Circle City Con 2018 Videos
These are the Circle City Con videos. Thanks to the staff for inviting me down to record. Big thanks to @irishjack, @0DDJ0BB, @Ajediday, Jim, @securesomething, @AnarchistDalek, @KitWessendorf, @m3ch4n15m, @Valacia, @songsthatsaved, @mchandleraz, @christinemobes and other for helping set up AV and record.
Opening Ceremonies
Circle City Con Staff
Espionage In The Modern Age of Information Warfare
Scot Terban
The Never Ending Hack: Mental Health in InfoSec Community
Danny Akacki
The Network Night Watch
Eric Rand & Lesley Cahart
Held for Ransom with a Toy Gun
Brian Baskin
Dear Blue Team: Proactive Steps to Supercharge your IR
Joe Gray
CTF Tips and Tricks
Aaron Lintile
Classic Cons in Cryptocurrency
Wolfgang Goerlich & Zachary Sarakun
Weaponzing & Defending against IoT Attacks
Kat Fitzgerald
(not recorded)
Enterprise Vulnerability Management (Assessing, Implementing, and Maintaining)
Derek Milroy
Social Engineering At Work - How to use positive influence to gain management buy-in for anything
April Wright (not posted)
Phishing Forensics - Is it just suspicious or is it malicious?
Matt Scheurer
(audio problems, sorry)
Security Beyond the Security Team: Getting Everyone Involved
Luka Trbojevic
The consequences of lack of security in the Healthcare and how to handle it
Jelena Milosevic
Applying Thermodynamic Principles to Threat Intelligence
Kyle Ehmke
SAEDY: Subversion and Espionage Directed Against You
Judy Towers
How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue
IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics
Jessica Hyde
A Very Particular Set of Skills: Geolocation Techniques For OSINT and Investigation
Chris Kindig
Rise of the Machines
Aamir Lakhani
Backdooring with Metadata
Itzik Kotler
Automahack - Automate going from zero to domain admin with 2 tools
Dan McInerney
Patching - It's Complicated
Cheryl Biswas
Containers: Exploits, Surprises and Security
Elissa Shevinsky
Playing Russian Troll Whack-a-Mole
Courtney Falk
The FaaS and the Curious - AWS Lambda Threat Modeling
Bryan McAninch
Deploying Deceptive Systems: Luring Attackers from the Shadows
Kevin Gennuso
Quick Retooling in .Net for Red Teams
Dimitry Snezhkov
(Re)Thinking Cyber Security Given the Spectre of a Meltdown: (Someone Hold My Beer)
Jeff Man
Carrot vs. Stick: Motivation, Metrics, and Awareness
Magen Wu
Securing without Slowing: DevOps
Wolfgang Goerlich
Operator: The Well-Rounded Hacker
Matthew Curtin
Abuse Case Testing in DevOps
Stephen Deck
GreatSCT: Gotta Catch 'Em AWL
Chris Spehn
Downloads:
https://archive.org/details/CircleCityCon5.0
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek