Channel Avatar

BSides DC @UCVImyGhRATNFGPmJfxaq1dw@youtube.com

2.9K subscribers - no pronouns :c

More from this channel (soon)


51:21
BSides DC 2019 - Breaking Through the Boundaries of Cyber Security Job Search Challenges
42:04
BSides DC 2019 - We Do In The Shadows: "Going Dark" With Consumer Electronics
11:03
BSides DC 2019 - Closing Remarks
31:04
BSides DC 2019 - IAM what IAM and dats what IAM: accounts for everyone! Robots too!
49:59
BSides DC 2019 - Mind the Gap - Managing Insecurity in Enterprise IoT
52:23
BSides DC 2019 - No IOUs with IOT
32:04
BSides DC 2019 - Offensive PCAP
21:45
BSides DC 2019 - Insights for secure API usage in conjunction w/ security automation & orchestration
37:59
BSides DC 2019 - Looking to the Past to Better Understand Threat Intelligence
45:59
BSides DC 2019 - What did the SIEM See?
38:31
BSides DC 2019 - Overcoming Workforce Retention & Recruitment Challenges in Cybersecurity
56:31
BSides DC 2019 - Using JA3. Asking for a friend?
41:25
BSides DC 2019 - Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
32:47
BSides DC 2019 - SCADA: What the next Stuxnet will look like and how to prevent it
59:16
BSides DC 2019 - 0-day Research Disassembled
53:45
BSides DC 2019 - Signing your code the easy way
51:22
BSides DC 2019 - Social Media OSINT Without the Indigestion
44:55
BSides DC 2019 - Malware Behavior Catalog
35:42
BSides DC 2019 - Hands-on Writing Malware in Go
38:58
BSides DC 2019 - Are your Network Devices Good or Evil? Introducing CHOX
32:09
BSides DC 2019 - Digital Canaries in Coal Mines: Detecting Adversarial Enumeration with DNS & AD
42:12
BSides DC 2019 - Bringing IACD (Integrated Adaptive Cyber Defence) to the Financial Sector
32:24
BSides DC 2019 - Preparing for Offensive Security Penetration Testing - Kali (PWK) course - OSCP
50:00
BSides DC 2019 - 28 Seconds Later: The Epidemiological Triangle & Other Models for Influence Ops
30:54
BSides DC 2019 - PErfidious: Make PE backdooring great again!
55:53
BSides DC 2019 - Courage from a Zero Day Inside
46:04
BSides DC 2019 - Cyber Threat Intelligence and APT 101
01:01:54
BSides DC 2019 - The APT @home - when the attacker knows your mother's maiden name
43:52
BSides DC 2019 - JARVIS for Code? Meaningful AI Research for Software Reverse Engineering
43:21
BSides DC 2019 - Automating Analysis Without Automating the Analyst
23:03
BSides DC 2019 - CryptKids Keynote
09:28
BSides DC 2019 - Welcome
39:41
BSides DC 2019 - Are you ready to leverage DevSecOps? Get ready and use it for good.
43:19
BSides DC 2019 - How Not to Cheat on Your Wife
23:50
BSides DC 2018 - Closing ceremonies
48:40
BSides DC 2018 - Getting Started in Cybersecurity
49:30
BSides DC 2018 - Don't Bring Me Down: Weaponizing Botnets
35:46
BSides DC 2018 - Learning Lessons & Imparting Wisdom of Past NSA IAM/IEM and IA-CMM Processes
59:24
BSides DC 2018 - Close DevSecOps Awareness and Guide to Practical Implementation
28:06
BSides DC 2018 - Buy & Build: Complementing Security Operations w/ In House Software Development
43:16
BSides DC 2018 - What’s the Point of Compliance? Making Paperwork Useful
50:15
BSides DC 2018 - Unraveling the Threat of Chrome Based Malware
51:55
BSides DC 2018 - Isolated to Constrained Language Mode - Living within the Confines
53:38
BSides DC 2018 - Cryptocurrency as Asymmetric Weapon
45:48
BSides DC 2018 - One technique, two techniques, red technique, blue technique
29:46
BSides DC 2018 - The Exploit Factory: Building a home exploit mining cluster.
47:16
BSides DC 2018 - Network Traffic is an Open Book
50:11
BSides DC 2018 - Watch Out For That Bus! (Personal Disaster Recovery Planning)
48:31
BSides DC 2018 - Bypassing Huawei's Fingerprint Authentication by Exploiting the TrustZone
51:12
BSides DC 2018 - Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
48:58
BSides DC 2018 - Bringing Red vs. Blue to Machine Learning
37:52
BSides DC 2018 - CryptKids Keynote
47:45
BSides DC 2018 - Dropping Cyber Norms: What They are & How They Will Shape the Internet
50:43
BSides DC 2018 - Blue Teams next tool: Social Engineering (Psychology and Sociology at Work)
49:31
BSides DC 2018 - Endpoint to Internet: Security Control Validation Using Threat Behavior Emulation
54:59
BSides DC 2018 - DevOps Application Security Teams for the Rest of Us
55:29
BSides DC 2018 - Trust Chain: How to imagine and realize multi-organization Cloud Environment
27:55
BSides DC 2018 - How online dating made me better at threat modeling
36:20
BSides DC 2018 - The Unforeseen Consequences of Data Breaches and Hacking
41:10
BSides DC 2018 - Caught my WebApp cheating on me!