A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


ShowMeCon 2017 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

ShowMeCon 2017 Videos

These are the videos ShowMeCon 2017. Thanks to Renee & Dave Chronister (@bagomojo) and others for having me out to record and speak. Also thanks to my video crew @r3tr0_cod3x Aaron, Jon and some other people I may have forgotten.

Data Loss Prevention in a Social Media World
Phllip Tully

Royal Testing: Purple teaming to build and secure applications better!
Kevin Johnson

Dark Web Economies (...and you can too!)
Johnny Christmas

DIY CTF - How to gain momentum on your security awareness program by hosting a CTF
Matt Thelan

Deconstructing Chaos: …through "Behavioral Detection"
Daniel Stiegman

The Threat Actor Studio
Aamir Lakhani
(not recorded)

Something Died Inside Your Git Repo: Recognizing the Smell of Insecure Code
Cliff Smith

REVERSING A POLYMORPHIC FILE-INFECTING RANSOMWARE
Raul Alvarez

The Beginner's Guide to ICS:  How to Never Sleep Soundly Again
Dan Bougere

Windows IR made easier and faster - Find the head of the snake using AutoRuns, Large Registry Keys, Logs, IP/WhoIs and Netflow
Michael Gough

Homebrew powershell: Where to begin with Data Sources and baseline data.
Andrew Metzger

Where Cypherpunk Meets Organized Crime: The Shifting Landscape of Underground Economies and Crypto-driven Privacy
Ben Brown

VR-Bleeding Edge of Development and Technology-But Are We Making Old Mistakes?
Arnar Gunnarson

F@$#IN Trojans! An Interactive Impromptu Talk on Our Most Dangerous Threat
Parameter

Kick starting an application security program
Tim De Block

Of Flags, Frogs & 4chan: OPSec vs. Weaponized Autism
Adrian Crenshaw

Intro to Threat Hunting
Aaron Mog

Panel Title: The Good, the Bad, and the Ugly: HIPAA in an InfoSec World
Hudson Harris

How to Patch Stupid - A Modern Approach To Securing Users
Joshua Crumbaugh

When Molehill Vulnerabilities Become Mountainous Exploits
Igor Matlin

Dear Blue Team, This is why I always win. Love, A Hacker
Dave Chronister

STRATEGIES ON SECURING YOU BANKS & ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS & ENTERPRISES FOR A LIVING!)
Jayson Street
(Not recorded, but he will do a version for you live using interpretive dance)

How I Inadvertently Outsourced My IT Job to a Fancy Bear
Tim MalcomVetter

Downloads:
https://archive.org/details/ShowMeCon2017

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast