These are the videos BSides Boston 2015. Thanks to @plaverty9 for inviting me out to record.
Keynote
The Securitized State: Where it came from, where it's going, what can be done
about it
Molly Sauter
Track 1
Is Threat Modeling for Me?
Robert Hurlbut
Hacker or criminal? Repairing the reputation of the infosec community.
Melanie Ensign
Running Away from Security: Web App Vulnerabilities and OSINT Collide
Micah Hoffman
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management
Program
Paul Asadoorian
Protect Your
"Keys to the Kingdom" _ Securing Against the Next Inevitable
Cyberattack
Paul Kozlov
In pursuit of a better crypto puzzle
Samuel Erb
Track 2
When penguins attack - Linux's role in the malware ecosystem
Chester Wisniewski
The Benefits in Externalizing DMZ-as-a-Service in the Cloud
Israel Barak
Common misconfigurations that lead to a breach
Justin Tharpe
Applying Big Data technology to security use case
Max Pevzner
Marketing: They're not all Schmucks.
Jen Ellis & Josh Feinblum
Next-Gen Incident Management - Building out a Modern Incident Management
Capability
John McDonald
Downloads:
https://archive.org/details/BSidesBoston2015
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek