Channel Avatar

CS3STHLM @UCkD15o_9eJxUc9eeHtWSQ6Q@youtube.com

865 subscribers - no pronouns :c

This channel relates to the international annual summit on v


01:07:17
Andy Greenberg - Sandworm: Lessons From the Cyberwar
52:13
Ross Anderson - The sustainability of safety and security
01:06
CS3STHLM 2020 - going digital
35:36
Rikard Bodforss - Ultra responsible disclosure
15:26
Jonathan Jogenfors - Digital Forensics and ICS: Why and how?
26:21
Michael Widmann - Cyber strategic decision-making exercises
26:01
Jarkko Huttunen - Know what's happening in the exercise
38:36
Erik Biverot & Johan Nilsson - The Blue side of Locked Shields
31:26
Sandra Bardón - The Red Team's view from the exercise
31:36
Silver Saks - Technical setup of the Locked Shields Exercise
19:36
Michael Widmann - What is the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)?
11:56
Thomas Svensson - Introduction to Locked Shields exercise
37:01
Markus Mahrla - Fuzz Testing IEC 61850
28:46
Mike Dodson - When will my PLC support Mirai?
43:39
Christopher Corbett & Kevin Gomez Buquerin - Automotive DoIP and forensic analysis for automotive..
37:26
Daniel Stenberg - curl - the world's most used software component?
20:41
Janek Pelzer - Introduction to Malcolm
31:18
Matan Dobrushin & Yoav Flint Rosenfeld - Project RunAway
41:46
Nicklas Keijser - SCADApocalypse Now 4.0
41:36
Ulf Frisk - Memory Forensics and DMA Attacks with MemProcFS and PCILeech
47:57
Stephen Hilt - How we reverse-engineered multiple industrial radio remote-control systems
33:08
Dieter Sarrazyn - Security Testing for ICS Owners 2.0
36:00
Alexander Nochvay - The fall of CODESYS
01:02:43
Jimmy Wylie & Reid Wightman - Broken Rungs: A look at popular ladder logic runtime privileges
48:56
Monta Elkins - Nation-State Supply Chain Attacks for Dummies and You Too
38:50
Erik Hjelmvik - TLS Interception and Decryption
01:26
CS3STHLM 2019
45:00
Jonathan Homer - Recent APT Campaign targeting Energy Sector Assets
46:42
Joe Slowik - Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense
09:39
CS3STHLM 2018 - Expo
32:18
Dan Gunter & Daniel Michaud-Soucy - Stateful Protocol Hunting
37:08
Marcin Dudek - Using fake BTS as a part of pentest
44:16
Omer Zohar - Unblockable Chains - Is Blockchain the ultimate malicious infrastructure?
37:41
Dieter Sarrazyn - Operator Jail breakout
46:06
William Middleton - Securing the ICS lab network
50:46
Mark Bristow - ICS Incident Response
51:56
Ben Miller & Mark Stacey - Hunting and Responding in ICS
28:07
Mark Stacey - Learning as you go is Expensive
40:26
Monta Elkins - Jumping Air Gaps
53:50
Kai Thomsen - Attacking Cars Revisited
38:21
Cheng Lei - Attacking PLCs by PLC in deep
38:57
Patrick Miller - Industrial Technology Trajectory: Running With Scissors [KEYNOTE]
47:51
Erwin Kooi & Rik van Hees - The good, the bad and the segmented
00:52
CS3sthlm Summit 2018 Call for Participation 1080p
21:49
CS3STHML Harlem Session - 25/10
20:57
CS3STHML Harlem Session - 26/10
28:00
Rossella Mattioli - Protecting European transport infrastructures
09:56
Rossella Mattioli - ENISA Trainings for Cyber Security Specialists
48:38
Patrick DeSantis - From Box to Backdoor
17:49
Melissa Crawford - ICS Program Development for Multi-national Corporations
19:14
Erik Johansson & Robert Malmgren - Keynote
29:27
Joe Slowik - Strategic Network Defense in ICS Environments
27:32
Jens Weisner - Security for Safety: Fortifying the last line of defense
26:52
Dieter Sarrazyn - DYI insider threat detection/prevention within ICS environments
37:16
Dan Demeter - Back to the IoT Future
28:39
Anton Cherepanov & Robert Lipovský - Industroyer
28:31
Ali Abbasi - Configurable Code-Reuse Attacks Mitigation
34:29
Akriti Srivastava - S in IoT is for Security
31:39
Adam Crain - Secure SCADA Protocol for the 21st Century (SSP21)
38:50
Lars Erik Smevold - Pandora's Box