett Hansen, Briee de Graaf, Nick Papa, Brandon Azer  and others I may forget for helping to record.

You Are Making Bad Decisions and You Should Feel Bad
Joel Cardella

Importance of Cloud Framework and Strategy so you don't get PWNED
Zee Abdelnabi
(not posting)

Violent Ruby: A Talk for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Kent Gruber

Prioritize Vulnerability Remediation
Amol Sarwate

Stories through Logging: "It was the best of logs, it was the worst of logs"
Tom Kopchak

That Escalated Quickly
Shaun Bertrand

How to kick start and application security program
Timothy De Block

Vectors and Victims: Analyzing vulnerabilities through disease models
Rich Cassara

Threat Modeling 101
Matt Clapham

Prioritizing IT Security Projects for the Business
Martin Bally, Steve Barone, John Beeskow, David Derigiotis, Russ Gordon, John Scrivens

Defending The De-funded
Keith Wilson

How to Transform Developers into Security People
Chris Romeo

You have Updates!...A look at an old tool making a comeback 'Evilgrade'
Reid Brosko

Predicting Exploitability
Michael Roytam

Fast wins for the defense!
Justin Herman

How Much Security Do You Really Need?
Wendy Nather

Building a high performing Cyber Security team on the cheap
Christopher Payne
(not recorded)

Tarnished Silver Bullets
Wolfgang Goerlich

A Top 10 List for Better AppSec (Hint: It's Not the OWASP Top Ten)
Dave Ferguson

AppSec Behaviors for DevOps Breed Security Culture Change
Chris Romeo

The 4 Eyes of Information Security
Fernando Montenegro

Practical Security Recommendations from an Incident Responder
Matthew Aubert

You and Your Technical Community
David Giard

Panel - Cyber Security Hiring, Retention, and How to Get the Perfect Job in a Competitive Market

Put up a CryptoWall and Locky the Key - Stopping the Explosion of Ransomware
Erich Kron
(not recorded)

Misbehaving Networks?
Daniel Gregory

Leveraging Vagrant to Quickly Deploy Forensics Environments
Jeff Williams

New School Security: Combat Mindset
Mike Behrmann

Embedding Security in Emebedded Devices
Dr. Jared DeMott
(not recorded)


Download from:

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast