A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Louisville Infosec 2012 Videos

Louisville Infosec 2012 Videos

        Below are the videos from Louisville Infosec 2012 conference. Sorry about the noise, I had no line in form the house audio. My talk is not in here because the slides rig failed you can see a previous version of it here: Dingleberry Pi Building a Blackthrow: More inexpensive hardware to leave behind on someone else's network - Adrian Crenshaw

Index:

Keynote Jack Daniel InfoSec Stress & Community
Nathan Heald - No Keys, No Worries Lock Picking
Jeremy Druin - NOWASP Mutillidae 2.2 A web pen-testing environment for secure development
Curtis Koenig - Grey Hats and Bug Bounties
Deral Heiland - From Printer to Pwnd Leveraging multifunction printers during penetration testing
James Jardine - Ninja Developers App Sec Testing and SDLC
Joshua Bartley - Data Hiding In Your Application
Keynote Michael Peters The Security TrifectaT - Isolation vs. Collaboration
 

 

 

Keynote Jack Daniel InfoSec Stress & Community

 

 

 

Nathan Heald - No Keys, No Worries Lock Picking

 

 

 

Jeremy Druin - NOWASP Mutillidae 2.2 A web pen-testing environment for secure development

 

 

 

Curtis Koenig - Grey Hats and Bug Bounties

 

 

 

Deral Heiland - From Printer to Pwnd Leveraging multifunction printers during penetration testing

We had a slide rig failure, but the camera was on the slides most of the time.

 

 

 

James Jardine - Ninja Developers App Sec Testing and SDLC

 

 

 

Joshua Bartley - Data Hiding In Your Application

 

 

 

Keynote Michael Peters The Security TrifectaT - Isolation vs. Collaboration

 

Download Video From:
http://archive.org/details/LouisvilleInfosec2012Videos

 

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast