LASCON/LASCON 2011/Automated vs. Manual Security You can't scan for The Stupid - charles and david.mp4 |
195.7 MB |
LASCON/LASCON 2011/Beautiful Payment Systems with OAuth - Tom Brown.en.transcribed.srt |
17 KB |
LASCON/LASCON 2011/Beautiful Payment Systems with OAuth - Tom Brown.mp4 |
176.7 MB |
LASCON/LASCON 2011/Ghosts of XSS Past, Present and Future - Jim Manico.en.transcribed.srt |
105 KB |
LASCON/LASCON 2011/Ghosts of XSS Past, Present and Future - Jim Manico.mp4 |
110.1 MB |
LASCON/LASCON 2011/Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.en.transcribed.srt |
134 KB |
LASCON/LASCON 2011/Hacking (and Defending) iPhone Application - Kevin Stadmeyer, Garrett Held.mp4 |
130.5 MB |
LASCON/LASCON 2011/Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.en.transcribed.srt |
94 KB |
LASCON/LASCON 2011/Hiding From Big Brother Using Distributed Steganography- Josh Sokol and orlando Barrera II.mp4 |
135.9 MB |
LASCON/LASCON 2011/How to build a secure login - Ben Broussard.en.transcribed.srt |
100 KB |
LASCON/LASCON 2011/How to build a secure login - Ben Broussard.mp4 |
241.6 MB |
LASCON/LASCON 2011/Infosec In The New World Order Rugged DevOps And More ... - Gene Kim.en.transcribed.srt |
121 KB |
LASCON/LASCON 2011/Infosec In The New World Order Rugged DevOps And More ... - Gene Kim.mp4 |
167.6 MB |
LASCON/LASCON 2011/Matt Tesauro Keynote.en.transcribed.srt |
117 KB |
LASCON/LASCON 2011/Matt Tesauro Keynote.mp4 |
66.8 MB |
LASCON/LASCON 2011/Obfuscation in Javascript- herrera.en.transcribed.srt |
93 KB |
LASCON/LASCON 2011/Obfuscation in Javascript- herrera.mp4 |
189 MB |
LASCON/LASCON 2011/PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.en.transcribed.srt |
109 KB |
LASCON/LASCON 2011/PCI, CWE topp 25 and OWASP top 10 bringing all together - Nishi kumar, keith Turpin.mp4 |
174.3 MB |
LASCON/LASCON 2011/Reversing Web Applications - Andrew Wilson.en.transcribed.srt |
139 KB |
LASCON/LASCON 2011/Reversing Web Applications - Andrew Wilson.mp4 |
156 MB |
LASCON/LASCON 2011/SDL- A History -Michael Howard.en.transcribed.srt |
101 KB |
LASCON/LASCON 2011/SDL- A History -Michael Howard.mp4 |
242.3 MB |
LASCON/LASCON 2011/Social Engineering - David Hughes.en.transcribed.srt |
91 KB |
LASCON/LASCON 2011/Social Engineering - David Hughes.mp4 |
254.1 MB |
LASCON/LASCON 2011/Software Assurance- Joe Jarzombek.en.transcribed.srt |
18 KB |
LASCON/LASCON 2011/Software Assurance- Joe Jarzombek.mp4 |
35.6 MB |
LASCON/LASCON 2011/You're Going to Need a Bigger Shovel Rafa Los.en.transcribed.srt |
41 KB |
LASCON/LASCON 2011/You're Going to Need a Bigger Shovel Rafa Los.mp4 |
94.3 MB |
LASCON/LASCON 2011/opensamm in the Real World- Philip J.Beyer, Scott Stevens.en.transcribed.srt |
116 KB |
LASCON/LASCON 2011/opensamm in the Real World- Philip J.Beyer, Scott Stevens.mp4 |
230.1 MB |
LASCON/LASCON 2012/An Introduction to ZAP, The OWASP Zed Attack Proxy with Simon Bennetts.mp4 |
55.3 MB |
LASCON/LASCON 2012/Android Security, or this is not the kind of 'open' I meant with Mike Park, Trustwave SpiderLabs.mp4 |
23 MB |
LASCON/LASCON 2012/AppSec Inception Exploiting Software Culture with Jeff Williams, Aspect Security, CEO.mp4 |
36.5 MB |
LASCON/LASCON 2012/Application Security & User Experience with Alex Smolen.mp4 |
18.1 MB |
LASCON/LASCON 2012/Application Security Advisory Board SDLC Panel Fuchsberger, Kumar, Tychansky and Moretti.mp4 |
61.3 MB |
LASCON/LASCON 2012/Application Security Debt and Application Interest Rates with Chris Wysopal, Veracode.mp4 |
21.8 MB |
LASCON/LASCON 2012/Behavioral Security Modeling Eliminating Vulnerabilities by Building Predictable Systems.mp4 |
25.5 MB |
LASCON/LASCON 2012/Brakeman and Jenkins The Duo Detects Defects in Ruby on Rails Code with Justin Collins & Tin Zaw.mp4 |
26.2 MB |
LASCON/LASCON 2012/Community The Killer App with Mark Curphey, OWASP.mp4 |
38.5 MB |
LASCON/LASCON 2012/Coud Sec 12 Step with Adrian Lane, Securosis, LLC.mp4 |
26 MB |
LASCON/LASCON 2012/Emerging Threats in Mobile Computing with Adam Meyers SRA International.mp4 |
31.8 MB |
LASCON/LASCON 2012/Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall & the OWASP Project Portal.mp4 |
41.7 MB |
LASCON/LASCON 2012/Enterprise Security API ESAPI 2 0 Crypto Changes with Kevin Wall, ESAPI Project co owner.mp4 |
5 MB |
LASCON/LASCON 2012/Ghosts of XSS Past, Present & Future with Jim Manico, WhiteHat Security.mp4 |
23.2 MB |
LASCON/LASCON 2012/Gray, the New Black, Gray Box Vulnerability Testing with Brian Chess, Ph D.mp4 |
26.3 MB |
LASCON/LASCON 2012/Hacking NET Applications, The Black Arts with Jon McCoy, DigitalBodyGuard.com.mp4 |
56.1 MB |
LASCON/LASCON 2012/Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs.mp4 |
22 MB |
LASCON/LASCON 2012/How To Recruit Spies on the Internet with Ira Winkler, CISSP.mp4 |
29.4 MB |
LASCON/LASCON 2012/Implementing AppSensor in ModSecurity with Ryan Barnett, Trustwave SpiderLabs.mp4 |
36.2 MB |
LASCON/LASCON 2012/Improve your SDLC with CAPEC and CWE with Ryan Stinson, KCG.mp4 |
17.5 MB |
LASCON/LASCON 2012/Keeping Up with the Web Application Security with Ganesh Devarajan & Todd Redfoot.mp4 |
24.7 MB |
LASCON/LASCON 2012/Lesson Learned Building Secure ASP NET Applications with Tom Fischer.mp4 |
24.2 MB |
LASCON/LASCON 2012/Messaging Security Using GlassFish & Open Message Queue with Srini Penchikala.mp4 |
14.5 MB |
LASCON/LASCON 2012/Mobile Web Services with Gunnar Peterson.mp4 |
39.2 MB |
LASCON/LASCON 2012/Next Generation Web Attacks HTML 5, DOM L3 and XHR L2 with Shreeraj Shah, Blueinfy Solutions Pvt.mp4 |
33.8 MB |
LASCON/LASCON 2012/OWASP Foundation Board Discussion with Williams, Brennan, Keary, Tesauro, Wichers and Coates.mp4 |
34.6 MB |
LASCON/LASCON 2012/OWASP Top 10 Mobile Risks with Jack Mannino, Mike Zusman & Zach Lanier.mp4 |
31.7 MB |
LASCON/LASCON 2012/Panel Discussion Making it in Information Security & Application Security.mp4 |
55.3 MB |
LASCON/LASCON 2012/Principles of Patrolling, Applying Ranger School Lessons to Information Security with Patrick Tatro.mp4 |
19.2 MB |
LASCON/LASCON 2012/Recap and Looking Ahead to the Next ten Years and Appsec USA 2012.mp4 |
13.3 MB |
LASCON/LASCON 2012/SSL And The Future of Authenticity with Moxie Marlinspike -Keynote.mp4 |
35.9 MB |
LASCON/LASCON 2012/STAAF An Efficient Distributed Framework for Performing Large Scale Android Application Analysis.mp4 |
28.1 MB |
LASCON/LASCON 2012/Secure Development Considerations for Cloud Virtual Environments with Andrew Murren.mp4 |
27.9 MB |
LASCON/LASCON 2012/Secure Programming Support in IDE with Bill Chu and Jing Xie.mp4 |
34.5 MB |
LASCON/LASCON 2012/Simplifying Threat Modeling with Mike Ware, Cigital.mp4 |
26.4 MB |
LASCON/LASCON 2012/Six Key Metrics A Look at the Future of AppSec with Arian Evans.mp4 |
33.6 MB |
LASCON/LASCON 2012/Software Assurance Automation Throughout the Lifecycle with Richard Struse.mp4 |
27.1 MB |
LASCON/LASCON 2012/Software Security Is OK Good Enough with John B Dickson, CISSP.mp4 |
24.3 MB |
LASCON/LASCON 2012/Sticking to the Facts Scientific Study of Static Analysis Tools with Britton Willis.mp4 |
25.1 MB |
LASCON/LASCON 2012/Testing from the Cloud Is the sky falling with Matt Tesauro, OWASP Foundation Board Member.mp4 |
15 MB |
LASCON/LASCON 2012/The Good Hacker Dismantling Web Malware with Aditya K Sood & Richard J Enbody.mp4 |
29.2 MB |
LASCON/LASCON 2012/Top Ten Risks with Cloud That Will Keep You Awake at Night with Shankar B Chebrolu.mp4 |
30.2 MB |
LASCON/LASCON 2012/Web Application Security Payloads with Andres Riancho, RAPID 7.mp4 |
36.5 MB |
LASCON/LASCON 2012/Why Do Developers Make Dangerous Software Errors with Michele Moss & Nadya Bartol.mp4 |
23.4 MB |
LASCON/LASCON 2012/You're Not Done Yet Turning Securable Apps into Secure Installations using SCAP with Charles Schmi.mp4 |
21.5 MB |
LASCON/LASCON 2013/5 Proven Success Strategies for your Software Security Program -Bankim Tejani.en.transcribed.srt |
106 KB |
LASCON/LASCON 2013/5 Proven Success Strategies for your Software Security Program -Bankim Tejani.mp4 |
129.5 MB |
LASCON/LASCON 2013/Big Data, Little Security – Practical Steps for securing Big Data -Manoj Tripathi.en.transcribed.srt |
97 KB |
LASCON/LASCON 2013/Big Data, Little Security – Practical Steps for securing Big Data -Manoj Tripathi.mp4 |
183.8 MB |
LASCON/LASCON 2013/Blindspots Keynote with Robert Hansen.en.transcribed.srt |
102 KB |
LASCON/LASCON 2013/Blindspots Keynote with Robert Hansen.mp4 |
112.4 MB |
LASCON/LASCON 2013/Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.en.transcribed.srt |
114 KB |
LASCON/LASCON 2013/Cloud Keep Protect your Secrets at Scale -Jarret Raim, Matt Tesauro.mp4 |
163 MB |
LASCON/LASCON 2013/Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.en.transcribed.srt |
105 KB |
LASCON/LASCON 2013/Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn't Suck -Josh Sokol.mp4 |
138.3 MB |
LASCON/LASCON 2013/DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.en.transcribed.srt |
68 KB |
LASCON/LASCON 2013/DDOS DOS Attack Classification per Attack Target and Attack Vector -Pez Zivic.mp4 |
88.7 MB |
LASCON/LASCON 2013/Do you have a Scanner, or a Scanning Program -Dan Cornell.en.transcribed.srt |
119 KB |
LASCON/LASCON 2013/Do you have a Scanner, or a Scanning Program -Dan Cornell.mp4 |
180.1 MB |
LASCON/LASCON 2013/Drawing the map Outlining Android permissions mechanism -Andrew Reiter.en.transcribed.srt |
88 KB |
LASCON/LASCON 2013/Drawing the map Outlining Android permissions mechanism -Andrew Reiter.mp4 |
68.6 MB |
LASCON/LASCON 2013/Enforcing Authorization with Cryptography -Amit Sethi.en.transcribed.srt |
59 KB |
LASCON/LASCON 2013/Enforcing Authorization with Cryptography -Amit Sethi.mp4 |
101.9 MB |
LASCON/LASCON 2013/From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.en.transcribed.srt |
109 KB |
LASCON/LASCON 2013/From Gates to Guardrails Alternate Approaches to Product Security -Jason Chan.mp4 |
169.7 MB |
LASCON/LASCON 2013/Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.en.transcribed.srt |
96 KB |
LASCON/LASCON 2013/Hacking NETC# Applications The Black Artsv3 -Jon Mccoy.mp4 |
110.1 MB |
LASCON/LASCON 2013/Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.en.transcribed.srt |
90 KB |
LASCON/LASCON 2013/Heading Off Trouble Securing Your Web Application with HTTP Headers and X Headers -Kevin Babcock.mp4 |
97.7 MB |
LASCON/LASCON 2013/How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.en.transcribed.srt |
113 KB |
LASCON/LASCON 2013/How Malware Uses and Abuses Your Software -Michael Gough, Ian Robertson.mp4 |
122.2 MB |
LASCON/LASCON 2013/How overlay networks can make public clouds your global WAN network - Ryan Koop.en.transcribed.srt |
88 KB |
LASCON/LASCON 2013/How overlay networks can make public clouds your global WAN network - Ryan Koop.mp4 |
160.3 MB |
LASCON/LASCON 2013/Ice Cream 'sudo make me a' Sandwich -Max Sobell.en.transcribed.srt |
81 KB |
LASCON/LASCON 2013/Ice Cream 'sudo make me a' Sandwich -Max Sobell.mp4 |
108.6 MB |
LASCON/LASCON 2013/Malware Automation -Christopher Elisan.en.transcribed.srt |
95 KB |
LASCON/LASCON 2013/Malware Automation -Christopher Elisan.mp4 |
123.2 MB |
LASCON/LASCON 2013/Million Browser Botnet -Matt Johansen.en.transcribed.srt |
103 KB |
LASCON/LASCON 2013/Million Browser Botnet -Matt Johansen.mp4 |
123.5 MB |
LASCON/LASCON 2013/Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.en.transcribed.srt |
93 KB |
LASCON/LASCON 2013/Minding The Gap Secure PhoneGap Apps -Jack Mannino, Jason Haddix.mp4 |
138.8 MB |
LASCON/LASCON 2013/Mobile AppSec Development and Alphabet Soup -David Lindner.en.transcribed.srt |
98 KB |
LASCON/LASCON 2013/Mobile AppSec Development and Alphabet Soup -David Lindner.mp4 |
112.4 MB |
LASCON/LASCON 2013/No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.en.transcribed.srt |
116 KB |
LASCON/LASCON 2013/No More Monkey Business Quality Assurance in Penetration Testing - Aaron Estes.mp4 |
133.7 MB |
LASCON/LASCON 2013/OWASP Top Ten Proactive Controls -Jim Manico.en.transcribed.srt |
149 KB |
LASCON/LASCON 2013/OWASP Top Ten Proactive Controls -Jim Manico.mp4 |
189.5 MB |
LASCON/LASCON 2013/Penetration Testing The Other Stuff -David Hughes.en.transcribed.srt |
119 KB |
LASCON/LASCON 2013/Penetration Testing The Other Stuff -David Hughes.mp4 |
179.8 MB |
LASCON/LASCON 2013/Practical PKI -Steven Bernstein.en.transcribed.srt |
91 KB |
LASCON/LASCON 2013/Practical PKI -Steven Bernstein.mp4 |
121.4 MB |
LASCON/LASCON 2013/Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.en.transcribed.srt |
69 KB |
LASCON/LASCON 2013/Railsgoat Rails attack and defense -Ken Johnson, Mike McCabe.mp4 |
87.7 MB |
LASCON/LASCON 2013/Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.en.transcribed.srt |
85 KB |
LASCON/LASCON 2013/Revenge of the Geeks Hacking Fantasy Sports Sites - Dan Kuykendall.mp4 |
141.2 MB |
LASCON/LASCON 2013/Riding the Magical Code Injection Rainbow -Daniel Crowley.en.transcribed.srt |
69 KB |
LASCON/LASCON 2013/Riding the Magical Code Injection Rainbow -Daniel Crowley.mp4 |
113.9 MB |
LASCON/LASCON 2013/Rugged Driven Development with Gauntlt -James Wickett.en.transcribed.srt |
63 KB |
LASCON/LASCON 2013/Rugged Driven Development with Gauntlt -James Wickett.mp4 |
101.2 MB |
LASCON/LASCON 2013/Securing Redis with Sedona -Will Urbanski.en.transcribed.srt |
60 KB |
LASCON/LASCON 2013/Securing Redis with Sedona -Will Urbanski.mp4 |
100 MB |
LASCON/LASCON 2013/Software and Supply Chain Assurance SSCA -Joe Jarzombek.en.transcribed.srt |
134 KB |
LASCON/LASCON 2013/Software and Supply Chain Assurance SSCA -Joe Jarzombek.mp4 |
185 MB |
LASCON/LASCON 2013/Speed Debates! -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.en.transcribed.srt |
107 KB |
LASCON/LASCON 2013/Speed Debates! -Matt Tesauro, Nick Galbreath, Robert Hansen, Jim Manico, HD Moore, Wendy Nather.mp4 |
192.5 MB |
LASCON/LASCON 2013/Stalking a City for Fun and Frivolity -Brendan O'Connor.en.transcribed.srt |
168 KB |
LASCON/LASCON 2013/Stalking a City for Fun and Frivolity -Brendan O'Connor.mp4 |
162.1 MB |
LASCON/LASCON 2013/Stupid webappsec Tricks -Zane Lackey.en.transcribed.srt |
117 KB |
LASCON/LASCON 2013/Stupid webappsec Tricks -Zane Lackey.mp4 |
138.4 MB |
LASCON/LASCON 2013/The Origins of Insecurity Keynote with Nick Galbreath.mp4 |
131.6 MB |
LASCON/LASCON 2013/The Real Cost of Security -Wendy Nather.en.transcribed.srt |
85 KB |
LASCON/LASCON 2013/The Real Cost of Security -Wendy Nather.mp4 |
114.7 MB |
LASCON/LASCON 2013/User Auth for Winners, how to get it right the first time! -Karthik Gaekwad.en.transcribed.srt |
88 KB |
LASCON/LASCON 2013/User Auth for Winners, how to get it right the first time! -Karthik Gaekwad.mp4 |
131.3 MB |
LASCON/LASCON 2013/View this abstract in your browser -PHIL PURVIANCE.en.transcribed.srt |
63 KB |
LASCON/LASCON 2013/View this abstract in your browser -PHIL PURVIANCE.mp4 |
61.3 MB |
LASCON/LASCON 2013/We are the Cavalry Why it has to be us & why now -Adam Brand.en.transcribed.srt |
77 KB |
LASCON/LASCON 2013/We are the Cavalry Why it has to be us & why now -Adam Brand.mp4 |
87 MB |
LASCON/LASCON 2013/Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.en.transcribed.srt |
85 KB |
LASCON/LASCON 2013/Why CloudHSM can Revolutionzie AWS -Todd Cignetti, Oleg Gryb.mp4 |
131.9 MB |
LASCON/LASCON 2014/Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.en.transcribed.srt |
109 KB |
LASCON/LASCON 2014/Be Mean to Your Code Rugged Development & You - Matt Johansen, James Wickett.mp4 |
173.6 MB |
LASCON/LASCON 2014/Breach Assessments Are you 0wned You can find out!- Jessey Bullock, Kevin Dunn.en.transcribed.srt |
106 KB |
LASCON/LASCON 2014/Breach Assessments Are you 0wned You can find out!- Jessey Bullock, Kevin Dunn.mp4 |
93.7 MB |
LASCON/LASCON 2014/Building a Security Engineering Organization for the Modern World- Zane Lackey.en.transcribed.srt |
128 KB |
LASCON/LASCON 2014/Building a Security Engineering Organization for the Modern World- Zane Lackey.mp4 |
84.7 MB |
LASCON/LASCON 2014/Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.en.transcribed.srt |
95 KB |
LASCON/LASCON 2014/Burning Down the Haystack to Find the Needle - Walter Johnson, Josh Sokol.mp4 |
103.9 MB |
LASCON/LASCON 2014/DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.en.transcribed.srt |
76 KB |
LASCON/LASCON 2014/DNS Based Authentication of Named Entities DANE Can we fix our broken CA model -Tony Cargile.mp4 |
68.4 MB |
LASCON/LASCON 2014/Derived Credentials – A better user experience for secure applications in the mobile world.en.transcribed.srt |
69 KB |
LASCON/LASCON 2014/Derived Credentials – A better user experience for secure applications in the mobile world.mp4 |
124.2 MB |
LASCON/LASCON 2014/DevOps, CI, APIs, Oh My! Security Gone Agile - Matt Tesauro.en.transcribed.srt |
119 KB |
LASCON/LASCON 2014/DevOps, CI, APIs, Oh My! Security Gone Agile - Matt Tesauro.mp4 |
170.4 MB |
LASCON/LASCON 2014/Fireside chat with RSnake.en.transcribed.srt |
105 KB |
LASCON/LASCON 2014/Fireside chat with RSnake.mp4 |
109.9 MB |
LASCON/LASCON 2014/Historical Lessons for Improving Cyber Security Marty Hellman.en.transcribed.srt |
83 KB |
LASCON/LASCON 2014/Historical Lessons for Improving Cyber Security Marty Hellman.mp4 |
171 MB |
LASCON/LASCON 2014/How to use adaptive hashes without making yourself vulnerable to DoS attacks.en.transcribed.srt |
109 KB |
LASCON/LASCON 2014/How to use adaptive hashes without making yourself vulnerable to DoS attacks.mp4 |
105.8 MB |
LASCON/LASCON 2014/Implementing a large scale identity theft prevention solution using the cloud.en.transcribed.srt |
120 KB |
LASCON/LASCON 2014/Implementing a large scale identity theft prevention solution using the cloud.mp4 |
113.6 MB |
LASCON/LASCON 2014/In AppSec, Fast Is Everything.en.transcribed.srt |
99 KB |
LASCON/LASCON 2014/In AppSec, Fast Is Everything.mp4 |
120.6 MB |
LASCON/LASCON 2014/Intro to GPG and the Web of Trust.en.transcribed.srt |
113 KB |
LASCON/LASCON 2014/Intro to GPG and the Web of Trust.mp4 |
54.3 MB |
LASCON/LASCON 2014/Is this your pipe Hijacking the build pipeline.en.transcribed.srt |
38 KB |
LASCON/LASCON 2014/Is this your pipe Hijacking the build pipeline.mp4 |
50.7 MB |
LASCON/LASCON 2014/Keynote by Chris Nickerson.en.transcribed.srt |
107 KB |
LASCON/LASCON 2014/Keynote by Chris Nickerson.mp4 |
83 MB |
LASCON/LASCON 2014/Methodology for Creation and Practical Applications of Polyglots.en.transcribed.srt |
70 KB |
LASCON/LASCON 2014/Methodology for Creation and Practical Applications of Polyglots.mp4 |
112.8 MB |
LASCON/LASCON 2014/Multi Factor Authentication Weeding Out the Snake Oil - YouTube.b9398d11-90e1-4328-a815-1c00b6a68369.part |
808.1 MB |
LASCON/LASCON 2014/Multi Factor Authentication Weeding Out the Snake Oil - YouTube.en.transcribed.srt |
78 KB |
LASCON/LASCON 2014/Multi Factor Authentication Weeding Out the Snake Oil - YouTube.mp4 |
101.1 MB |
LASCON/LASCON 2014/OWASP Top 10 Proactive Controls.8946ae81-3997-40ea-98d7-e00f8ba1a8c2.part |
856.9 MB |
LASCON/LASCON 2014/OWASP Top 10 Proactive Controls.en.transcribed.srt |
103 KB |
LASCON/LASCON 2014/OWASP Top 10 Proactive Controls.mp4 |
199.7 MB |
LASCON/LASCON 2014/OpenStack API Security Testing Automation in Action.en.transcribed.srt |
59 KB |
LASCON/LASCON 2014/OpenStack API Security Testing Automation in Action.mp4 |
183.6 MB |
LASCON/LASCON 2014/Practical AppSec Quick Wins for More Secure Software.b0758bea-7d97-4341-9594-0112466bf7e4.part |
678.8 MB |
LASCON/LASCON 2014/Practical AppSec Quick Wins for More Secure Software.en.transcribed.srt |
74 KB |
LASCON/LASCON 2014/Practical AppSec Quick Wins for More Secure Software.mp4 |
107.8 MB |
LASCON/LASCON 2014/Privacy-Re-framing what we think we know.en.transcribed.srt |
100 KB |
LASCON/LASCON 2014/Privacy-Re-framing what we think we know.mp4 |
97.1 MB |
LASCON/LASCON 2014/Risk management for teams that get things done - YouTube.en.transcribed.srt |
71 KB |
LASCON/LASCON 2014/Risk management for teams that get things done - YouTube.mp4 |
93.8 MB |
LASCON/LASCON 2014/Ruby Meta programming Here's how to do it wrong.en.transcribed.srt |
81 KB |
LASCON/LASCON 2014/Ruby Meta programming Here's how to do it wrong.mp4 |
70.9 MB |
LASCON/LASCON 2014/Securing The Android Apps On Your Wrist and Face.3dcb37f7-4dc1-4a9a-b572-a3ccf8c07b56.part |
755.7 MB |
LASCON/LASCON 2014/Securing The Android Apps On Your Wrist and Face.mp4 |
135.7 MB |
LASCON/LASCON 2014/Security Shark Tank.en.transcribed.srt |
89 KB |
LASCON/LASCON 2014/Security Shark Tank.mp4 |
99.4 MB |
LASCON/LASCON 2014/Security from Inception.mp4 |
186.5 MB |
LASCON/LASCON 2014/Seven Grades of Perfect Forward Secrecy.mp4 |
102.5 MB |
LASCON/LASCON 2014/Speed Debates.en.transcribed.srt |
92 KB |
LASCON/LASCON 2014/Speed Debates.mp4 |
209.7 MB |
LASCON/LASCON 2014/The State of Crypto in Python.en.transcribed.srt |
115 KB |
LASCON/LASCON 2014/The State of Crypto in Python.mp4 |
84.5 MB |
LASCON/LASCON 2014/Threat Modeling for Linux Containers LXC, Docker and the Cloud.en.transcribed.srt |
67 KB |
LASCON/LASCON 2014/Threat Modeling for Linux Containers LXC, Docker and the Cloud.mp4 |
59.9 MB |
LASCON/LASCON 2014/Understanding and Implementing Rugged.en.transcribed.srt |
86 KB |
LASCON/LASCON 2014/Understanding and Implementing Rugged.mp4 |
163.5 MB |
LASCON/LASCON 2014/Warning Ahead Security Storms are Brewing in Your JavaScript.en.transcribed.srt |
31 KB |
LASCON/LASCON 2014/Warning Ahead Security Storms are Brewing in Your JavaScript.mp4 |
37.8 MB |
LASCON/LASCON 2014/Welcome to the blue team! How building a better hacker accidentally built a better defender.en.transcribed.srt |
63 KB |
LASCON/LASCON 2014/Welcome to the blue team! How building a better hacker accidentally built a better defender.mp4 |
79 MB |
LASCON/LASCON 2014/What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.en.transcribed.srt |
98 KB |
LASCON/LASCON 2014/What Good is this Tool A Guide to Choosing the Right Application Security Testing Tools.mp4 |
74.6 MB |
LASCON/LASCON 2015/Agile Security The fails that nobody told you about.en.transcribed.srt |
114 KB |
LASCON/LASCON 2015/Agile Security The fails that nobody told you about.mp4 |
103.4 MB |
LASCON/LASCON 2015/Authz is the new Authn Trust Elevation with UMA and OpenID Connect.en.transcribed.srt |
78 KB |
LASCON/LASCON 2015/Authz is the new Authn Trust Elevation with UMA and OpenID Connect.mp4 |
105.1 MB |
LASCON/LASCON 2015/Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.en.transcribed.srt |
96 KB |
LASCON/LASCON 2015/Automate Security Tests for APIs with Syntribos, an Open Source Security Scanner.mp4 |
151.3 MB |
LASCON/LASCON 2015/Big Data, What's the Big Deal.en.transcribed.srt |
89 KB |
LASCON/LASCON 2015/Big Data, What's the Big Deal.mp4 |
96.1 MB |
LASCON/LASCON 2015/Connected Vehicle Security.en.transcribed.srt |
121 KB |
LASCON/LASCON 2015/Connected Vehicle Security.mp4 |
147.2 MB |
LASCON/LASCON 2015/Designing Flexibility in Software to Increase Security.en.transcribed.srt |
102 KB |
LASCON/LASCON 2015/Designing Flexibility in Software to Increase Security.mp4 |
157.2 MB |
LASCON/LASCON 2015/Docker Docker Docker Security Docker.en.transcribed.srt |
93 KB |
LASCON/LASCON 2015/Docker Docker Docker Security Docker.mp4 |
121.2 MB |
LASCON/LASCON 2015/Hack Wars - A New Hope.mp4 |
66.9 MB |
LASCON/LASCON 2015/Hack the Cloud Hack the Company the Cloud Impact on Enterprise Security.en.transcribed.srt |
116 KB |
LASCON/LASCON 2015/Hack the Cloud Hack the Company the Cloud Impact on Enterprise Security.mp4 |
99.6 MB |
LASCON/LASCON 2015/How Google Turned Me Into My Mother The Proxy Paradox In Security.en.transcribed.srt |
95 KB |
LASCON/LASCON 2015/How Google Turned Me Into My Mother The Proxy Paradox In Security.mp4 |
119.6 MB |
LASCON/LASCON 2015/Httpillage Calling all nodes.en.transcribed.srt |
79 KB |
LASCON/LASCON 2015/Httpillage Calling all nodes.mp4 |
109.2 MB |
LASCON/LASCON 2015/It Takes a Village Effective Collaboration in Security.en.transcribed.srt |
102 KB |
LASCON/LASCON 2015/It Takes a Village Effective Collaboration in Security.mp4 |
128.5 MB |
LASCON/LASCON 2015/Keynote Jack Daniel.en.transcribed.srt |
78 KB |
LASCON/LASCON 2015/Keynote Jack Daniel.mp4 |
73.4 MB |
LASCON/LASCON 2015/Keynote Kelly Lum.c20d5203-473a-4c9d-b97c-4f3dc252ef1d.part |
19.6 MB |
LASCON/LASCON 2015/Keynote Kelly Lum.en.transcribed.srt |
75 KB |
LASCON/LASCON 2015/Keynote Kelly Lum.mp4 |
77.2 MB |
LASCON/LASCON 2015/Keynote Pete Cheslock.en.transcribed.srt |
108 KB |
LASCON/LASCON 2015/Keynote Pete Cheslock.mp4 |
57.8 MB |
LASCON/LASCON 2015/MQTT and CoAP A Story about IoT Protocol Security.en.transcribed.srt |
108 KB |
LASCON/LASCON 2015/MQTT and CoAP A Story about IoT Protocol Security.mp4 |
69.4 MB |
LASCON/LASCON 2015/Managing Certificates and TLS Endpoints.en.transcribed.srt |
74 KB |
LASCON/LASCON 2015/Managing Certificates and TLS Endpoints.mp4 |
92.2 MB |
LASCON/LASCON 2015/Mobile Connect – A better and secure user experience for online authentication..en.transcribed.srt |
77 KB |
LASCON/LASCON 2015/Mobile Connect – A better and secure user experience for online authentication..mp4 |
134.3 MB |
LASCON/LASCON 2015/Mobile Landscape The Security of Wearables.en.transcribed.srt |
90 KB |
LASCON/LASCON 2015/Mobile Landscape The Security of Wearables.mp4 |
122 MB |
LASCON/LASCON 2015/New Farming Methods for the Epistemological Wasteland of Application Security.en.transcribed.srt |
120 KB |
LASCON/LASCON 2015/New Farming Methods for the Epistemological Wasteland of Application Security.mp4 |
125.9 MB |
LASCON/LASCON 2015/PHP Security Redefined.en.transcribed.srt |
110 KB |
LASCON/LASCON 2015/PHP Security Redefined.mp4 |
135.2 MB |
LASCON/LASCON 2015/PHP WAF Intercept and Monitor Application Attacks.en.transcribed.srt |
99 KB |
LASCON/LASCON 2015/PHP WAF Intercept and Monitor Application Attacks.mp4 |
139.4 MB |
LASCON/LASCON 2015/Problems you'll face when building a software security program.en.transcribed.srt |
98 KB |
LASCON/LASCON 2015/Problems you'll face when building a software security program.mp4 |
93 MB |
LASCON/LASCON 2015/Rugged Software Engineering - Nick Galbreath.en.transcribed.srt |
85 KB |
LASCON/LASCON 2015/Rugged Software Engineering - Nick Galbreath.mp4 |
63.5 MB |
LASCON/LASCON 2015/Security Automation in the Agile SDLC - Real World Cases.en.transcribed.srt |
84 KB |
LASCON/LASCON 2015/Security Automation in the Agile SDLC - Real World Cases.mp4 |
92.7 MB |
LASCON/LASCON 2015/Security for Non-Unicorns-Ben Hughes.en.transcribed.srt |
96 KB |
LASCON/LASCON 2015/Security for Non-Unicorns-Ben Hughes.mp4 |
125.9 MB |
LASCON/LASCON 2015/Speed Debates.en.transcribed.srt |
99 KB |
LASCON/LASCON 2015/Speed Debates.mp4 |
238.4 MB |
LASCON/LASCON 2015/Static Analysis Security Testing for Dummies… and You.en.transcribed.srt |
128 KB |
LASCON/LASCON 2015/Static Analysis Security Testing for Dummies… and You.mp4 |
142.3 MB |
LASCON/LASCON 2015/Technology, Privacy and the Law New Challenges for Non-Profits.en.transcribed.srt |
93 KB |
LASCON/LASCON 2015/Technology, Privacy and the Law New Challenges for Non-Profits.mp4 |
153.9 MB |
LASCON/LASCON 2015/Testing Modern Applications with Hackazon.en.transcribed.srt |
81 KB |
LASCON/LASCON 2015/Testing Modern Applications with Hackazon.mp4 |
111.3 MB |
LASCON/LASCON 2015/The Culture of Security.en.transcribed.srt |
35 KB |
LASCON/LASCON 2015/The Culture of Security.mp4 |
47.6 MB |
LASCON/LASCON 2015/The Illusion of Control Secrets Within Your Software Supply Chain.en.transcribed.srt |
88 KB |
LASCON/LASCON 2015/The Illusion of Control Secrets Within Your Software Supply Chain.mp4 |
157.6 MB |
LASCON/LASCON 2015/The Node.js Highway Attacks Are At Full Throttle.en.transcribed.srt |
39 KB |
LASCON/LASCON 2015/The Node.js Highway Attacks Are At Full Throttle.mp4 |
74.4 MB |
LASCON/LASCON 2015/What Do You Mean My Security Tools Don’t Work on APIs!!.en.transcribed.srt |
116 KB |
LASCON/LASCON 2015/What Do You Mean My Security Tools Don’t Work on APIs!!.mp4 |
225.8 MB |
LASCON/LASCON 2015/Why Some Multi-Factor Authentication Technology is Irresponsible.en.transcribed.srt |
80 KB |
LASCON/LASCON 2015/Why Some Multi-Factor Authentication Technology is Irresponsible.mp4 |
159.5 MB |
LASCON/LASCON 2015/Your Last Manual Assessment.en.transcribed.srt |
41 KB |
LASCON/LASCON 2015/Your Last Manual Assessment.mp4 |
49.7 MB |
LASCON/LASCON 2016 OWASP Top 10 Free Training/OWASP Top 10 Free Training - LASCON 2016 [3 4].en.transcribed.srt |
184 KB |
LASCON/LASCON 2016 OWASP Top 10 Free Training/OWASP Top 10 Free Training - LASCON 2016 [3 4].mp4 |
153.1 MB |
LASCON/LASCON 2016 OWASP Top 10 Free Training/OWASP Top 10 Free Training - LASCON 2016 [4 4].mp4 |
175.9 MB |
LASCON/LASCON 2016/Architecting a Security Program for the Future - Karen Lu & Josh Sokol.7aa831ae-eaf0-4ded-a5f9-5a3d0b0e907c.part |
845.5 MB |
LASCON/LASCON 2016/Architecting a Security Program for the Future - Karen Lu & Josh Sokol.en.transcribed.srt |
101 KB |
LASCON/LASCON 2016/Architecting a Security Program for the Future - Karen Lu & Josh Sokol.mp4 |
145.3 MB |
LASCON/LASCON 2016/Avoiding Application Security Program Pitfalls - Cap Diebel.en.transcribed.srt |
110 KB |
LASCON/LASCON 2016/Avoiding Application Security Program Pitfalls - Cap Diebel.mp4 |
109.1 MB |
LASCON/LASCON 2016/Be Ready for BeyondCorp enterprise identity, perimeters and your application- Jason Kent.en.transcribed.srt |
72 KB |
LASCON/LASCON 2016/Be Ready for BeyondCorp enterprise identity, perimeters and your application- Jason Kent.mp4 |
56.9 MB |
LASCON/LASCON 2016/Building Information Security Program from Scratch - Josh Sokol.en.transcribed.srt |
127 KB |
LASCON/LASCON 2016/Building Information Security Program from Scratch - Josh Sokol.mp4 |
73.8 MB |
LASCON/LASCON 2016/Could a few links of code f@#k it all up!.en.transcribed.srt |
50 KB |
LASCON/LASCON 2016/Could a few links of code f@#k it all up!.mp4 |
81 MB |
LASCON/LASCON 2016/Cryptography 101 A History and the Basics of Cryptography - Bryant Hagen.en.transcribed.srt |
89 KB |
LASCON/LASCON 2016/Cryptography 101 A History and the Basics of Cryptography - Bryant Hagen.mp4 |
123.3 MB |
LASCON/LASCON 2016/Demystifying a Malware Attack - Christopher Elisan.en.transcribed.srt |
92 KB |
LASCON/LASCON 2016/Demystifying a Malware Attack - Christopher Elisan.mp4 |
88.1 MB |
LASCON/LASCON 2016/Doing Security in 100 milliseconds--The Speed of Serverless Computing.mp4 |
117.6 MB |
LASCON/LASCON 2016/Don't Touch Me That Way - David Linder.en.transcribed.srt |
65 KB |
LASCON/LASCON 2016/Don't Touch Me That Way - David Linder.mp4 |
86.5 MB |
LASCON/LASCON 2016/Easy Mobile Hacking Native and Hybrid Pitfalls - Aaron Guzman.en.transcribed.srt |
86 KB |
LASCON/LASCON 2016/Easy Mobile Hacking Native and Hybrid Pitfalls - Aaron Guzman.mp4 |
143.4 MB |
LASCON/LASCON 2016/Eradicating the Weakest Link in Global Corporation - Tomohisa Ishikawa.mp4 |
59.6 MB |
LASCON/LASCON 2016/Go Purple! Adopt purple team strategy to augment Application Security Programs - Trupti Shiralkar.mp4 |
163.5 MB |
LASCON/LASCON 2016/Hindsight isn't good enough LANGSEC helps you take control of your security - Kunal Anand.4f1ec8e5-84dc-4ba4-99c3-3ade330d562c.part |
809.5 MB |
LASCON/LASCON 2016/Hindsight isn't good enough LANGSEC helps you take control of your security - Kunal Anand.mp4 |
129 MB |
LASCON/LASCON 2016/IOT and AppSec- Jason Kent.mp4 |
151.3 MB |
LASCON/LASCON 2016/Invited Speaker Dave Kennedy.en.transcribed.srt |
133 KB |
LASCON/LASCON 2016/Invited Speaker Dave Kennedy.mp4 |
195.2 MB |
LASCON/LASCON 2016/Invited Speaker Ryan Huber.en.transcribed.srt |
120 KB |
LASCON/LASCON 2016/Invited Speaker Ryan Huber.mp4 |
94.6 MB |
LASCON/LASCON 2016/It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.en.transcribed.srt |
85 KB |
LASCON/LASCON 2016/It's 10pm, Do You Know Where Your Access Keys Are - Ken Johnson.mp4 |
73.5 MB |
LASCON/LASCON 2016/Key Note Shannon Lietz.9073b2d3-cda4-4604-8828-fe3e885b9296.part |
803.3 MB |
LASCON/LASCON 2016/Key Note Shannon Lietz.en.transcribed.srt |
102 KB |
LASCON/LASCON 2016/Key Note Shannon Lietz.mp4 |
158.6 MB |
LASCON/LASCON 2016/LangSec for the Masses - Joe Rozner.en.transcribed.srt |
93 KB |
LASCON/LASCON 2016/LangSec for the Masses - Joe Rozner.mp4 |
83.2 MB |
LASCON/LASCON 2016/Lean Security Ernest Mueller.en.transcribed.srt |
87 KB |
LASCON/LASCON 2016/Lean Security Ernest Mueller.mp4 |
92.7 MB |
LASCON/LASCON 2016/Leveling up your bug bounty program- Charles Valentine.en.transcribed.srt |
92 KB |
LASCON/LASCON 2016/Leveling up your bug bounty program- Charles Valentine.mp4 |
45.6 MB |
LASCON/LASCON 2016/Making Invisible Things Visible Tracking Down Known Vulnerabilities - Derek E. Weeks.en.transcribed.srt |
88 KB |
LASCON/LASCON 2016/Making Invisible Things Visible Tracking Down Known Vulnerabilities - Derek E. Weeks.mp4 |
154.5 MB |
LASCON/LASCON 2016/Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.en.transcribed.srt |
88 KB |
LASCON/LASCON 2016/Making Vulnerability Management Suck Less with a New OWASP Project, DefectDojo - Greg Anderson.mp4 |
126.2 MB |
LASCON/LASCON 2016/Mind the CSP Gap Challenges developing a meaningful Content-Security-Policy - Garett Held.en.transcribed.srt |
78 KB |
LASCON/LASCON 2016/Mind the CSP Gap Challenges developing a meaningful Content-Security-Policy - Garett Held.mp4 |
97.7 MB |
LASCON/LASCON 2016/Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.en.transcribed.srt |
111 KB |
LASCON/LASCON 2016/Monitoring Attack Surface and Integrating Security into DevOps Pipelines- Dan Cornell.mp4 |
127.6 MB |
LASCON/LASCON 2016/Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.en.transcribed.srt |
55 KB |
LASCON/LASCON 2016/Not all HTTPS sites are equally secure, make yours safer - Cassio Goldschmidt.mp4 |
59.7 MB |
LASCON/LASCON 2016/Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.en.transcribed.srt |
88 KB |
LASCON/LASCON 2016/Practical Physical Security Advice for the Modern Enterprise - Daniel Crowley.mp4 |
110.3 MB |
LASCON/LASCON 2016/Scanning IPv4 for Free Data and Free Shells - Jordan Wright.en.transcribed.srt |
107 KB |
LASCON/LASCON 2016/Scanning IPv4 for Free Data and Free Shells - Jordan Wright.mp4 |
139 MB |
LASCON/LASCON 2016/Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.en.transcribed.srt |
101 KB |
LASCON/LASCON 2016/Securing the Spark Fire Hose - Jack Mannino, Abdullah Munawar.mp4 |
76.2 MB |
LASCON/LASCON 2016/Six myths of Information Security - Steve Horstman.en.transcribed.srt |
97 KB |
LASCON/LASCON 2016/Six myths of Information Security - Steve Horstman.mp4 |
104.2 MB |
LASCON/LASCON 2016/Sk8ing in Thin Ice A crash course in Kubernetes & Security- Matt Johansen.en.transcribed.srt |
85 KB |
LASCON/LASCON 2016/Sk8ing in Thin Ice A crash course in Kubernetes & Security- Matt Johansen.mp4 |
75.2 MB |
LASCON/LASCON 2016/Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.en.transcribed.srt |
81 KB |
LASCON/LASCON 2016/Three profiles of OAuth2 for Identity and Access Management - Michael Schwartz.mp4 |
160.9 MB |
LASCON/LASCON 2016/Trusted Execution A Deterministic Approach to AppSec for Zero-Day Threat Prevention - Satya Gupta.mp4 |
121.3 MB |
LASCON/LASCON 2016/What if IOT is Dumped in Your Lap - Chris Walker.mp4 |
184.7 MB |
LASCON/LASCON 2016/Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.en.transcribed.srt |
94 KB |
LASCON/LASCON 2016/Why the LinkedIn hack could be your biggest AppSec threat - Mike Milner.mp4 |
109.5 MB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [3 5].en.transcribed.srt |
184 KB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [3 5].mp4 |
136 MB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [4 5].en.transcribed.srt |
148 KB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [4 5].mp4 |
132 MB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [5 5].en.transcribed.srt |
125 KB |
LASCON/LASCON 2017 OWASP Top 10/OWASP Top 10 @ LASCON 2017 [5 5].mp4 |
83.1 MB |
LASCON/LASCON 2017/A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.en.transcribed.srt |
112 KB |
LASCON/LASCON 2017/A Wake-Up Call - Information Security for Non-Profits, Foundations, and Charities - Kelley Misata.mp4 |
202.1 MB |
LASCON/LASCON 2017/Abusing Normality Data Exfiltration in Plain Site.en.transcribed.srt |
99 KB |
LASCON/LASCON 2017/Abusing Normality Data Exfiltration in Plain Site.mp4 |
206.9 MB |
LASCON/LASCON 2017/AppSec Pipelines and Event-based Security Moving beyond a traditional security test. - Matt Tesauro.en.transcribed.srt |
128 KB |
LASCON/LASCON 2017/AppSec Pipelines and Event-based Security Moving beyond a traditional security test. - Matt Tesauro.mp4 |
109 MB |
LASCON/LASCON 2017/Architecting for Security in the Cloud - Josh Sokol.en.transcribed.srt |
124 KB |
LASCON/LASCON 2017/Architecting for Security in the Cloud - Josh Sokol.mp4 |
97.8 MB |
LASCON/LASCON 2017/Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.en.transcribed.srt |
133 KB |
LASCON/LASCON 2017/Are you ready for my call Responsible Disclosure Preparedness - Jason Kent.mp4 |
189.8 MB |
LASCON/LASCON 2017/Attack Vectors in Biometric Recognition Systems - Clare Nelson.en.transcribed.srt |
109 KB |
LASCON/LASCON 2017/Attack Vectors in Biometric Recognition Systems - Clare Nelson.mp4 |
139.2 MB |
LASCON/LASCON 2017/Breaking into Security - Tommy Dew, Gisela Hinojosa.en.transcribed.srt |
125 KB |
LASCON/LASCON 2017/Breaking into Security - Tommy Dew, Gisela Hinojosa.mp4 |
94.3 MB |
LASCON/LASCON 2017/Cloud Ops MasterClass Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.en.transcribed.srt |
165 KB |
LASCON/LASCON 2017/Cloud Ops MasterClass Lessons learned from cloud automation - Michael Osburn, Nathan Wallace.mp4 |
162.1 MB |
LASCON/LASCON 2017/Core Rule Set for the Masses Lessons from taming ModSecurity rules at massive scale - Tin Zaw.en.transcribed.srt |
132 KB |
LASCON/LASCON 2017/Core Rule Set for the Masses Lessons from taming ModSecurity rules at massive scale - Tin Zaw.mp4 |
119.3 MB |
LASCON/LASCON 2017/Demystifying the Ransomware and IoT Threat - Christopher Elisan.en.transcribed.srt |
92 KB |
LASCON/LASCON 2017/Demystifying the Ransomware and IoT Threat - Christopher Elisan.mp4 |
89 MB |
LASCON/LASCON 2017/From Zero to Zero-Trust Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.en.transcribed.srt |
99 KB |
LASCON/LASCON 2017/From Zero to Zero-Trust Lessons Learned Building a BeyondCorp SSH Proxy - James Barclay.mp4 |
112.7 MB |
LASCON/LASCON 2017/How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.en.transcribed.srt |
86 KB |
LASCON/LASCON 2017/How to Create and Cultivate Community within the Cybersecurity Industry - Jessica Patterson.mp4 |
86 MB |
LASCON/LASCON 2017/How to put Sec in Devops - Igor Matlin.en.transcribed.srt |
62 KB |
LASCON/LASCON 2017/How to put Sec in Devops - Igor Matlin.mp4 |
92.1 MB |
LASCON/LASCON 2017/IOT Assimilation Resistance is Futile - Mark Szewczul.en.transcribed.srt |
152 KB |
LASCON/LASCON 2017/IOT Assimilation Resistance is Futile - Mark Szewczul.mp4 |
148.5 MB |
LASCON/LASCON 2017/Invited Speaker Chris Roberts.en.transcribed.srt |
139 KB |
LASCON/LASCON 2017/Invited Speaker Chris Roberts.mp4 |
212.6 MB |
LASCON/LASCON 2017/IoT and the Security of That Mobile App - Mark Loveless.en.transcribed.srt |
129 KB |
LASCON/LASCON 2017/IoT and the Security of That Mobile App - Mark Loveless.mp4 |
162.8 MB |
LASCON/LASCON 2017/Keynote Chris Nickerson.en.transcribed.srt |
118 KB |
LASCON/LASCON 2017/Keynote Chris Nickerson.mp4 |
97 MB |
LASCON/LASCON 2017/Keynote Georgia Weidman.en.transcribed.srt |
146 KB |
LASCON/LASCON 2017/Keynote Georgia Weidman.mp4 |
169.4 MB |
LASCON/LASCON 2017/Layer 8 and Why People are the Most Important Security Tool.en.transcribed.srt |
113 KB |
LASCON/LASCON 2017/Layer 8 and Why People are the Most Important Security Tool.mp4 |
163.6 MB |
LASCON/LASCON 2017/Leveraging Social Engineering in physical security assessment - Snow.en.transcribed.srt |
138 KB |
LASCON/LASCON 2017/Leveraging Social Engineering in physical security assessment - Snow.mp4 |
105.8 MB |
LASCON/LASCON 2017/Malware Clustering - Srivathsan Srinivasagopalan.en.transcribed.srt |
113 KB |
LASCON/LASCON 2017/Malware Clustering - Srivathsan Srinivasagopalan.mp4 |
103.6 MB |
LASCON/LASCON 2017/No one left behind Security Defense through Gamification including CTFs - Kashish Mittal.mp4 |
92.6 MB |
LASCON/LASCON 2017/OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.en.transcribed.srt |
74 KB |
LASCON/LASCON 2017/OAuth vs. SAML vs. OpenID Connect - Michael Schwartz.mp4 |
156.1 MB |
LASCON/LASCON 2017/Pen Testing for Humans - Rajan Kapoor.en.transcribed.srt |
89 KB |
LASCON/LASCON 2017/Pen Testing for Humans - Rajan Kapoor.mp4 |
122.9 MB |
LASCON/LASCON 2017/Phishing It's Not Just for Pentesters - Joe Gray.en.transcribed.srt |
150 KB |
LASCON/LASCON 2017/Phishing It's Not Just for Pentesters - Joe Gray.mp4 |
181.9 MB |
LASCON/LASCON 2017/Realizing Software Security Maturity The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.en.transcribed.srt |
131 KB |
LASCON/LASCON 2017/Realizing Software Security Maturity The Growing Pains & Gains - Kelby Ludwig, Mark Stanislav.mp4 |
112.4 MB |
LASCON/LASCON 2017/Security Evaluation of Libraries.en.transcribed.srt |
84 KB |
LASCON/LASCON 2017/Security Evaluation of Libraries.mp4 |
134.1 MB |
LASCON/LASCON 2017/Security for DevOps - Shannon Lietz.en.transcribed.srt |
153 KB |
LASCON/LASCON 2017/Security for DevOps - Shannon Lietz.mp4 |
151.3 MB |
LASCON/LASCON 2017/Serverless security A pragmatic primer for builders and defenders - James Wickett.en.transcribed.srt |
146 KB |
LASCON/LASCON 2017/Serverless security A pragmatic primer for builders and defenders - James Wickett.mp4 |
109 MB |
LASCON/LASCON 2017/Startup Security Making Everyone Happy - Michael McCabe, Brian Henderson.en.transcribed.srt |
134 KB |
LASCON/LASCON 2017/Startup Security Making Everyone Happy - Michael McCabe, Brian Henderson.mp4 |
100.9 MB |
LASCON/LASCON 2017/The Rest of the Story Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.en.transcribed.srt |
74 KB |
LASCON/LASCON 2017/The Rest of the Story Securing a Raspberry Pi Home Monitoring System - Laurel Marotta.mp4 |
118.6 MB |
LASCON/LASCON 2017/The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.en.transcribed.srt |
116 KB |
LASCON/LASCON 2017/The Role of Empathy in Vulnerability Disclosure Practices for Software Vendors - Adam Goodman.mp4 |
108.1 MB |
LASCON/LASCON 2017/Threat Modeling For Secure Software Design.en.transcribed.srt |
155 KB |
LASCON/LASCON 2017/Threat Modeling For Secure Software Design.mp4 |
195.6 MB |
LASCON/LASCON 2017/Using Identity to Evolve Application Security - Kevin Paige.en.transcribed.srt |
126 KB |
LASCON/LASCON 2017/Using Identity to Evolve Application Security - Kevin Paige.mp4 |
129.1 MB |
LASCON/LASCON 2017/Where we’re going… we won’t need passwords… - Matt Hajda.en.transcribed.srt |
165 KB |
LASCON/LASCON 2017/Where we’re going… we won’t need passwords… - Matt Hajda.mp4 |
177.9 MB |
LASCON/LASCON 2017/Won't somebody please think of the data! - Sarah-Jane Madden.en.transcribed.srt |
126 KB |
LASCON/LASCON 2017/Won't somebody please think of the data! - Sarah-Jane Madden.mp4 |
210.8 MB |
LASCON/LASCON 2018/Adapting Your AppSec - Brian Glas.en.transcribed.srt |
144 KB |
LASCON/LASCON 2018/Adapting Your AppSec - Brian Glas.mp4 |
119.3 MB |
LASCON/LASCON 2018/Be Prepared - Things you can do today for the brea.en.transcribed.srt |
139 KB |
LASCON/LASCON 2018/Be Prepared - Things you can do today for the brea.mp4 |
113.1 MB |
LASCON/LASCON 2018/Bridging GDPR from your Application to your Cloud (2).en.transcribed.srt |
136 KB |
LASCON/LASCON 2018/Bridging GDPR from your Application to your Cloud (2).mp4 |
133.5 MB |
LASCON/LASCON 2018/Bridging GDPR from your Application to your Cloud.en.transcribed.srt |
73 KB |
LASCON/LASCON 2018/Bridging GDPR from your Application to your Cloud.mp4 |
55.3 MB |
LASCON/LASCON 2018/Building An AppSec Program From The Ground Up An H.en.transcribed.srt |
176 KB |
LASCON/LASCON 2018/Building An AppSec Program From The Ground Up An H.mp4 |
124.6 MB |
LASCON/LASCON 2018/Building Products People Trust Designing Privacy,.en.transcribed.srt |
144 KB |
LASCON/LASCON 2018/Building Products People Trust Designing Privacy,.mp4 |
112.5 MB |
LASCON/LASCON 2018/Conducting Table Top Exercises to Get Your Team Ba.en.transcribed.srt |
165 KB |
LASCON/LASCON 2018/Conducting Table Top Exercises to Get Your Team Ba.mp4 |
126.3 MB |
LASCON/LASCON 2018/Cryptography may or may not protect you - how it i.en.transcribed.srt |
85 KB |
LASCON/LASCON 2018/Cryptography may or may not protect you - how it i.mp4 |
95.1 MB |
LASCON/LASCON 2018/Data Protection at Scale.en.transcribed.srt |
140 KB |
LASCON/LASCON 2018/Data Protection at Scale.mp4 |
117 MB |
LASCON/LASCON 2018/Denial of Trust - The New Attacks - Wendy Nather.en.transcribed.srt |
111 KB |
LASCON/LASCON 2018/Denial of Trust - The New Attacks - Wendy Nather.mp4 |
76.3 MB |
LASCON/LASCON 2018/DevSecOps without DevOps is Just Security.en.transcribed.srt |
166 KB |
LASCON/LASCON 2018/DevSecOps without DevOps is Just Security.mp4 |
145.4 MB |
LASCON/LASCON 2018/Don't @ Me - Hunting Twitter Bots at Scale.en.transcribed.srt |
150 KB |
LASCON/LASCON 2018/Don't @ Me - Hunting Twitter Bots at Scale.mp4 |
117.5 MB |
LASCON/LASCON 2018/Eisenhower and the Internet.en.transcribed.srt |
80 KB |
LASCON/LASCON 2018/Eisenhower and the Internet.mp4 |
41.1 MB |
LASCON/LASCON 2018/Empathy & Vulnerability in SecOps.en.transcribed.srt |
131 KB |
LASCON/LASCON 2018/Empathy & Vulnerability in SecOps.mp4 |
104.4 MB |
LASCON/LASCON 2018/Evolving Your Security Mindset to Embrace DevSecOp.en.transcribed.srt |
132 KB |
LASCON/LASCON 2018/Evolving Your Security Mindset to Embrace DevSecOp.mp4 |
121.3 MB |
LASCON/LASCON 2018/How To Kick Butt in InfoSec Blogging! - Kate Brew.en.transcribed.srt |
107 KB |
LASCON/LASCON 2018/How To Kick Butt in InfoSec Blogging! - Kate Brew.mp4 |
113.7 MB |
LASCON/LASCON 2018/How to Assess the Maturity of your Security Progra.en.transcribed.srt |
89 KB |
LASCON/LASCON 2018/How to Assess the Maturity of your Security Progra.mp4 |
79.8 MB |
LASCON/LASCON 2018/It takes a village to get security right Building.en.transcribed.srt |
107 KB |
LASCON/LASCON 2018/It takes a village to get security right Building.mp4 |
42.4 MB |
LASCON/LASCON 2018/Keynote Jayson Street.en.transcribed.srt |
124 KB |
LASCON/LASCON 2018/Keynote Jayson Street.mp4 |
101.2 MB |
LASCON/LASCON 2018/ML-Based Detection Engine of Device Network Attack.en.transcribed.srt |
112 KB |
LASCON/LASCON 2018/ML-Based Detection Engine of Device Network Attack.mp4 |
124.2 MB |
LASCON/LASCON 2018/Making Continuous Security a Reality with OWASP's.en.transcribed.srt |
100 KB |
LASCON/LASCON 2018/Making Continuous Security a Reality with OWASP's.mp4 |
47.9 MB |
LASCON/LASCON 2018/Microservices Security Landscape - Prabath Siriwar.mp4 |
110.1 MB |
LASCON/LASCON 2018/Orchestrating Security Tools with AWS Step Functio.en.transcribed.srt |
110 KB |
LASCON/LASCON 2018/Orchestrating Security Tools with AWS Step Functio.mp4 |
64.2 MB |
LASCON/LASCON 2018/Pentesting for Developers.en.transcribed.srt |
117 KB |
LASCON/LASCON 2018/Pentesting for Developers.mp4 |
111.1 MB |
LASCON/LASCON 2018/Poking Holes in the Cloud Auditing AWS Security.en.transcribed.srt |
156 KB |
LASCON/LASCON 2018/Poking Holes in the Cloud Auditing AWS Security.mp4 |
123.8 MB |
LASCON/LASCON 2018/Practical DevSecOps – the simple free pipeline any.en.transcribed.srt |
158 KB |
LASCON/LASCON 2018/Practical DevSecOps – the simple free pipeline any.mp4 |
124.5 MB |
LASCON/LASCON 2018/Red Team Pen Testing Panel Discussion.en.transcribed.srt |
166 KB |
LASCON/LASCON 2018/Red Team Pen Testing Panel Discussion.mp4 |
127.1 MB |
LASCON/LASCON 2018/Rethinking Role-Based Security Education - Kat Swe.en.transcribed.srt |
84 KB |
LASCON/LASCON 2018/Rethinking Role-Based Security Education - Kat Swe.mp4 |
41 MB |
LASCON/LASCON 2018/Running at Light Speed Cloud Native Security Patte.en.transcribed.srt |
167 KB |
LASCON/LASCON 2018/Running at Light Speed Cloud Native Security Patte.mp4 |
36.3 MB |
LASCON/LASCON 2018/SEOWNING The Internet Part 2- Robert Hansen.en.transcribed.srt |
149 KB |
LASCON/LASCON 2018/SEOWNING The Internet Part 2- Robert Hansen.mp4 |
116.9 MB |
LASCON/LASCON 2018/Secure Configuration in the Cloud.en.transcribed.srt |
107 KB |
LASCON/LASCON 2018/Secure Configuration in the Cloud.mp4 |
75.7 MB |
LASCON/LASCON 2018/Securing Legacy Applications.en.transcribed.srt |
141 KB |
LASCON/LASCON 2018/Securing Legacy Applications.mp4 |
128.5 MB |
LASCON/LASCON 2018/Securing the Future of TLS - What's new in TLS 1.3.en.transcribed.srt |
102 KB |
LASCON/LASCON 2018/Securing the Future of TLS - What's new in TLS 1.3.mp4 |
72.3 MB |
LASCON/LASCON 2018/Security Testing Is Automation Failing US Heather.en.transcribed.srt |
109 KB |
LASCON/LASCON 2018/Security Testing Is Automation Failing US Heather.mp4 |
84 MB |
LASCON/LASCON 2018/Speed with confidence - Shannon Lietz.en.transcribed.srt |
136 KB |
LASCON/LASCON 2018/Speed with confidence - Shannon Lietz.mp4 |
112.9 MB |
LASCON/LASCON 2018/The DevSecOps Builders Guide to the CI CD PIPELINE.en.transcribed.srt |
150 KB |
LASCON/LASCON 2018/The DevSecOps Builders Guide to the CI CD PIPELINE.mp4 |
113.3 MB |
LASCON/LASCON 2018/The FaaS and the Curious.en.transcribed.srt |
119 KB |
LASCON/LASCON 2018/The FaaS and the Curious.mp4 |
107.5 MB |
LASCON/LASCON 2018/The Mitre ATT&CK Framework is for all of us, and i.en.transcribed.srt |
182 KB |
LASCON/LASCON 2018/The Mitre ATT&CK Framework is for all of us, and i.mp4 |
128.6 MB |
LASCON/LASCON 2018/The White Hat’s Advantage Open-source OWASP tools.en.transcribed.srt |
100 KB |
LASCON/LASCON 2018/The White Hat’s Advantage Open-source OWASP tools.mp4 |
56.4 MB |
LASCON/LASCON 2018/Threat Modeling for IoT Systems.en.transcribed.srt |
156 KB |
LASCON/LASCON 2018/Threat Modeling for IoT Systems.mp4 |
118.8 MB |
LASCON/LASCON 2018/Vulnerability Management You're doing it wrong.en.transcribed.srt |
135 KB |
LASCON/LASCON 2018/Vulnerability Management You're doing it wrong.mp4 |
140.4 MB |
LASCON/LASCON 2018/Year[0] AppSec at a Startup - Leif Dreizler.en.transcribed.srt |
168 KB |
LASCON/LASCON 2018/Year[0] AppSec at a Startup - Leif Dreizler.mp4 |
114.1 MB |
LASCON/LASCON Logo.jpg |
37 KB |
LASCON/LASCON thank you.txt |
760 B |