Jump to content
Nytro

BSides Las Vegas 2016

Recommended Posts

BSLV16

  • BSidesLV
  • 77 videos
  • 446 views
  • Last updated on Nov 17, 2016
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Opening Keynote Pt. I & II - Lorrie Cranor-FTC, Michael Kaiser-NCSA
by BSidesLV
 
   
36:18
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Network Access Control: The Company-Wide Team Building Exercise That Only You Know About - Dean Webb
by BSidesLV
 
   
26:27
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Managing Security with the OWASP Assimilation Project - Alan Robertson
by BSidesLV
 
   
40:17
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Toward Better Password Requirements - Jim Fenton
by BSidesLV
 
   
56:33
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Data Science or Data Pseudo-Science? - Ken Westin
by BSidesLV
 
   
41:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Am The Cavalry (IATC) Introduction and Overview - Joshua Corman
by BSidesLV
 
   
23:33
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Shall We Play a Game? 30 Years of the CFAA - Leonard Bailey, Jen Ellis
by BSidesLV
 
   
1:28:31
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Calling All Hacker Heroes: Go Above And Beyond - Keren Elazari
by BSidesLV
 
   
29:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Intro to Storage Security, Looking Past the Server - Jarett Kulm
by BSidesLV
 
   
24:47
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Are You a PenTexter? - Peter Mosmans, Melanie Rieback
by BSidesLV
 
   
43:41
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Deep Adversarial Architectures for Detecting *and Generating) Maliciousness - Hyrum Anderson
by BSidesLV
 
   
39:09
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Am The Cavalry Panel: Progress on Cyber Safety
by BSidesLV
 
   
35:50
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Welcome to The World of Yesterday, Tomorrow! - Joel Cardella
by BSidesLV
 
   
46:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Breaking the Payment Points of Interaction (POI) - Nir Valtman, Patrick Watson
by BSidesLV
 
   
49:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cyber Safety And Public Policy - I Am The Cavalry, Amanda Craig, Jen Ellis
by BSidesLV
 
   
55:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Security Vulnerabilities, the Current State of Consumer Protection Law, & How IOT Might Change It
by BSidesLV
 
   
23:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  How to Get and Maintain your Compliance without ticking everyone off - Rob Carson
by BSidesLV
 
   
23:13
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  What we've learned with Two-Secret Key Derivation - Jeffrey Goldberg, Julie Haugh
by BSidesLV
 
   
35:32
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Exposing the Neutrino EK: All the Naughty Bits - Ryan Chapman
by BSidesLV
 
   
55:08
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  State Of Healthcare Cyber Safety - Christian Dameff, Colin Morgan, Suzanne Schwartz, BeauWoods
by BSidesLV
 
   
56:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  State Of Automotive Cyber Safety - IATC - Joshua Corman
by BSidesLV
 
   
48:53
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  DNS Hardening - Proactive Net Sec Using F5 iRules and Open Source Analysis Tools - Jim Nitterauer
by BSidesLV
 
   
25:44
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
by BSidesLV
 
   
45:14
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Beyond the Tip of the IceBerg - Fuzzing Binary Protocol for Deeper Code Coverage
by BSidesLV
 
   
46:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  CFPs 101 - Tottenkoph, Guy McDudefella, Security Moey, David Mortman
by BSidesLV
 
   
47:56
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Operation Escalation: How Commodity programs Are Evolving Into Advanced Threats
by BSidesLV
 
   
52:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Evaluating a password manager - Evan Johnson
by BSidesLV
 
   
31:26
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Why does everyone want to kill my passwords? - Mark Burnett
by BSidesLV
 
   
32:11
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  How to make sure your data science isn't vulnerable to attack - Leila Powell
by BSidesLV
 
   
57:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  DYODE: Do Your Own DiodE for Industrial Control Systems - AryKokos, Arnaud Soullie
by BSidesLV
 
   
43:10
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ingress Egress: The emerging threats posed by augmented reality gaming - Andrew Brandt
by BSidesLV
 
   
1:00:45
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ground Truth Keynote: Great Disasters of Machine Learning - Davi Ottenheimer
by BSidesLV
 
   
32:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  IATC Day 2: Introduction and Overview - Joshua Corman, Beau Woods
by BSidesLV
 
   
12:44
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Mapping the Human Attack Surface - Louis DiValentin (Master Chen)
by BSidesLV
 
   
26:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Don't Repeat Yourself: Automating Malware Incident Response for Fun and Profit - Kuba Sendor
by BSidesLV
 
   
29:57
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Crafting tailored wordlists with Wordsmith - Sanjiv Kawa, Tom Porter
by BSidesLV
 
   
47:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone
by BSidesLV
 
   
39:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  A Noobs Intro Into Biohacking, Grinding, DIY Body Augmentation - Doug Copeland
by BSidesLV
 
   
23:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  No Silver Bullet, Multi contextual threat detection via Machine Learning - Rod Soto, Joseph Zadeh
by BSidesLV
 
   
52:34
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Stop the Insanity and Improve Humanity: UX for the Win - Robin Burkett
by BSidesLV
 
   
26:10
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Powershell-Fu - Hunting on the Endpoint - Chris Gerritz
by BSidesLV
 
   
27:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Labeling the VirusShare Corpus: Lessons Learned - John Seymour
by BSidesLV
 
   
30:21
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  There is no security without privacy - Craig Cunningham
by BSidesLV
 
   
30:35
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Survey says…Making progress in the Vulnerability Disclosure Debate - Allan Friedman
by BSidesLV
 
   
1:27:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Domains of Grays - Eric Rand
by BSidesLV
 
   
38:29
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
by BSidesLV
 
   
13:17
 
    no_thumbnail-vfl4t3-4R.jpg  [Private Video]
 
   
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  You Don't See Me - Abusing Whitelists to Hide and Run Malware - Michael Spaling
by BSidesLV
 
   
28:29
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Six Degrees of Domain Admin... - Andy Robbins, Will Schroeder, Rohan Vazarkar
by BSidesLV
 
   
51:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Uncomfortable Approaches - Joshua Corman, Beau Woods
by BSidesLV
 
   
45:37
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
by BSidesLV
 
   
26:37
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  PLC for Home Automation and How It Is as Hackable as a Honeypot - Philippe Lin & Scott Erven
by BSidesLV
 
   
16:22
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  CyPSA Cyber Physical Situational Awareness - Kate Davis, Edmond Rogers
by BSidesLV
 
   
41:12
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Hacking Megatouch Bartop Games - Mark Baseggio
by BSidesLV
 
   
34:54
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Passphrases for Humans: A Cultural Approach to Passphrase Wordlist Generation
by BSidesLV
 
   
58:58
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Is that a penguin in my Windows? - Spencer McIntyre
by BSidesLV
 
   
39:48
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automation Plumbing - Ashley Holtz & Kyle Maxwell
by BSidesLV
 
   
25:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Disclosing Passwords Hashing Policies - Michal Spacek
by BSidesLV
 
   
33:12
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  PAL is your pal: Bootstrapping secrets in Docker - Nick Sullivan
by BSidesLV
 
   
51:00
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Dominating the DBIR Data - Anastasia Atanasoff, Gabriel Bassett
by BSidesLV
 
   
56:15
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  An Evolving Era of Botnet Empires - Andrea Scarfo
by BSidesLV
 
   
28:28
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Building an EmPyre with Python - Steve Borosh Alexander Rymdeko-Harvey, Will Schroeder
by BSidesLV
 
   
50:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Scalability: Not as Easy as it SIEMs - Keith Kraus & grecs
by BSidesLV
 
   
22:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ethical implications of In-Home Robots - Guy McDudefella, Brittany Postnikoff
by BSidesLV
 
   
47:31
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  The Deal with Password Alternatives - Terry Gold
by BSidesLV
 
   
55:15
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  QUESTIONING 42: Where is the "engineering" in the Social Engineering of Namespace Compromises?
by BSidesLV
 
   
1:04:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cross-platform Compatibility: Bringing InfoSec Skills into the World of Computational Biology
by BSidesLV
 
   
31:27
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  One Compromise to Rule Them All - Bryce Kunz
by BSidesLV
 
   
53:00
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  The Future of Bsides - Panel Session
by BSidesLV
 
   
52:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  What's Up Argon2? The Password Hasing Winner A Year Later - JP Aumasson
by BSidesLV
 
   
24:59
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Rock Salt: A Method for Securely Storing and Utilizing Password Validation Data
by BSidesLV
 
   
42:58
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Love my BFF (Brute Force Framework) - Kirk Hayes
by BSidesLV
 
   
24:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Proactive Password Leak Processing - Bruce Marshall
by BSidesLV
 
   
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cruise Line Security Assessment OR Hacking the High Seas - Chad Dewey (Adam Brand)
by BSidesLV
 
   
22:21
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automation of Penetration Testing and the future - Haydn Johnson (Kevin Riggins)
by BSidesLV
 
   
25:20
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Pushing Security from the Outside - Kat Sweet, Chris DeWeese
by BSidesLV
 
   
26:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Why it's all snake oil - and that may be ok - Andrew Morris
by BSidesLV
 
   
46:44

 

Link: https://www.youtube.com/playlist?list=PLjpIlpOLoRNTG3td7JfV1LDinNFLSHJqM

 

  • Upvote 2
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...