Channel Avatar

Hackers of CypherCon @UCJ1tF4B8G-R7nWb5uJyx8xw@youtube.com

1K subscribers - no pronouns :c

CypherCon is Wisconsin's largest technology conference, an a


06:02
Malört Visits Milwaukee | CypherCon 7.0
01:17
CypherCon - Milwaukee, Wisconsin - What is CypherCon?
34:00
CypherCon 6 Closing Ceremony - Michael Goetzman & Friends | CypherCon 6.0
27:59
A Day in the Life of a Cyber Defender -Rachel Murray, Chester Le Bron, Chris Beckett | CypherCon 6.0
27:20
Elastic Security - Matteo Rebeschini | CypherCon 6.0
29:29
Cisco Technical Solutions Architect Larry Edie & Jeremey Hagerman | CypherCon 6.0
17:38
Break Time with Cortex, Palo Alto Networks - Christine Konopka | CypherCon 6.0
19:44
Secureworks Meet and Greet | CypherCon 6.0
26:44
Getting to asset inventory across IT, OT, cloud and remote environments Chris Kirsch | CypherCon 6.0
27:29
Operation BORDERLAND Ransomware vs. Horizon MDR - Checkpoint | CypherCon 6.0
43:31
Your Board Deck Sucks! Why you can’t get buy-in for security programs - Walt Powell | CypherCon 6.0
14:34
Cortex, Palo Alto Networks Less Busywork More Security Christine Konopka | CypherCon 6.0
59:14
Ensure Your Cyber Insurance negotiating cyber liability & underwriting - Walt Powell | CypherCon 6.0
41:09
How to save your SOC and what can you (or I) do to help - Peter Wlodarczyk | CypherCon 6.0
40:54
Agile Security Teams - Naveen VK | CypherCon 6.0
55:01
The dangers of online speech - Ken Vedaa | CypherCon 6.0
53:57
Executives Overcoming the CyberSecurity Poverty Line Robert Wagner | CypherCon 6.0
51:43
A Hole In The Boat – How APIs Threaten Everything - Richard Bird | CypherCon 6.0
52:46
5 Enterprise Architectures Every Tech Executive Should Understand - Nathan Lasnoski | CypherCon 6.0
51:51
How to look good when followed by the FSB (KGB) - Rob Carson and Jay Carson | CypherCon 6.0
48:02
Watching the Watchers – Analyzing URL Scanning Solutions @ Scale - Nicholas Anastasi | CypherCon 6.0
38:06
You’ve Got Mail (& Misdirected Funds) Demo of Business Email Compromise - Drew Hjelm | CypherCon 6.0
59:23
Preventing Zero Days, The Mandalorian Way - Anders Norremo & John Hochevar | CypherCon 6.0
26:55
New Consciousness Paradigm - Kyle Puckhaber | CypherCon 6.0
47:36
Instantly improve your memory with these five mind hacks - Dr Sudesh Kannan aka Dr K | CypherCon 6.0
37:31
Security Does Not Need To Be Fun Ignoring OWASP - Dwayne McDaniel | CypherCon 6.0
01:01:01
How anyone can build their own cellular network, I built Milwaukee's - Russell From | CypherCon 6.0
26:49
How to Safely Scan OT Devices in Critical Environments - Chris Kirsch | CypherCon 6.0
25:05
We can’t patch! An Introduction to OTICS Systems - Luciano Moretti | CypherCon 6.0
53:21
How Web3 Will Shape The Future of The Creator Economy - Ian McCullough (Cullah) | CypherCon 6.0
42:10
Defending Beyond Defense - Catherine Ullman | CypherCon 6.0
31:06
What I learned about hacking from working at Hollywood Video - Ben Schmerler | CypherCon 6.0
53:20
AI for Red Team and Malware Development - Kirk Trychel | CypherCon 6.0
43:34
ATT&CKing Unicorns - Matthew Lange & Gary Lobermier | CypherCon 6.0
25:46
Command & Control Malware Deobfuscation via Phishing - Robert Lerner | CypherCon 6.0
32:08
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
34:09
Evading EDR by DLL sideloading with C# - Gary Lobermier | CypherCon 6.0
37:11
Hot or Not Offensive Attacks! - Travis Kaun | CypherCon 6.0
27:08
SQL Injection A history’ OR 1=1; — Will McCardell | CypherCon 6.0
54:55
Tales of Physical PenTests & How to Defend - Ryan Zagrodnik & Chad Finkenbiner | CypherCon 6.0
26:12
Hunting Before Day Zero - Ryan LaBouve | CypherCon 6.0
29:22
The level of human involvement behind RDP brute-force attacks Andréanne Bergeron, Ph.D | CypherCon 6
25:42
Beginner’s Guide to Mobile Applications Penetration Testing - Whitney Phillips | CypherCon 6.0
44:48
Authentication Proxy Attacks Detection, Response and Hunting - Chris Merkel | CypherCon 6.0
23:27
Offensive Security & The Evolution of Attack Path Management - Joe Mondloch | CypherCon 6.0
22:09
Hungry Hungry Hackers - Team Challenges | CypherCon 6.0
28:43
What’s Right in Cybersecurity - Matteo Rebeschini | CypherCon 6.0
27:42
Uncovering the Hidden Risks to Your Cable Modem Security - Daniel Walters | CypherCon 6.0
05:15
101 Hungry Hungry Hackers - Door Company Challenge - Mike Lubinski | CypherCon 6.0
13:55
101 Hungry Hungry Hackers - Lots of Locks Challenge - Adam Logue | CypherCon 6.0
16:13
101 Hungry Hungry Hackers - Trenton Ivey | CypherCon 6.0
55:49
When management asks you: Do you accept Agile as your lord and savior - Daniel Lagos | CypherCon 6.0
24:27
OSINT of Physical Sites - Lukas McCullough | CypherCon 6.0
26:59
Defender Advanced Threat Hunting More than meets the Eye - Michael “Shecky” Kavka | CypherCon 6.0
23:16
Things Not To Do In Consulting - Leah Lofton | CypherCon 6.0
23:52
Achieving a Threat-Informed Defense with MITRE ATT&CK - Ben Opel | CypherCon 6.0
22:52
PCI DSS v4.0 Is Here – Now What? Kyle Hinterberg | CypherCon 6.0
26:54
How to Create Easy, Relatable, & Retainable Security Awareness - Andrea Kittelson | CypherCon 6.0
18:58
Click here to end the world Navigating the vulnerability hype cycle -Jonathan Rogers | CypherCon 6.0
27:57
The importance of team-based cybersecurity tournaments - Andrew Paullin | CypherCon 6.0