These are the videos of the presentations from GrrCON 2014. Big thanks to EggDropX and Jaime for having me out, and my video crew (Chris, Steve, Ian, Justine, and other Chris) for recording.
Intro
T-Rex
Around the world in 80 Cons (A tale of perspectives)
Jayson E StreetInfosec in the 21st century
Tim CrothersSecuring our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin JohnsonSocial Engineering Can Kill Me, But It Can’t Make Me Care
Gavin ‘Jac0byterebel’ EwanFinding Our Way – From Pwned to Strategy
David Kennedy (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)Security Hopscotch
Chris Roberts (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x (Likely lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)Look Observe Link (LOL) – How I learned to love OSINT
NinjaSl0th (Half lost due to sound guy not muting music, plan to post to archive.org to see if anyone can clean the tracks)ZitMo NoM
David “HealWHans” SchwartzbergFull Douchesclosure
Duncan ManutsFinux’s Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron ‘Finux’ Finnon
Velociraptor
Beating the Infosec Learning Curve Without Burning Out
Scott ‘secureholio’ ThomasPicking Blackberries
Thomas 'G13' RichardsExercising with Threat Models
J Wolfgang GoerlichSeeing Purple: Hybrid Security Teams for the Enterprise
B31tf4c3CryptoRush – Rising from the Ashes
King DragonAutonomous Remote Hacking Drones
Dr. Phil PolstraProof That Windows Computer Forensics is Sexy
Kyle ‘Chaoticflaws’ AndrusBioHacking: Becoming the Best Me I Can Be
LeonardVulnerable By Design – The Backdoor That Came Through the Front
Matthew ‘mandatory’ BryantOAuth2.0 – It’s the Implementation Stupid!!
Tony MillerBreach Stains
Matt ‘The Streaker’ JohnsonAre you a janitor, or a cleaner?
John ‘geekspeed’ Stauffacher & Matthew ‘Mattrix’ HoyPCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former
Stegosaurus
Advanced Threats and Lateral Movement
Terrance DavisNew World, New Realities: Endpoint threat Detection, Response and Prevention
Brian OrrReducing Your Organization’s Social Engineering Attack Surface
Jen FoxMemory Forensics with Hyper-V Virtual Machines
Wyatt Roersma$#!T My Industry Says. . .
Kellman MeghuBringing PWNED To You: Interesting Honeypot Trends
Elliott BrinkThe Security Implications of Software Defined Networks
Shane PraayLessons from the front lines: Top focus areas for information security leaders
Shogo CottrellHow to budget IDS’s
Brian ‘Arcane’ HeitzmanLEVIATHAN: Command and Control Communications on Planet Earth
Kevin ThompsonRed Teaming: Back and Forth, 5ever
FuzzyNopIntelligence Driven Security
Shane HarschSecurity for the People: End-User Authentication Security on the Internet
Mark StanislavHackers Are People Too
InfosystirBrontosaurus
Hack the Hustle! Career Strategies For Information Security Professionals
Eve AdamsThe Challenge of Natural Security Systems
Rockie BrockwayApplication Pen Testing
Chris PfoutzAdvanced Breaches of 2013 vs. Behavioral Detection
Charles HerringSecurity On The Cheap
Joel CardellaCyber Security Incidents: Red Blue Team
Unc13 Fuck3rExtra
GrrCON Talent Accelerator Program
Abe JonesClosing
Download videos from:
https://archive.org/details/GrrCON2014
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek