BITCQ

RVAsec

Size: 7.7 GB
Magnet link

Name Size
RVAsec/RVAsec 2012/RVASec 2012 Reverse Engineer an Obfuscated.Net Application (Travis Altman).mp4 46.6 MB
RVAsec/RVAsec 2012/RVAsec 2012 Code Maturity Is SDL a Waste of Time (Carsten Eiram).mp4 104.9 MB
RVAsec/RVAsec 2012/RVAsec 2012 Don't be a Cog in the Wheel (Chris Gerling).mp4 50.8 MB
RVAsec/RVAsec 2012/RVAsec 2012 Errata Hits Puberty 13 Years of Chagrin (Jericho).mp4 132.7 MB
RVAsec/RVAsec 2012/RVAsec 2012 I'm not a Doctor But I Play One On Your Network (Tim Elrod).mp4 130.4 MB
RVAsec/RVAsec 2012/RVAsec 2012 Managing Security Within The Cloud (Adam Ely).mp4 114 MB
RVAsec/RVAsec 2012/RVAsec 2012 PHP Website Security, Attack Analysis, & Mitigations (Salvador Grec).mp4 35 MB
RVAsec/RVAsec 2012/RVAsec 2012 Why Do You Lock Your Door (Schuyler Towne).mp4 132.4 MB
RVAsec/RVAsec 2012/RVAsec 2012 KeyNote The Easy Stuff is Done (Marcus Ranum).mp4 98 MB
RVAsec/RVAsec 2013/RVAsec 2013 Adam Ely -- BYOD Risks, Maturity and Solutions.mp4 93.2 MB
RVAsec/RVAsec 2013/RVAsec 2013 Alex Hutton -- KEYNOTE Towards A Modern Approach To Risk Management.mp4 129.3 MB
RVAsec/RVAsec 2013/RVAsec 2013 Brian Lockrey -- Social Media Digital Forensics.mp4 101.3 MB
RVAsec/RVAsec 2013/RVAsec 2013 Chris Wysopal -- Keynote Future of Government Info Sharing.mp4 131 MB
RVAsec/RVAsec 2013/RVAsec 2013 Colby Clark -- The Digital Battlefield.mp4 98.5 MB
RVAsec/RVAsec 2013/RVAsec 2013 Dan Han -- SIEM implementation What to Expect.mp4 56.4 MB
RVAsec/RVAsec 2013/RVAsec 2013 Dan Holden -- DDoS and Modern Threat Motives.mp4 112.2 MB
RVAsec/RVAsec 2013/RVAsec 2013 Daniel Ramsbrock -- Web Application Vulnerabilities and Solutions.mp4 72.9 MB
RVAsec/RVAsec 2013/RVAsec 2013 Gus Fritschie & Andrew Du -- How to Defend Against FISMA.mp4 111.4 MB
RVAsec/RVAsec 2013/RVAsec 2013 Itzik Kotler -- Hack Like Its 2013.mp4 67.2 MB
RVAsec/RVAsec 2013/RVAsec 2013 Jericho -- Our Straw House Vulnerabilities.mp4 96 MB
RVAsec/RVAsec 2013/RVAsec 2013 Mike Shema -- JavaScript Security & HTML5.mp4 89.2 MB
RVAsec/RVAsec 2013/RVAsec 2013 Paul Watson -- Cross Platform Network Access Control.mp4 75.2 MB
RVAsec/RVAsec 2013/RVAsec 2013 Rockie Brockway--Business Adaptation (How I Learned to Stop Worrying & Love Conflicts).mp4 100.9 MB
RVAsec/RVAsec 2013/RVAsec 2013 Schuyler Towne -- Vulnerability Research Circa 1851.mp4 129.3 MB
RVAsec/RVAsec 2013/RVAsec 2013 Sean Mason -- A Day in the Life of an Incident Responder at a Fortune 5.mp4 52.2 MB
RVAsec/RVAsec 2014/Kimberley Parsons & Carmen Sullo- Leading Security When the Rest of The Biz Doesn't Care About Sec.mp4 47.4 MB
RVAsec/RVAsec 2014/RVAs3c Ben Tomhave - How to Achieve Success with Cyber Risk Assessment and Analysis.mp4 73.8 MB
RVAsec/RVAsec 2014/RVAs3c Brian Baskin - Introducing Intelligence into Malware Analysis.mp4 62.1 MB
RVAsec/RVAsec 2014/RVAs3c Dan Holden & Elizabeth Martin - Pissing Down The Leg Of Much Of Our Careers.mp4 60.8 MB
RVAsec/RVAsec 2014/RVAs3c David Bianco Pyramid of Pain Intel-Driven Detection Response to Increase Adversary's Cost.mp4 62.1 MB
RVAsec/RVAsec 2014/RVAs3c David Kennedy - 2014 Keynote.mp4 100.4 MB
RVAsec/RVAsec 2014/RVAs3c David Sharpe and Katherine Trame - Real World Intrusion Response.mp4 57.5 MB
RVAsec/RVAsec 2014/RVAs3c Evan Booth - Terminal Cornucopia Demystifying the Mullet.mp4 75 MB
RVAsec/RVAsec 2014/RVAs3c Gene Fishel - 2014 Keynote.mp4 80.6 MB
RVAsec/RVAsec 2014/RVAs3c Inga Goddijn - Cyber Insurance -- Worth the Effort or Total Ripoff.mp4 70.6 MB
RVAsec/RVAsec 2014/RVAs3c Jack Mannino & Abdullah Munawar - How To Find Mobile Internet Love.mp4 49.2 MB
RVAsec/RVAsec 2014/RVAs3c Jayson E. Street - The hacker in the fun house mirror (A talk on skewed perspectives).mp4 80.5 MB
RVAsec/RVAsec 2014/RVAs3c Joey Peloquin - Offensive Mobile Forensics.mp4 67.6 MB
RVAsec/RVAsec 2014/RVAs3c Jonathan Dambrot - Third Party Risk Management and Cybersecurity.mp4 58.8 MB
RVAsec/RVAsec 2014/RVAs3c Mubix- Attacker Ghost Stories Mostly Free Defenses That Gives Attackers Nightmares.mp4 72.2 MB
RVAsec/RVAsec 2014/RVAs3c Nick Popovich - I Found a Thing and You Can Too ISP's Unauthenticated SOAP Service.mp4 58.3 MB
RVAsec/RVAsec 2014/RVAs3c Pete Herzog - Five Secrets to Building an Amazing Security Culture in Your Organization.mp4 68.9 MB
RVAsec/RVAsec 2014/RVAs3c Ray Kelly - Man In The Front -- Modifying the Android OS for Mobile App Testing.mp4 51.4 MB
RVAsec/RVAsec 2014/RVAs3c Schuyler Towne - How to Make a Lock.mp4 89.1 MB
RVAsec/RVAsec 2014/RVAs3c Seth Hanford - CVSS v3 -- This One Goes to 11.mp4 74.6 MB
RVAsec/RVAsec 2014/RVAs3c Steve Werby- Bad Advice, Unintended Consequences, and Broken Paradigms.mp4 55.5 MB
RVAsec/RVAsec 2015/RV4Ssec Michelle Schaffer & Tim Wilson - Hasty Headlines in InfoSec.mp4 60.6 MB
RVAsec/RVAsec 2015/RV4sec Adam Crosby - Embracing the Cloud.mp4 43.8 MB
RVAsec/RVAsec 2015/RV4sec Allen Householder - Coordinated Vulnerability Disclosure is a concurrent process.mp4 60.3 MB
RVAsec/RVAsec 2015/RV4sec Bill Weinberg - OSS Hygiene - Mitigating Security Risks from Open Source Software.mp4 45.6 MB
RVAsec/RVAsec 2015/RV4sec David Bianco - Visual Hunting with Linked Data Graphs.mp4 52.1 MB
RVAsec/RVAsec 2015/RV4sec Elissa Shevinsky - The Changing Legal Landscape for InfoSec What You Need to Know.mp4 52.6 MB
RVAsec/RVAsec 2015/RV4sec Guy Broome - Foss Cryptographic Data Storage.mp4 47.9 MB
RVAsec/RVAsec 2015/RV4sec Mark Painter - A year in the life of HP security research.mp4 46.6 MB
RVAsec/RVAsec 2015/RV4sec Pete Herzog & Dave Lauer - Hacking the Market.mp4 99.9 MB
RVAsec/RVAsec 2015/RV4sec Speed Debates.mp4 44 MB
RVAsec/RVAsec 2015/RV4sec Virginia Governor Terry McAuliffe.mp4 39.2 MB
RVAsec/RVAsec 2015/RV4sec Keynote G. Mark Hardy.mp4 80.6 MB
RVAsec/RVAsec 2015/RV4sec Keynote Jennifer Steffens.mp4 44.2 MB
RVAsec/RVAsec 2015/RVAsec Barry Kouns - Incident Response Management - Not a Fire Drill.mp4 65 MB
RVAsec/RVAsec 2015/RVAsec Boris Sverdlik - You're HIPAA certified and Bob just killed someone from the parking lot.mp4 44.3 MB
RVAsec/RVAsec 2015/RVAsec Caleb Chill Crable - The Art of Post-Infection Response and Mitigation.mp4 48.7 MB
RVAsec/RVAsec 2015/RVAsec Jason Smith - Applied Detection and Analysis Using Flow Data.mp4 63.7 MB
RVAsec/RVAsec 2015/RVAsec Kizz Myanthia - Into The Worm Hole Metasploit For Web PenTesting.mp4 63.4 MB
RVAsec/RVAsec 2015/RVAsec Schuyler Towne - Selling Security in a Post Lock Society.mp4 51.5 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Andrea Matwyshyn - CYBER!.mp4 28.8 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Andrew McNicol & Zack Meyers - Beyond Automated Testing.mp4 54.1 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Ben Smith - Measuring Security How Do I Know What a Valid Metric Looks Like.mp4 53.5 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Brenton Kohler & Jacob Ewers - So You've Purchased a SAST Tool.mp4 51.2 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Chris Romeo - AppSec Awareness A Blue Print for Security Culture Change.mp4 56.2 MB
RVAsec/RVAsec 2016/RVA5ec 2016 David Sirrine - Open Source Identity Management From Password to Policy.mp4 49 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Dawn-Marie Hutchinson - Beyond the Security Team The Economics of Breach Response.mp4 68.2 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Evan Johnson - Staying Above A Rising Security Waterline.mp4 31.8 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Inga Goddijn & Becky Swanson - Show Me The Money! Uncovering The True Cost of a Breach.mp4 45.9 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Joey Peloquin - Deceptive Defense Beyond Honeypots.mp4 54.3 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Joshua Cole - Probability in Cyber Risk Assessment Holy Grail or Red Herring.mp4 93.8 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Juan Carlos - Reversing For Humans.mp4 54.5 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Karen R. Jackson, Virginia Secretary of Technology - Keynote.mp4 79.7 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Mark Weatherford (Your) Inevitable Path to the Cloud.mp4 39.4 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Michelle Schafer & Tim Wilson - Changing Mind of the Security Pro.mp4 53.3 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Rockie Brockway - Enterprise Threat Management Like a Boss.mp4 63 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Senator Mark Warner - Welcome To RVAsec!.mp4 9.4 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Steve Christey - Toward Consistent, Usable Security Risk Assessment of Medical Devices.mp4 55.6 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Trey Ford - Keynote.mp4 47.3 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Troy Wojewoda - Bro's Before Flows.mp4 56.5 MB
RVAsec/RVAsec 2016/RVA5ec 2016 Wendy Nather - Keynote.mp4 50.7 MB
RVAsec/RVAsec 2017/RVAsec 2017 Alon Arvatz - OSINT The Secret Weapon in Hunting Nation-State Campaigns.mp4 49 MB
RVAsec/RVAsec 2017/RVAsec 2017 Barry Kouns - Can Game Theory Save Us from Cyber Armageddon.mp4 54.6 MB
RVAsec/RVAsec 2017/RVAsec 2017 Dan Holden - Retailing Another Threat Landscape Story.mp4 41.9 MB
RVAsec/RVAsec 2017/RVAsec 2017 Daniel Bohannon - Invoke-CradleCrafter Moar PowerShell obFUsk8tion & Detection.mp4 63.6 MB
RVAsec/RVAsec 2017/RVAsec 2017 Derek Banks & Troy Wojewoda - Analysis of Red Team Attacks by Blue Team.mp4 37.3 MB
RVAsec/RVAsec 2017/RVAsec 2017 Governor Terry McAuliffe.mp4 30.4 MB
RVAsec/RVAsec 2017/RVAsec 2017 Grayson Walters - Building a pentest program on a shoestring budget.mp4 33.3 MB
RVAsec/RVAsec 2017/RVAsec 2017 Greg Pepper - Best Practices for Securing the Hybrid Cloud.mp4 59.7 MB
RVAsec/RVAsec 2017/RVAsec 2017 Jason Ross - DevOpSec - Killing the Buzz.mp4 33.1 MB
RVAsec/RVAsec 2017/RVAsec 2017 Jason Wonn - TIP of the Spear A Threat Intelligence Platform Acquisition.mp4 47.1 MB
RVAsec/RVAsec 2017/RVAsec 2017 Jeremy Dorrough - Zero Trust “Lite” Architecture to Securely Future-Proof Your Network.mp4 47 MB
RVAsec/RVAsec 2017/RVAsec 2017 Ken Johnson AWS Survival Guide 2.0.mp4 32.5 MB
RVAsec/RVAsec 2017/RVAsec 2017 Mike Shema - Managing Crowdsourced Security Testing.mp4 51.2 MB
RVAsec/RVAsec 2017/RVAsec 2017 Mikko Hypponen - Keynote.mp4 91.3 MB
RVAsec/RVAsec 2017/RVAsec 2017 Rick Lull & Shannon Yeaker - Adventures in (Dynamic) Network Segmentation.mp4 44.5 MB
RVAsec/RVAsec 2017/RVAsec 2017 Robert Mitchell - Recent Developments in Linkography Based Cyber Security.mp4 61.1 MB
RVAsec/RVAsec 2017/RVAsec 2017 Robert Wood - Maintainability + Security.mp4 46.2 MB
RVAsec/RVAsec 2017/RVAsec 2017 Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists.mp4 41.7 MB
RVAsec/RVAsec 2017/RVAsec 2017 Ron Gula - Keynote.mp4 50.5 MB
RVAsec/RVAsec 2017/RVAsec 2017 Seth Hanford - Defend the Defenders Managing and Participating in Excellent Teams.mp4 62.4 MB
RVAsec/RVAsec 2017/RVAsec 2017 Troy Marshall - RoboCop- Bringing Law And Order To CICD.mp4 63.2 MB
RVAsec/RVAsec 2018/RVAsec 2018 Bob Siegel - GDPR and You.mp4 55.3 MB
RVAsec/RVAsec 2018/RVAsec 2018 Chris Czub - OS X App Whitelisting Without Losing Your Job.mp4 39.3 MB
RVAsec/RVAsec 2018/RVAsec 2018 Crane Hassold - Doxing Phishers Analyzing Phishing Attacks from Lure to Attribution.mp4 47.2 MB
RVAsec/RVAsec 2018/RVAsec 2018 Dennis Rand -You think IoT botnets are dangerous - Bypassing Anti-DDoS with 90's tech.mp4 54.4 MB
RVAsec/RVAsec 2018/RVAsec 2018 Derek Banks & Beau Bullock - Red Team Apocalypse.mp4 59.7 MB
RVAsec/RVAsec 2018/RVAsec 2018 Elissa Shevinsky - Container Security Vulnerabilities, Exploits and Defense.mp4 32.2 MB
RVAsec/RVAsec 2018/RVAsec 2018 Galloway & Yunusov - Demystifying Payments Payment Technologies and Sec Risks.mp4 38.2 MB
RVAsec/RVAsec 2018/RVAsec 2018 Josh Corman - Keynote.mp4 73.3 MB
RVAsec/RVAsec 2018/RVAsec 2018 Karen Cole - From Grief to Enlightenment Getting the Executive Support for InfoSec.mp4 57.1 MB
RVAsec/RVAsec 2018/RVAsec 2018 Katie Moussouris - Keynote.mp4 70.9 MB
RVAsec/RVAsec 2018/RVAsec 2018 Ksenia Peguero - How to REACT to JavaScript [In]Security.mp4 48.4 MB
RVAsec/RVAsec 2018/RVAsec 2018 Mark Arnold Hacking Intelligence - The Use, Abuse, and Misappropriation of Intel....mp4 35.7 MB
RVAsec/RVAsec 2018/RVAsec 2018 Michael Marriott - Seize and Desist Criminal Evolution 1 Year After AlphaBay's Demise.mp4 26.6 MB
RVAsec/RVAsec 2018/RVAsec 2018 Mike Hodges - Hiding in the Clouds - Leveraging Cloud Infrastructure to Evade Detection.mp4 19 MB
RVAsec/RVAsec 2018/RVAsec 2018 Nathaniel Hirsch - Building a Better Catfish.mp4 41 MB
RVAsec/RVAsec 2018/RVAsec 2018 Robert Mitchell - A Game Theoretic Model of Computer Network Exploitation Campaigns.mp4 48.7 MB
RVAsec/RVAsec 2018/RVAsec 2018 Simone Petrella - How Do You Measure Expertise A New Model for Cybersecurity Education.mp4 52.4 MB
RVAsec/RVAsec 2018/RVAsec 2018 Travis McCormack - From Web App to ATM Why the Basics Matter.mp4 33.9 MB
RVAsec/RVAsec 2018/RVAsec 2018 Tyler Townes - Let's build an OSS vulnerability management program!.mp4 44 MB
RVAsec/RVAsec logo.jpg 10 KB
RVAsec/RVAsec thank you.txt 817 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
RVAsec Video 7.7 GB 9

Loading...