GrrCON 2019 Videos
These are the videos of the presentations from GrrCON 2019. Big thanks to P1nkN1ghtmare and EggDropX for having me out, and my video crew (paint27, LizardSlack, BrettAHansen, and ZTC1980) for recording.
Welcome to GrrCON
EggDropX
(Not Recorded)
Keynote
Amanda 'Infosystir' Berlin
Baselining Behavior Tradecraft through Simulations
Dave Kenendy
I PWN thee, I PWN thee not!
Jayson Street
Automating Phishing Analysis
Kyle Eaton
Black Hats & White Collars : Bitcoin, Dark Nets and Insider Trading
Ken Westin
How Nathan Crashed and Burned
Nathan Dragun
Reverse Engineering Malware for N00bs
GregB33f/James
Host-Hunting on a Budget
cyberGoatPsyOps
Keynote
Rachel "Soul Crusher86" G
Atomic Threat Coverage: operationalized ATT&CK
Mikhail Aksenov
(Didn't happen)
Hacking the Boardroom: How to communicate effectively to get your budget
Ryan Wisniewski
Power Detection
Kyle Shattuck
(Didn't happen, see link above for bonus talk)
The Science of Breaking and Entering
Alissa dnsprincess
Inhumane: Making Security Hard on Criminals, Easy on Everyone Else
J Wolfgang Goerlich
(Not Posted)
Bundespwn leak!!!! If you have noting to hide you have nothing to fear......
Arron "Finux" Finnon
(Not Recorded)
Closing Ceremony & Prizes
EggDropX
(Not Recorded)
PSD2, SCA, WTF?!
Kelley Robinson
Nerding out with machine data
Nick Maier
Breaking NBAD and UEBA Detection
Charles Herring
(Not Recorded)
The Past, Present & Future of Cyber Threats
Chris Russell
Symbolically executing a fuzzy tyrant
Lojikil
A Theme of Fear: Hacking the Paradigm
Catherine Ullman
Q&A on our industry and other things that are top of mind
Chris Roberts
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez
Data Access Rights Exploits under New Privacy Laws
Amber Welch
Data Security: How to avoid an embarrassing breach
Matt "mattrix" Hoy
MSSPs are great...and other lies I tell myself
Scott Thomas
Devaluing Cloud Breaches while Gaining Safe Harbor
Eric Wolff
Good Cyber Hygiene and using analytics to drive the need for it on Print
David Rose
Varna: Custom, robust AWS monitoring for cents a day using EQL
Adam Ringwood
Malicious Cryptomining is Exploding: Are you at risk?
John Fatten
Threat Hunting Like a Gutter Punk
Trey Underwood
(Not Recorded)
The Economic's of Cyber Security
Todd White
(Not Recorded)
Dance, Fancybear, Dance: a study in macOS
Cat Self
The Spider Economy: Emotet, Dridex, and TrickBot, Oh My
Adam Hogan
Cloudy with a chance of SecOps
Ricardo Lafosse & Matthew Speakman
Destroy Everything
Tom Somerville
Surfing and Security - Ride the wave
Chris Burrows
The Importance of IT Asset Visibility
Brian Berk
From Idea to Badge: Getting Started & Finished with badge making
Dave Schwartzberg
What Are We Doing Here? Rethinking Security
Jeff Man
How Hackers Evade Your AI-enabled Endpoint Detection Tools
Dan Allen
Hillbilly Storytime - Pentest Fails
Adam Compton
Want to Play a Game..
John DeRyke
The Hacker Hippocampus: Meet your brain on games
Chloe Messdaghi
Departing Employees = Departing Data
Todd Thorsen
Beginner's Guide to Mobile Applications Penetration Testing
Whitney Phillips
The Importance of Relevant, Timely, and Qualitative Intelligence Analysis
Aamil AK
Deepfakes: If anything can be real then nothing is real
April C Wright
Network exploitation of IoT ecosystems
Fotios (ithilgore) Chantzis
Download videos from:
https://archive.org/details/20191026_20191026_2029
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek