Channel Avatar

Hackers of CypherCon @UCJ1tF4B8G-R7nWb5uJyx8xw@youtube.com

1.2K subscribers - no pronouns :c

CypherCon is Wisconsin's largest technology conference, an a


55:45
That Shouldn’t Have Worked – Payload Dev 101 - Corey Overstreet | CypherCon 7.0
30:39
Incident Response -What to do when all goes to hell in a hand-basket - Chris Roberts | CypherCon 7.0
33:23
Protecting Our Critical Infrastructure One State at a Time - Chriss Hansen | CypherCon 7.0
56:43
Up Close & Personnel - Chris Carlis | CypherCon 7.0
33:29
From radio hacking to failure to pixel crafting - Caleb Madrigal | CypherCon 7.0
19:33
Frida, Ghidra, and Decompilers for Analysis of Android & Apple Apps - Alex Thines | CypherCon 7.0
23:44
Reverse-Engineering Nim Malware: Analyzing compiler for unknown languages - Alex Cyr | CypherCon 7.0
54:12
An Introduction to IoT Hacking: From Chip to Cloud - Aaron Wasserman | CypherCon 7.0
54:34
Securing Azure cloud infrastructure - Eric D. Boyd | CypherCon 7.0
27:30
Reconnecting to your ‘Why’, your meaningful purpose - Greg Young | CypherCon 7.0
01:01:03
What You Can (And Cannot!) Do As Digital Investigators - Dr. Catherine J. Ullman | CypherCon 7.0
37:18
Biohacking: Neurology and AI - Dr. Bill Gross | CypherCon 7.0
52:41
Open source security is bigger than you can imagine - Josh Bressers | CypherCon 7.0
57:31
Saving Ryan’s Privates - Johnny Xmas | CypherCon 7.0
47:43
Policy, Politics, & Security: Protecting the farm & the enterprise - Phillip Miller | CypherCon 7.0
53:22
What an Emergency Landing Taught Me About Incident Response - Alyssa Miller | CypherCon 7.0
42:44
Hacker Jeopardy with Ben Miller & Friends | CypherCon 7.0
45:31
Attacks on Active Directory Certificate Services (AD CS) Explained - Ryan Zagrodnik | CypherCon 7.0
44:59
Vulnerability Disclosure Policies: Hack Responsibly - Kimber Dowsett (mzbat) | CypherCon 7.0
27:41
Cryptography Myths and Misconceptions - Tony Ropson | CypherCon 7.0
56:00
Securing Sexuality- Emerging Issues of Intimacy & Tech - Stefani & Wolfgang Goerlich | CypherCon 7.0
21:20
What to do when it all goes to hell in a hand-basket - Chris Roberts | CypherCon 7.0
58:27
Keynote: 25 Years of Vulnerability Mismanagement - HD Moore | CypherCon 7.0
49:05
Keynote: Welcome to Casino of Cyber Crime - Alex Holden | CypherCon 7.0
18:16
Goal Based Penetration Testing - Taylor's Version - Eric Escobar | CypherCon 7.0
22:10
CypherCon 7 Opening Ceremony - Michael Goetzman & Friends | CypherCon 7.0
06:02
Malört Visits Milwaukee | CypherCon 7.0
01:17
CypherCon - Milwaukee, Wisconsin - What is CypherCon?
34:00
CypherCon 6 Closing Ceremony - Michael Goetzman & Friends | CypherCon 6.0
27:59
A Day in the Life of a Cyber Defender -Rachel Murray, Chester Le Bron, Chris Beckett | CypherCon 6.0
27:20
Elastic Security - Matteo Rebeschini | CypherCon 6.0
29:29
Cisco Technical Solutions Architect Larry Edie & Jeremey Hagerman | CypherCon 6.0
17:38
Break Time with Cortex, Palo Alto Networks - Christine Konopka | CypherCon 6.0
19:44
Secureworks Meet and Greet | CypherCon 6.0
26:44
Getting to asset inventory across IT, OT, cloud and remote environments Chris Kirsch | CypherCon 6.0
27:29
Operation BORDERLAND Ransomware vs. Horizon MDR - Checkpoint | CypherCon 6.0
43:31
Your Board Deck Sucks! Why you can’t get buy-in for security programs - Walt Powell | CypherCon 6.0
14:34
Cortex, Palo Alto Networks Less Busywork More Security Christine Konopka | CypherCon 6.0
59:14
Ensure Your Cyber Insurance negotiating cyber liability & underwriting - Walt Powell | CypherCon 6.0
41:09
How to save your SOC and what can you (or I) do to help - Peter Wlodarczyk | CypherCon 6.0
40:54
Agile Security Teams - Naveen VK | CypherCon 6.0
55:01
The dangers of online speech - Ken Vedaa | CypherCon 6.0
53:57
Executives Overcoming the CyberSecurity Poverty Line Robert Wagner | CypherCon 6.0
51:43
A Hole In The Boat – How APIs Threaten Everything - Richard Bird | CypherCon 6.0
52:46
5 Enterprise Architectures Every Tech Executive Should Understand - Nathan Lasnoski | CypherCon 6.0
51:51
How to look good when followed by the FSB (KGB) - Rob Carson and Jay Carson | CypherCon 6.0
48:02
Watching the Watchers – Analyzing URL Scanning Solutions @ Scale - Nicholas Anastasi | CypherCon 6.0
38:06
You’ve Got Mail (& Misdirected Funds) Demo of Business Email Compromise - Drew Hjelm | CypherCon 6.0
59:23
Preventing Zero Days, The Mandalorian Way - Anders Norremo & John Hochevar | CypherCon 6.0
26:55
New Consciousness Paradigm - Kyle Puckhaber | CypherCon 6.0
47:36
Instantly improve your memory with these five mind hacks - Dr Sudesh Kannan aka Dr K | CypherCon 6.0
37:31
Security Does Not Need To Be Fun Ignoring OWASP - Dwayne McDaniel | CypherCon 6.0
01:01:01
How anyone can build their own cellular network, I built Milwaukee's - Russell From | CypherCon 6.0
26:49
How to Safely Scan OT Devices in Critical Environments - Chris Kirsch | CypherCon 6.0
25:05
We can’t patch! An Introduction to OTICS Systems - Luciano Moretti | CypherCon 6.0
53:21
How Web3 Will Shape The Future of The Creator Economy - Ian McCullough (Cullah) | CypherCon 6.0
42:10
Defending Beyond Defense - Catherine Ullman | CypherCon 6.0
31:06
What I learned about hacking from working at Hollywood Video - Ben Schmerler | CypherCon 6.0
53:20
AI for Red Team and Malware Development - Kirk Trychel | CypherCon 6.0
43:34
ATT&CKing Unicorns - Matthew Lange & Gary Lobermier | CypherCon 6.0