Jump to content
Nytro

BSides Las Vegas 2016

Recommended Posts

Posted

BSLV16

  • BSidesLV
  • 77 videos
  • 446 views
  • Last updated on Nov 17, 2016
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Opening Keynote Pt. I & II - Lorrie Cranor-FTC, Michael Kaiser-NCSA
by BSidesLV
 
   
36:18
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Network Access Control: The Company-Wide Team Building Exercise That Only You Know About - Dean Webb
by BSidesLV
 
   
26:27
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Managing Security with the OWASP Assimilation Project - Alan Robertson
by BSidesLV
 
   
40:17
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Toward Better Password Requirements - Jim Fenton
by BSidesLV
 
   
56:33
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Data Science or Data Pseudo-Science? - Ken Westin
by BSidesLV
 
   
41:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Am The Cavalry (IATC) Introduction and Overview - Joshua Corman
by BSidesLV
 
   
23:33
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Shall We Play a Game? 30 Years of the CFAA - Leonard Bailey, Jen Ellis
by BSidesLV
 
   
1:28:31
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Calling All Hacker Heroes: Go Above And Beyond - Keren Elazari
by BSidesLV
 
   
29:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Intro to Storage Security, Looking Past the Server - Jarett Kulm
by BSidesLV
 
   
24:47
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Are You a PenTexter? - Peter Mosmans, Melanie Rieback
by BSidesLV
 
   
43:41
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Deep Adversarial Architectures for Detecting *and Generating) Maliciousness - Hyrum Anderson
by BSidesLV
 
   
39:09
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Am The Cavalry Panel: Progress on Cyber Safety
by BSidesLV
 
   
35:50
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Welcome to The World of Yesterday, Tomorrow! - Joel Cardella
by BSidesLV
 
   
46:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Breaking the Payment Points of Interaction (POI) - Nir Valtman, Patrick Watson
by BSidesLV
 
   
49:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cyber Safety And Public Policy - I Am The Cavalry, Amanda Craig, Jen Ellis
by BSidesLV
 
   
55:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Security Vulnerabilities, the Current State of Consumer Protection Law, & How IOT Might Change It
by BSidesLV
 
   
23:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  How to Get and Maintain your Compliance without ticking everyone off - Rob Carson
by BSidesLV
 
   
23:13
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  What we've learned with Two-Secret Key Derivation - Jeffrey Goldberg, Julie Haugh
by BSidesLV
 
   
35:32
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Exposing the Neutrino EK: All the Naughty Bits - Ryan Chapman
by BSidesLV
 
   
55:08
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  State Of Healthcare Cyber Safety - Christian Dameff, Colin Morgan, Suzanne Schwartz, BeauWoods
by BSidesLV
 
   
56:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  State Of Automotive Cyber Safety - IATC - Joshua Corman
by BSidesLV
 
   
48:53
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  DNS Hardening - Proactive Net Sec Using F5 iRules and Open Source Analysis Tools - Jim Nitterauer
by BSidesLV
 
   
25:44
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
by BSidesLV
 
   
45:14
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Beyond the Tip of the IceBerg - Fuzzing Binary Protocol for Deeper Code Coverage
by BSidesLV
 
   
46:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  CFPs 101 - Tottenkoph, Guy McDudefella, Security Moey, David Mortman
by BSidesLV
 
   
47:56
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Operation Escalation: How Commodity programs Are Evolving Into Advanced Threats
by BSidesLV
 
   
52:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Evaluating a password manager - Evan Johnson
by BSidesLV
 
   
31:26
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Why does everyone want to kill my passwords? - Mark Burnett
by BSidesLV
 
   
32:11
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  How to make sure your data science isn't vulnerable to attack - Leila Powell
by BSidesLV
 
   
57:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  DYODE: Do Your Own DiodE for Industrial Control Systems - AryKokos, Arnaud Soullie
by BSidesLV
 
   
43:10
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ingress Egress: The emerging threats posed by augmented reality gaming - Andrew Brandt
by BSidesLV
 
   
1:00:45
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ground Truth Keynote: Great Disasters of Machine Learning - Davi Ottenheimer
by BSidesLV
 
   
32:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  IATC Day 2: Introduction and Overview - Joshua Corman, Beau Woods
by BSidesLV
 
   
12:44
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Mapping the Human Attack Surface - Louis DiValentin (Master Chen)
by BSidesLV
 
   
26:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Don't Repeat Yourself: Automating Malware Incident Response for Fun and Profit - Kuba Sendor
by BSidesLV
 
   
29:57
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Crafting tailored wordlists with Wordsmith - Sanjiv Kawa, Tom Porter
by BSidesLV
 
   
47:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Hunting high-value targets in corporate networks - Patrick Fussell, Josh Stone
by BSidesLV
 
   
39:07
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  A Noobs Intro Into Biohacking, Grinding, DIY Body Augmentation - Doug Copeland
by BSidesLV
 
   
23:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  No Silver Bullet, Multi contextual threat detection via Machine Learning - Rod Soto, Joseph Zadeh
by BSidesLV
 
   
52:34
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Stop the Insanity and Improve Humanity: UX for the Win - Robin Burkett
by BSidesLV
 
   
26:10
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Powershell-Fu - Hunting on the Endpoint - Chris Gerritz
by BSidesLV
 
   
27:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Labeling the VirusShare Corpus: Lessons Learned - John Seymour
by BSidesLV
 
   
30:21
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  There is no security without privacy - Craig Cunningham
by BSidesLV
 
   
30:35
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Survey says…Making progress in the Vulnerability Disclosure Debate - Allan Friedman
by BSidesLV
 
   
1:27:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Domains of Grays - Eric Rand
by BSidesLV
 
   
38:29
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automated Dorking for Fun and Pr^wSalary - Filip Reesalu
by BSidesLV
 
   
13:17
 
    no_thumbnail-vfl4t3-4R.jpg  [Private Video]
 
   
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  You Don't See Me - Abusing Whitelists to Hide and Run Malware - Michael Spaling
by BSidesLV
 
   
28:29
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Six Degrees of Domain Admin... - Andy Robbins, Will Schroeder, Rohan Vazarkar
by BSidesLV
 
   
51:51
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Uncomfortable Approaches - Joshua Corman, Beau Woods
by BSidesLV
 
   
45:37
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Latest evasion techniques in fileless malware - fl3uryz & Andrew Hay
by BSidesLV
 
   
26:37
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  PLC for Home Automation and How It Is as Hackable as a Honeypot - Philippe Lin & Scott Erven
by BSidesLV
 
   
16:22
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  CyPSA Cyber Physical Situational Awareness - Kate Davis, Edmond Rogers
by BSidesLV
 
   
41:12
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Hacking Megatouch Bartop Games - Mark Baseggio
by BSidesLV
 
   
34:54
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Passphrases for Humans: A Cultural Approach to Passphrase Wordlist Generation
by BSidesLV
 
   
58:58
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Is that a penguin in my Windows? - Spencer McIntyre
by BSidesLV
 
   
39:48
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automation Plumbing - Ashley Holtz & Kyle Maxwell
by BSidesLV
 
   
25:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Disclosing Passwords Hashing Policies - Michal Spacek
by BSidesLV
 
   
33:12
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  PAL is your pal: Bootstrapping secrets in Docker - Nick Sullivan
by BSidesLV
 
   
51:00
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Dominating the DBIR Data - Anastasia Atanasoff, Gabriel Bassett
by BSidesLV
 
   
56:15
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  An Evolving Era of Botnet Empires - Andrea Scarfo
by BSidesLV
 
   
28:28
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Building an EmPyre with Python - Steve Borosh Alexander Rymdeko-Harvey, Will Schroeder
by BSidesLV
 
   
50:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Scalability: Not as Easy as it SIEMs - Keith Kraus & grecs
by BSidesLV
 
   
22:38
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Ethical implications of In-Home Robots - Guy McDudefella, Brittany Postnikoff
by BSidesLV
 
   
47:31
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  The Deal with Password Alternatives - Terry Gold
by BSidesLV
 
   
55:15
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  QUESTIONING 42: Where is the "engineering" in the Social Engineering of Namespace Compromises?
by BSidesLV
 
   
1:04:23
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cross-platform Compatibility: Bringing InfoSec Skills into the World of Computational Biology
by BSidesLV
 
   
31:27
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  One Compromise to Rule Them All - Bryce Kunz
by BSidesLV
 
   
53:00
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  The Future of Bsides - Panel Session
by BSidesLV
 
   
52:46
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  What's Up Argon2? The Password Hasing Winner A Year Later - JP Aumasson
by BSidesLV
 
   
24:59
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Rock Salt: A Method for Securely Storing and Utilizing Password Validation Data
by BSidesLV
 
   
42:58
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  I Love my BFF (Brute Force Framework) - Kirk Hayes
by BSidesLV
 
   
24:06
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Proactive Password Leak Processing - Bruce Marshall
by BSidesLV
 
   
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Cruise Line Security Assessment OR Hacking the High Seas - Chad Dewey (Adam Brand)
by BSidesLV
 
   
22:21
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Automation of Penetration Testing and the future - Haydn Johnson (Kevin Riggins)
by BSidesLV
 
   
25:20
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Pushing Security from the Outside - Kat Sweet, Chris DeWeese
by BSidesLV
 
   
26:19
 
    hqdefault.jpg?custom=true&w=120&h=90&jpg  Why it's all snake oil - and that may be ok - Andrew Morris
by BSidesLV
 
   
46:44

 

Link: https://www.youtube.com/playlist?list=PLjpIlpOLoRNTG3td7JfV1LDinNFLSHJqM

 

  • Upvote 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...