Channel Avatar

BSidesKC @UCJrlsO6qFPe5enk-8gR0A4A@youtube.com

734 subscribers - no pronouns :c

BSidesKC is a non-profit educational organization designed t


51:26
Learn Assembly in 50 minutes - Matthew Miller
44:48
Tactics of the Trash Panda - Angel Gamboa
16:45
How to feed a dog: solving knowledge retention with KM practices - Brian McCann
33:20
Decoding the CMMC 2.0 Enigma - Jered Bare
51:53
Taking the Human Element to the MAX - Alyssa Miller
30:52
Defeating Deepfakes - Nick Gicinto
26:55
Let's Segment a Network - Joshua Seirer
53:10
Fight, Flight, or Something Else: Breaking the Security Survival Cycle - Stacy Thayer, Ph.D.
56:56
ICS SOC Pyramid - Gabriel Sanchez
49:26
Please Waste My Time - Qasim Ijaz
23:39
Kubernetes Best Practices for Security - Travis Lowe
26:16
Staying Sane in Cyber - Keelan Knox
57:24
Culture Shaping & Insider Threats - Panel
22:07
Dr. CVE Love, or how I learned to stop worrying and love vuln management - Ben Webb
27:15
Writing Nim-less Nim - Tyler Randolph
40:07
Active Directory ain’t going anywhere, so we might as well secure it - Eric Woodruff
48:23
BSIDESKC 2024 Keynote - Today’s Cyber resiliency, why it matters to you?
24:30
Navigating the Security Challenges of Generative AI in the Corp Sector - JJ Widener & JD de las Alas
23:14
Be Kind Online - Derin Beechner
28:46
Your Board Deck Sucks!: Why you can't get buy-in for your security program - Walt Powell
15:59
Building my first SAO: A beginner’s guide to building and distributing your own SAO - Matthew Moses
23:52
AI in CyberSecurity: How to be a 10x Engineer -
37:49
Building a SOC - Benjamin Spencer & Jake Knowlton
26:20
Report Like You're Crazy - Caprico
30:06
Shining a light into the security blackhole of IoT and OT - (void *)Huxley Barbee
21:44
The Algorithmic Advantage: Optimizing Cybersecurity with Computer Science - Sara Anstey
34:22
Misbehaving Binaries: Methods to Detect LOLBin Abuse - Rachel Schwalk
43:39
Guardians of the Logs: Monitoring SaaS with the Event Maturity Matrix - David Tocco & Josh Rickard
53:20
Going Undercover in the Underground - A Guide on How to Infiltrate and Engage - Michael-Angelo Zummo
48:29
DUALITY – Advanced Red Team Persistence through Self-Reinfecting DLL Backdoors... - Faisal Tameesh
24:10
The monsters in your software supply chain that traditional app sec tools can't find - Matthew Rose
33:07
Unlocking the Power of the Flipper Zero... - Jordan Bush & Cosette Mazet
54:13
Simultaneously Defending against External Hackers as well as the Inside Threat - Ernest Wong
40:11
You're Not Broken...Just Different - Chris Culling
53:12
AI and Machine Learning in Network Security - Igor Mezic
24:33
Testing Defensive Controls w/ atomic-operator - Josh Rickard
26:42
So, You Want To Be A CISO...? - Joshua Brown
50:11
No Code Execution? No Problem! - Living The Age of Virtualization-Based Security - Connor McGarr
56:34
Moment, need chop! Inside an employment scam - Beth Young
43:49
The Monica Bellucci Fanclub - Detection and Defense Lessons Learned {...} - Jason Killam
01:00:10
Threat Hunting In Practice - Michael-Angelo Zummo
16:27
"Oh Sh*t!"....Your Digital Bug-out Bag - Tim Reid
29:41
Frustrating the PenTester with Active Directory - Dale Hollis
17:47
Trouble with the Troubleshooter; A Primer on CVE-2022-30190 - Grant Shanklin
26:51
Educating Your Guesses: How to Quantify Risk and Uncertainty - Sara Anstey
50:50
Push comes to shove: exploring SCCM attack paths - Brandon Colley
20:27
Training The Human Firewall - Reanna Schultz
17:35
Automagic your attack simulation - JJ Widener
39:38
I Know What You Did Last Summer… I’m Still Hacking Your Small Business - Vincent Matteo
17:51
Why OSINT? - Michael James
26:04
What Are The Emotions Of Investing & Do You Have A Financial Plan? - Jaime Gaona
20:10
Mental Health Matters - You Are Not Alone - Megan Roddie
10:25
Future planning on easy mode - Danielle Main
33:21
Free hardware from the sky? An introduction to tracking weather balloons - Jordan Bush
46:15
Hunting Phish Kits - Josh Rickard
54:05
The Big Picture: Building a security program from the ground up in 365 days
56:48
Passwords are dead? Long live WebAuthn!
22:03
Building a CULTure of Security: How to Utilize Guilds to Scale Security When Your Resources are NIL
37:09
YARA Rule Writing 101
35:38
So You Are Comparing RASP and WAF?