Circle City Con 2019 Videos (Hacking Illustrated Series InfoSec Tutorial
Circle City Con 2019 Videos
These are the Circle City Con videos.
Thanks to the staff for inviting me
down to record. Big thanks to @irishjack,
@uncrustabl3, @0xBashCat and others for helping set up AV and record.
Data Access Rights Exploits under New Privacy Laws
How to reach and teach youth about Cybersecurity (if anybody will let you)
More Tales from the Crypt...Analyst
Don't Wait 5 Tactics to Leveling Up Your InfoSec Career
Could Static Code Analysis and Secure Coding have Saved the Death Star?
I’ll Complete My Threat Model Later Mom!: Infosec in Middle School.
Ashley Benitez Smith
Cons & Careers
3D printing canister-launchable drones for city-scale wardriving
The Hunter Games: How to find the adversary with Event Query Language
Star Wars: How an ineffective Data Governance Program destroyed the Galactic Empire
Security lessons from the Woofmutt…
What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing
It's Coming From Inside the House: An Inside-Out Approach to NodeJS Application Security
Get off my lawn… or are we looking for the right people?
Mike (Shecky) Kavka
Endpoint Security, Swimming Through the Snake Oil
Do You Have What It Takes? How to Support Your Career From Community Involvement
Catching the Guerrilla: Powershell Counterinsurgency
SigInt for the Masses: Building and Using a Signals Intelligence Platform for Less than $150
InfoSuck: The Nasty Bits Of The Industry We Want To Tell Noobs But Aren't Allowed To In Polite Company.
Standardizer: a standardization framework for your security alerts
Call Of Duty, Modernest Browser Warfare v2
(Did not happen)
Information Security Practice Principles a Rosetta Stone for information
What Can Data Science Do for Security?
Deepfakes: If anything can be real then nothing is real
Evicting the Password from the Digital Estate
A Theme of Fear: Hacking the Paradigm
Beginning DFIR - How to get started with Cooties
Of CORS it's Exploitable! What's Possible with Cross-Origin Resource Sharing?
Nexus Zeta - How a newbie hacker managed to create a monster botnet
5G: Security Pitfalls and Considerations
(Did not happen)
Training and Education for the New Realities of Privacy and Security
Container Security Deep Dive
Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape
One Random Insecure Wep Application Please (ORIWAP)
an Implantable Computer
Doug "c00p3r" Copeland
Modern AppSec Gotchas
A Few Things Right: Insights from Live and Simulated Incident Response
The Resilient Reddit C2
Behind The Locked Door: we built an escape room for security awareness
Matthew Southworth Christian Bobadilla
Xena Olsen Jared Peck
Inside Out Security - Building Castles not Warehouses
Failure Is Not an Option: Developing Realistic Disaster Recovery Tests
Wibbly Wobbly: Designing Security for Systems that are Bigger on the Inside