ConVerge/ConVerge 2015/Track113-How-to-Dress-Like-a-Human-Being-IRL-Networking-for-Humans-Pt-2-Johnny-Xmas.mp4 |
451.2 MB |
ConVerge/ConVerge 2016/Converge 2016 Intro.srt |
9 KB |
ConVerge/ConVerge 2016/Motown08 Surreal Paradigms Automotive Culture Crash Dave Schaefer.srt |
72 KB |
ConVerge/ConVerge 2016/Hacker05 Game of Hacks Play Hack and Track Joshua Clark.srt |
62 KB |
ConVerge/ConVerge 2016/Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.srt |
60 KB |
ConVerge/ConVerge 2016/Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.mp4 |
80.9 MB |
ConVerge/ConVerge 2016/global00 Keynote 1 Steve Werby.srt |
78 KB |
ConVerge/ConVerge 2016/Motown09 Haking the Next Generation David Schwartzberg.mp4 |
75.5 MB |
ConVerge/ConVerge 2016/Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink (2).e38abc03-4803-401a-bb41-e980d8881102.part |
238.8 MB |
ConVerge/ConVerge 2016/Hacker06 Building a better user Developing a security fluent society Rich Cassara.mp4 |
36.1 MB |
ConVerge/ConVerge 2016/Hacker00 Violating Trust Social Engineering Past and Present Paul Blonsky.srt |
48 KB |
ConVerge/ConVerge 2016/global01 Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.mp4 |
79.2 MB |
ConVerge/ConVerge 2016/Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz (2).1549c741-e8d7-4632-983e-eb4e625e54c4.part |
200.9 MB |
ConVerge/ConVerge 2016/Motown07 Maneuvering Management Madness Andrew Hay.srt |
66 KB |
ConVerge/ConVerge 2016/Motown02 Threat Modeling for Secure Software Design Robert Hurlbut.srt |
67 KB |
ConVerge/ConVerge 2016/Motown04 Evolving the Noise out InfoSec using Law Enforcement Paradigms Charles Herring.mp4 |
52.1 MB |
ConVerge/ConVerge 2016/Hacker01 Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.srt |
86 KB |
ConVerge/ConVerge 2016/Hacker03 Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.mp4 |
76.9 MB |
ConVerge/ConVerge 2016/Motown09 Haking the Next Generation David Schwartzberg (2).5a37035f-df89-4794-ba79-3343d3f222a4.part |
49.6 MB |
ConVerge/ConVerge 2016/Motown01 AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.srt |
82 KB |
ConVerge/ConVerge 2016/Hacker08 Sentry on the Wall Reid Brosko.mp4 |
55.9 MB |
ConVerge/ConVerge 2016/Motown03 MySQL 57 Security Dave Stokes.srt |
38 KB |
ConVerge/ConVerge 2016/Hacker09 Expanding Your Toolbox the DIY Way Chris Maddalena.srt |
48 KB |
ConVerge/ConVerge 2016/Hacker07 Enterprise Class Threat Management Like A Boss Rockie Brockway.srt |
69 KB |
ConVerge/ConVerge 2016/Motown00 So Youve Inherited a Security Department Now What Amanda Berlin.mp4 |
48 MB |
ConVerge/ConVerge 2016/Hacker09 Expanding Your Toolbox the DIY Way Chris Maddalena.mp4 |
36.7 MB |
ConVerge/ConVerge 2016/Hacker07 Enterprise Class Threat Management Like A Boss Rockie Brockway.mp4 |
73.1 MB |
ConVerge/ConVerge 2016/Motown00 So Youve Inherited a Security Department Now What Amanda Berlin.srt |
58 KB |
ConVerge/ConVerge 2016/Motown01 AppSec Awareness A Blue Print for Security Culture Change Chris Romeo.mp4 |
56.9 MB |
ConVerge/ConVerge 2016/Hacker08 Sentry on the Wall Reid Brosko.srt |
53 KB |
ConVerge/ConVerge 2016/Motown03 MySQL 57 Security Dave Stokes.mp4 |
35.7 MB |
ConVerge/ConVerge 2016/Hacker01 Red Team Madness Or How I Learned To Stop Worrying and Expect Pentester Mistakes Jeremy Nie.mp4 |
77.6 MB |
ConVerge/ConVerge 2016/Hacker03 Not Even One Shade of Gray Stop Tolerating Compromise in Security Rich Boyer.srt |
71 KB |
ConVerge/ConVerge 2016/Motown02 Threat Modeling for Secure Software Design Robert Hurlbut.mp4 |
54.9 MB |
ConVerge/ConVerge 2016/global01 Red is the new Blue Defensive Tips Tricks from a Defender turned Pentester Ben Ten.srt |
70 KB |
ConVerge/ConVerge 2016/Hacker00 Violating Trust Social Engineering Past and Present Paul Blonsky.mp4 |
37.8 MB |
ConVerge/ConVerge 2016/Motown07 Maneuvering Management Madness Andrew Hay.mp4 |
64.7 MB |
ConVerge/ConVerge 2016/Hacker05 Game of Hacks Play Hack and Track Joshua Clark.mp4 |
71 MB |
ConVerge/ConVerge 2016/Motown10 Still broken after all these years aka Utility Security for Smarties Doug Nibbelink.mp4 |
65.6 MB |
ConVerge/ConVerge 2016/Hacker10 Malware Magnets A practical walkthrough in developing threat intelligence Tazz Tazz.srt |
49 KB |
ConVerge/ConVerge 2016/global00 Keynote 1 Steve Werby.mp4 |
57 MB |
ConVerge/ConVerge 2016/Motown09 Haking the Next Generation David Schwartzberg.srt |
84 KB |
ConVerge/ConVerge 2016/Hacker06 Building a better user Developing a security fluent society Rich Cassara.srt |
34 KB |
ConVerge/ConVerge 2016/Motown06 Food Fight J Wolfgang Goerlich.mp4 |
38.9 MB |
ConVerge/ConVerge 2016/Converge 2016 Intro.mp4 |
8.6 MB |
ConVerge/ConVerge 2016/Motown08 Surreal Paradigms Automotive Culture Crash Dave Schaefer.mp4 |
89.1 MB |
ConVerge/ConVerge 2015/Track206-The-Path-Well-Traveled-Common-Mistakes-Encountered-with-SIEM-Nick-Jacob.mp4 |
58.3 MB |
ConVerge/ConVerge 2015/Track108-Security-Culture-in-Development-Wolfgang-Goerlich.mp4 |
244.7 MB |
ConVerge/ConVerge 2015/Track202-Four-Pillars-Passion-Vision-Communication-Execution-Edgar-Rojas.mp4 |
60.2 MB |
ConVerge/ConVerge 2015/Track109-Cracking-and-fixing-REST-services-Bill-Sempf.mp4 |
49.5 MB |
ConVerge/ConVerge 2015/Track200-The-Domain-Name-System-DNS-Operation-and-Security-Tom-Kopchak.mp4 |
67.2 MB |
ConVerge/ConVerge 2015/Track211-Application-Security-Awareness-Building-an-Effective-and-Entertaining-Security-Training-Program-Chris-Romeo.mp4 |
71 MB |
ConVerge/ConVerge 2015/Track214-Process-The-Salvation-of-Incident-Response-Charles-Herring.mp4 |
54.9 MB |
ConVerge/ConVerge 2015/Track107-Hiding-in-the-ShaDOS-Richard-Cassara.mp4 |
41.1 MB |
ConVerge/ConVerge 2015/Track212-10-Reasons-Your-Security-Education-Program-Sucks-Kris-French-Jr.mp4 |
60.3 MB |
ConVerge/ConVerge 2015/keynote01-Breaking-in-Bad-Im-the-one-who-doesnt-knock-Jayson-E-Street.mp4 |
92.4 MB |
ConVerge/ConVerge 2015/Track105-Thats-NOT-my-RJ45-Jack-IRL-Networking-for-Humans-Pt-1-Johnny-Xmas.mp4 |
388.8 MB |
ConVerge/ConVerge 2015/Track101-If-My-CICD-Teams-have-Time-for-Security-So-Does-Yours-Kevin-Poniatowski.mp4 |
35.3 MB |
ConVerge/ConVerge 2015/Track111-Clientless-Android-Malware-Control-David-Schwartzberg.mp4 |
74.8 MB |
ConVerge/ConVerge 2015/Track112-who-watches-the-watchers-michael-roytman.mp4 |
50.6 MB |
ConVerge/ConVerge 2015/Track210-Under-the-Unfluence-the-Dark-Side-of-Influence-Ron-Woerner.mp4 |
77.9 MB |
ConVerge/ConVerge 2015/Track110-PVCSec-Live.mp4 |
107.1 MB |
ConVerge/ConVerge 2015/Track102-Adaptive-Monitoring-and-Detection-for-Todays-Landscape-Jamie-Murdock.mp4 |
389.4 MB |
ConVerge/ConVerge 2015/Track213-Shooting-Phish-in-a-Barrel-and-other-bad-fish-puns-Amanda-Berlin.mp4 |
60.7 MB |
ConVerge/ConVerge 2015/keynote-raphael-mudge-hacking-to-get-caught.mp4 |
383.3 MB |
ConVerge/ConVerge 2015/Track209-Adventures-in-Communication-Taming-the-C-Suite-and-Board-Jim-Beechey.mp4 |
65.8 MB |
ConVerge/ConVerge 2015/Track114-Soft-Skills-for-a-Technical-World-Justin-Herman.mp4 |
43.7 MB |
ConVerge/ConVerge 2015/Don-Warnecke-building-the-team-for-a-successful-SOC.mp4 |
77.4 MB |
ConVerge/ConVerge 2015/Track106-On-Defending-Against-Doxxing-Benjamin-Brown.mp4 |
395.4 MB |
ConVerge/ConVerge 2015/Track201-Homebrew-Censorship-Detection-by-Analysis-of-BGP-Data-Zach-Julian.mp4 |
33.7 MB |
ConVerge/ConVerge 2015/Track100-Weaving-Security-into-the-SDLC-Bill-Sempf.mp4 |
69.9 MB |
ConVerge/ConVerge 2015/Track103-Threat-Intelligence-A-Program-Strategy-Approach-Jenn-Black.mp4 |
53 MB |
ConVerge/ConVerge 2015/Track104-Cymon-New-Cyber-Monitoring-Tool-Roy-Firestein.mp4 |
346.9 MB |
ConVerge/ConVerge 2016/Motown06 Food Fight J Wolfgang Goerlich.srt |
49 KB |
ConVerge/ConVerge 2015/Track203-Excuse-me-while-I-BURP-Steve-Motts.mp4 |
64.2 MB |
ConVerge/ConVerge thank you.txt |
592 B |
ConVerge/ConVerge Logo.png |
8 KB |
ConVerge/ConVerge 2017/Converge 2017 102 Prioritize Vulnerability Remediation Amol Sarwate.srt |
110 KB |
ConVerge/ConVerge 2017/Converge 2017 106 How to Transform Developers into Security People Chris Romeo.mp4 |
56.1 MB |
ConVerge/ConVerge 2017/Converge 2017 100 You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.mp4 |
65.2 MB |
ConVerge/ConVerge 2017/Converge 2017 115 New School Security Combat Mindset Mike Behrmann.mp4 |
57.4 MB |
ConVerge/ConVerge 2017/Converge 2017 108 How Much Security Do You Really Need Wendy Nather.mp4 |
33.5 MB |
ConVerge/ConVerge 2017/Converge 2017 107 Predicting Exploitability Michael Roytam.srt |
136 KB |
ConVerge/ConVerge 2017/Converge 2017 105 Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.srt |
146 KB |
ConVerge/ConVerge 2017/Converge 2017 211 Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.mp4 |
49.3 MB |
ConVerge/ConVerge 2017/Converge 2017 206 Fast wins for the defense Justin Herman.mp4 |
39.7 MB |
ConVerge/ConVerge 2017/Converge 2017 114 Misbehaving Networks Daniel Gregory.mp4 |
61.1 MB |
ConVerge/ConVerge 2017/Converge 2017 207 Tarnished Silver Bullets Wolfgang Goerlich.mp4 |
42.9 MB |
ConVerge/ConVerge 2017/Converge 2017 209 Practical Security Recommendations from an Incident Responder Matthew Aubert.mp4 |
13 MB |
ConVerge/ConVerge 2017/Converge 2017 208 AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.srt |
130 KB |
ConVerge/ConVerge 2017/Converge 2017 112 You and Your Technical Community David Giard.srt |
82 KB |
ConVerge/ConVerge 2017/Converge 2017 104 Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.mp4 |
41.3 MB |
ConVerge/ConVerge 2017/Converge 2017 113 CBI Panel.mp4 |
201.3 MB |
ConVerge/ConVerge 2017/Converge 2017 111 The 4 Eyes of Information Security Fernando Montenegro.srt |
65 KB |
ConVerge/ConVerge 2017/Converge 2017 110 A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.mp4 |
34.4 MB |
ConVerge/ConVerge 2017/Converge 2017 103 That Escalated Quickly Shaun Bertrand.mp4 |
62.5 MB |
ConVerge/ConVerge 2017/Converge 2017 200 Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.mp4 |
67.4 MB |
ConVerge/ConVerge 2017/Converge 2017 204 Defending The De funded Keith Wilson.srt |
122 KB |
ConVerge/ConVerge 2017/Converge 2017 203 Threat Modeling 101 Matt Clapham.srt |
127 KB |
ConVerge/ConVerge 2017/Converge 2017 205 You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.mp4 |
32.7 MB |
ConVerge/ConVerge 2017/Converge 2017 201 Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.srt |
135 KB |
ConVerge/ConVerge 2017/Converge 2017 202 How to kick start an application security program Timothy De Block.srt |
146 KB |
ConVerge/ConVerge 2017/Converge 2017 204 Defending The De funded Keith Wilson.mp4 |
44.7 MB |
ConVerge/ConVerge 2017/Converge 2017 203 Threat Modeling 101 Matt Clapham.mp4 |
59.5 MB |
ConVerge/ConVerge 2017/Converge 2017 205 You have UpdatesA look at an old tool making a comeback Evilgrade Reid Brosko.srt |
53 KB |
ConVerge/ConVerge 2017/Converge 2017 201 Stories through Logging It was the best of logs it was the worst of logs Tom Kopch.mp4 |
60.8 MB |
ConVerge/ConVerge 2017/Converge 2017 202 How to kick start an application security program Timothy De Block.mp4 |
71.7 MB |
ConVerge/ConVerge 2017/Converge 2017 103 That Escalated Quickly Shaun Bertrand.srt |
142 KB |
ConVerge/ConVerge 2017/Converge 2017 200 Violent Ruby A Talk for Hackers Forensic Analysts Penetration Testers and Security.srt |
201 KB |
ConVerge/ConVerge 2017/Converge 2017 113 CBI Panel.srt |
165 KB |
ConVerge/ConVerge 2017/Converge 2017 104 Vectors and Victims Analyzing vulnerabilities through disease models Rich Cassara.srt |
88 KB |
ConVerge/ConVerge 2017/Converge 2017 111 The 4 Eyes of Information Security Fernando Montenegro.mp4 |
21.9 MB |
ConVerge/ConVerge 2017/Converge 2017 110 A Top 10 List for Better AppSec Hint Its Not the OWASP Top Ten Dave Ferguson.srt |
107 KB |
ConVerge/ConVerge 2017/Converge 2017 209 Practical Security Recommendations from an Incident Responder Matthew Aubert.srt |
53 KB |
ConVerge/ConVerge 2017/Converge 2017 208 AppSec Behaviors for DevOps Breed Security Culture Change Chris Romeo.mp4 |
30 MB |
ConVerge/ConVerge 2017/Converge 2017 112 You and Your Technical Community David Giard.mp4 |
21.5 MB |
ConVerge/ConVerge 2017/Converge 2017 207 Tarnished Silver Bullets Wolfgang Goerlich.srt |
168 KB |
ConVerge/ConVerge 2017/Converge 2017 114 Misbehaving Networks Daniel Gregory.srt |
130 KB |
ConVerge/ConVerge 2017/Converge 2017 105 Prioritizing IT Security Projects for the Business Martin Bally Steve Barone John.mp4 |
179.9 MB |
ConVerge/ConVerge 2017/Converge 2017 211 Leveraging Vagrant to Quickly Deploy Forsensics Environments Jeff Williams.srt |
120 KB |
ConVerge/ConVerge 2017/Converge 2017 206 Fast wins for the defense Justin Herman.srt |
97 KB |
ConVerge/ConVerge 2017/Converge 2017 102 Prioritize Vulnerability Remediation Amol Sarwate.mp4 |
38.9 MB |
ConVerge/ConVerge 2017/Converge 2017 106 How to Transform Developers into Security People Chris Romeo.srt |
148 KB |
ConVerge/ConVerge 2017/Converge 2017 100 You Are Making Bad Decisions and You Should Feel Bad Joel Cardella.srt |
155 KB |
ConVerge/ConVerge 2017/Converge 2017 115 New School Security Combat Mindset Mike Behrmann.srt |
88 KB |
ConVerge/ConVerge 2017/Converge 2017 107 Predicting Exploitability Michael Roytam.mp4 |
36.5 MB |
ConVerge/ConVerge 2017/Converge 2017 108 How Much Security Do You Really Need Wendy Nather.srt |
108 KB |