RVAsec/RVAsec 2012/RVASec 2012 Reverse Engineer an Obfuscated.Net Application (Travis Altman).mp4 |
46.6 MB |
RVAsec/RVAsec 2012/RVAsec 2012 Code Maturity Is SDL a Waste of Time (Carsten Eiram).mp4 |
104.9 MB |
RVAsec/RVAsec 2012/RVAsec 2012 Don't be a Cog in the Wheel (Chris Gerling).mp4 |
50.8 MB |
RVAsec/RVAsec 2012/RVAsec 2012 Errata Hits Puberty 13 Years of Chagrin (Jericho).mp4 |
132.7 MB |
RVAsec/RVAsec 2012/RVAsec 2012 I'm not a Doctor But I Play One On Your Network (Tim Elrod).mp4 |
130.4 MB |
RVAsec/RVAsec 2012/RVAsec 2012 Managing Security Within The Cloud (Adam Ely).mp4 |
114 MB |
RVAsec/RVAsec 2012/RVAsec 2012 PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).mp4 |
35 MB |
RVAsec/RVAsec 2012/RVAsec 2012 Why Do You Lock Your Door (Schuyler Towne).mp4 |
132.4 MB |
RVAsec/RVAsec 2012/RVAsec 2012 KeyNote The Easy Stuff is Done (Marcus Ranum).mp4 |
98 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Adam Ely -- BYOD Risks, Maturity and Solutions.mp4 |
93.2 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Alex Hutton -- KEYNOTE Towards A Modern Approach To Risk Management.mp4 |
129.3 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Brian Lockrey -- Social Media Digital Forensics.mp4 |
101.3 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Chris Wysopal -- Keynote Future of Government Info Sharing.mp4 |
131 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Colby Clark -- The Digital Battlefield.mp4 |
98.5 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Dan Han -- SIEM implementation What to Expect.mp4 |
56.4 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Dan Holden -- DDoS and Modern Threat Motives.mp4 |
112.2 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Daniel Ramsbrock -- Web Application Vulnerabilities and Solutions.mp4 |
72.9 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Gus Fritschie & Andrew Du -- How to Defend Against FISMA.mp4 |
111.4 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Itzik Kotler -- Hack Like Its 2013.mp4 |
67.2 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Jericho -- Our Straw House Vulnerabilities.mp4 |
96 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Mike Shema -- JavaScript Security & HTML5.mp4 |
89.2 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Paul Watson -- Cross Platform Network Access Control.mp4 |
75.2 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Rockie Brockway--Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).mp4 |
100.9 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Schuyler Towne -- Vulnerability Research Circa 1851.mp4 |
129.3 MB |
RVAsec/RVAsec 2013/RVAsec 2013 Sean Mason -- A Day in the Life of an Incident Responder at a Fortune 5.mp4 |
52.2 MB |
RVAsec/RVAsec 2014/Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.mp4 |
47.4 MB |
RVAsec/RVAsec 2014/RVAs3c Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.mp4 |
73.8 MB |
RVAsec/RVAsec 2014/RVAs3c Brian Baskin - Introducing Intelligence into Malware Analysis.mp4 |
62.1 MB |
RVAsec/RVAsec 2014/RVAs3c Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.mp4 |
60.8 MB |
RVAsec/RVAsec 2014/RVAs3c David Bianco Pyramid of Pain Intel-Driven Detection Response to Increase Adversary's Cost.mp4 |
62.1 MB |
RVAsec/RVAsec 2014/RVAs3c David Kennedy - 2014 Keynote.mp4 |
100.4 MB |
RVAsec/RVAsec 2014/RVAs3c David Sharpe and Katherine Trame - Real World Intrusion Response.mp4 |
57.5 MB |
RVAsec/RVAsec 2014/RVAs3c Evan Booth - Terminal Cornucopia Demystifying the Mullet.mp4 |
75 MB |
RVAsec/RVAsec 2014/RVAs3c Gene Fishel - 2014 Keynote.mp4 |
80.6 MB |
RVAsec/RVAsec 2014/RVAs3c Inga Goddijn - Cyber Insurance -- Worth the Effort or Total Ripoff.mp4 |
70.6 MB |
RVAsec/RVAsec 2014/RVAs3c Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.mp4 |
49.2 MB |
RVAsec/RVAsec 2014/RVAs3c Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).mp4 |
80.5 MB |
RVAsec/RVAsec 2014/RVAs3c Joey Peloquin - Offensive Mobile Forensics.mp4 |
67.6 MB |
RVAsec/RVAsec 2014/RVAs3c Jonathan Dambrot - Third Party Risk Management and Cybersecurity.mp4 |
58.8 MB |
RVAsec/RVAsec 2014/RVAs3c Mubix- Attacker Ghost Stories Mostly Free Defenses That Gives Attackers Nightmares.mp4 |
72.2 MB |
RVAsec/RVAsec 2014/RVAs3c Nick Popovich - I Found a Thing and You Can Too ISP's Unauthenticated SOAP Service.mp4 |
58.3 MB |
RVAsec/RVAsec 2014/RVAs3c Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.mp4 |
68.9 MB |
RVAsec/RVAsec 2014/RVAs3c Ray Kelly - Man In The Front -- Modifying the Android OS for Mobile App Testing.mp4 |
51.4 MB |
RVAsec/RVAsec 2014/RVAs3c Schuyler Towne - How to Make a Lock.mp4 |
89.1 MB |
RVAsec/RVAsec 2014/RVAs3c Seth Hanford - CVSS v3 -- This One Goes to 11.mp4 |
74.6 MB |
RVAsec/RVAsec 2014/RVAs3c Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.mp4 |
55.5 MB |
RVAsec/RVAsec 2015/RV4Ssec Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.mp4 |
60.6 MB |
RVAsec/RVAsec 2015/RV4sec Adam Crosby - Embracing the Cloud.mp4 |
43.8 MB |
RVAsec/RVAsec 2015/RV4sec Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.mp4 |
60.3 MB |
RVAsec/RVAsec 2015/RV4sec Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.mp4 |
45.6 MB |
RVAsec/RVAsec 2015/RV4sec David Bianco - Visual Hunting with Linked Data Graphs.mp4 |
52.1 MB |
RVAsec/RVAsec 2015/RV4sec Elissa Shevinsky - The Changing Legal Landscape for InfoSec What You Need to Know.mp4 |
52.6 MB |
RVAsec/RVAsec 2015/RV4sec Guy Broome - Foss Cryptographic Data Storage.mp4 |
47.9 MB |
RVAsec/RVAsec 2015/RV4sec Mark Painter - A year in the life of HP security research.mp4 |
46.6 MB |
RVAsec/RVAsec 2015/RV4sec Pete Herzog & Dave Lauer - Hacking the Market.mp4 |
99.9 MB |
RVAsec/RVAsec 2015/RV4sec Speed Debates.mp4 |
44 MB |
RVAsec/RVAsec 2015/RV4sec Virginia Governor Terry McAuliffe.mp4 |
39.2 MB |
RVAsec/RVAsec 2015/RV4sec Keynote G. Mark Hardy.mp4 |
80.6 MB |
RVAsec/RVAsec 2015/RV4sec Keynote Jennifer Steffens.mp4 |
44.2 MB |
RVAsec/RVAsec 2015/RVAsec Barry Kouns - Incident Response Management - Not a Fire Drill.mp4 |
65 MB |
RVAsec/RVAsec 2015/RVAsec Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.mp4 |
44.3 MB |
RVAsec/RVAsec 2015/RVAsec Caleb Chill Crable - The Art of Post-Infection Response and Mitigation.mp4 |
48.7 MB |
RVAsec/RVAsec 2015/RVAsec Jason Smith - Applied Detection and Analysis Using Flow Data.mp4 |
63.7 MB |
RVAsec/RVAsec 2015/RVAsec Kizz Myanthia - Into The Worm Hole Metasploit For Web PenTesting.mp4 |
63.4 MB |
RVAsec/RVAsec 2015/RVAsec Schuyler Towne - Selling Security in a Post Lock Society.mp4 |
51.5 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Andrea Matwyshyn - CYBER!.mp4 |
28.8 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Andrew McNicol & Zack Meyers - Beyond Automated Testing.mp4 |
54.1 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Ben Smith - Measuring Security How Do I Know What a Valid Metric Looks Like.mp4 |
53.5 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.mp4 |
51.2 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Chris Romeo - AppSec Awareness A Blue Print for Security Culture Change.mp4 |
56.2 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 David Sirrine - Open Source Identity Management From Password to Policy.mp4 |
49 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Dawn-Marie Hutchinson - Beyond the Security Team The Economics of Breach Response.mp4 |
68.2 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Evan Johnson - Staying Above A Rising Security Waterline.mp4 |
31.8 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Inga Goddijn & Becky Swanson - Show Me The Money! Uncovering The True Cost of a Breach.mp4 |
45.9 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Joey Peloquin - Deceptive Defense Beyond Honeypots.mp4 |
54.3 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Joshua Cole - Probability in Cyber Risk Assessment Holy Grail or Red Herring.mp4 |
93.8 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Juan Carlos - Reversing For Humans.mp4 |
54.5 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Karen R. Jackson, Virginia Secretary of Technology - Keynote.mp4 |
79.7 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Mark Weatherford (Your) Inevitable Path to the Cloud.mp4 |
39.4 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.mp4 |
53.3 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Rockie Brockway - Enterprise Threat Management Like a Boss.mp4 |
63 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Senator Mark Warner - Welcome To RVAsec!.mp4 |
9.4 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.mp4 |
55.6 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Trey Ford - Keynote.mp4 |
47.3 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Troy Wojewoda - Bro's Before Flows.mp4 |
56.5 MB |
RVAsec/RVAsec 2016/RVA5ec 2016 Wendy Nather - Keynote.mp4 |
50.7 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Alon Arvatz - OSINT The Secret Weapon in Hunting Nation-State Campaigns.mp4 |
49 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.mp4 |
54.6 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Dan Holden - Retailing Another Threat Landscape Story.mp4 |
41.9 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Daniel Bohannon - Invoke-CradleCrafter Moar PowerShell obFUsk8tion & Detection.mp4 |
63.6 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.mp4 |
37.3 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Governor Terry McAuliffe.mp4 |
30.4 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Grayson Walters - Building a pentest program on a shoestring budget.mp4 |
33.3 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Greg Pepper - Best Practices for Securing the Hybrid Cloud.mp4 |
59.7 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Jason Ross - DevOpSec - Killing the Buzz.mp4 |
33.1 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Jason Wonn - TIP of the Spear A Threat Intelligence Platform Acquisition.mp4 |
47.1 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Jeremy Dorrough - Zero Trust “Lite” Architecture to Securely Future-Proof Your Network.mp4 |
47 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Ken Johnson AWS Survival Guide 2.0.mp4 |
32.5 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Mike Shema - Managing Crowdsourced Security Testing.mp4 |
51.2 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Mikko Hypponen - Keynote.mp4 |
91.3 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.mp4 |
44.5 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Robert Mitchell - Recent Developments in Linkography Based Cyber Security.mp4 |
61.1 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Robert Wood - Maintainability + Security.mp4 |
46.2 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.mp4 |
41.7 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Ron Gula - Keynote.mp4 |
50.5 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Seth Hanford - Defend the Defenders Managing and Participating in Excellent Teams.mp4 |
62.4 MB |
RVAsec/RVAsec 2017/RVAsec 2017 Troy Marshall - RoboCop- Bringing Law And Order To CICD.mp4 |
63.2 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Bob Siegel - GDPR and You.mp4 |
55.3 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Chris Czub - OS X App Whitelisting Without Losing Your Job.mp4 |
39.3 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Crane Hassold - Doxing Phishers Analyzing Phishing Attacks from Lure to Attribution.mp4 |
47.2 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.mp4 |
54.4 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Derek Banks & Beau Bullock - Red Team Apocalypse.mp4 |
59.7 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Elissa Shevinsky - Container Security Vulnerabilities, Exploits and Defense.mp4 |
32.2 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Galloway & Yunusov - Demystifying Payments Payment Technologies and Sec Risks.mp4 |
38.2 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Josh Corman - Keynote.mp4 |
73.3 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Karen Cole - From Grief to Enlightenment Getting the Executive Support for InfoSec.mp4 |
57.1 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Katie Moussouris - Keynote.mp4 |
70.9 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Ksenia Peguero - How to REACT to JavaScript [In]Security.mp4 |
48.4 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Mark Arnold Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....mp4 |
35.7 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.mp4 |
26.6 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.mp4 |
19 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Nathaniel Hirsch - Building a Better Catfish.mp4 |
41 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.mp4 |
48.7 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.mp4 |
52.4 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Travis McCormack - From Web App to ATM Why the Basics Matter.mp4 |
33.9 MB |
RVAsec/RVAsec 2018/RVAsec 2018 Tyler Townes - Let's build an OSS vulnerability management program!.mp4 |
44 MB |
RVAsec/RVAsec logo.jpg |
10 KB |
RVAsec/RVAsec thank you.txt |
817 B |