Feel free to include my content in your page via my RSS feed Follow @irongeek_adc
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment:
BSides Boston 2015 Videos (Hacking Illustrated Series InfoSec Tutorial Videos) BSides Boston 2015 Videos These are the videos BSides Boston 2015. Thanks to @plaverty9 for inviting me out to record. Keynote The Securitized State: Where it came from, where it's going, what can be done about it Molly Sauter Track 1 Is Threat Modeling for Me? Robert Hurlbut Hacker or criminal? Repairing the reputation of the infosec community. Melanie Ensign Running Away from Security: Web App Vulnerabilities and OSINT Collide Micah Hoffman Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program Paul Asadoorian Protect Your "Keys to the Kingdom" _ Securing Against the Next Inevitable Cyberattack Paul Kozlov In pursuit of a better crypto puzzle Samuel Erb Track 2 When penguins attack - Linux's role in the malware ecosystem Chester Wisniewski The Benefits in Externalizing DMZ-as-a-Service in the Cloud Israel Barak Common misconfigurations that lead to a breach Justin Tharpe Applying Big Data technology to security use case Max Pevzner Marketing: They're not all Schmucks. Jen Ellis & Josh Feinblum Next-Gen Incident Management - Building out a Modern Incident Management Capability John McDonald Closing Downloads: https://archive.org/details/BSidesBoston2015
These are the videos BSides Boston 2015. Thanks to @plaverty9 for inviting me out to record.
Keynote
The Securitized State: Where it came from, where it's going, what can be done about it Molly Sauter
Track 1
Is Threat Modeling for Me? Robert Hurlbut
Hacker or criminal? Repairing the reputation of the infosec community. Melanie Ensign
Running Away from Security: Web App Vulnerabilities and OSINT Collide Micah Hoffman
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Program Paul Asadoorian
Protect Your "Keys to the Kingdom" _ Securing Against the Next Inevitable Cyberattack Paul Kozlov
In pursuit of a better crypto puzzle Samuel Erb
Track 2
When penguins attack - Linux's role in the malware ecosystem Chester Wisniewski
The Benefits in Externalizing DMZ-as-a-Service in the Cloud Israel Barak
Common misconfigurations that lead to a breach Justin Tharpe
Applying Big Data technology to security use case Max Pevzner
Marketing: They're not all Schmucks. Jen Ellis & Josh Feinblum
Next-Gen Incident Management - Building out a Modern Incident Management Capability John McDonald
Closing
Downloads: https://archive.org/details/BSidesBoston2015
Printable version of this article
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek Louisville / Kentuckiana Information Security Enthusiast