CircleCityCon/CircleCityCon 2015/Your-Own-Worst-Enemy-Landing-Your-First-Infosec-Gig-Despite-Yourself-Johnny-Xmas.mp4 |
1.2 GB |
CircleCityCon/CircleCityCon 2014/circlecitycon 101 conference opening.mp4 |
31.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 102 keynote beau woods fixed.mp4 |
141.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 103 containing privileged processes with selinux and pax and attacking hardened system.mp4 |
124.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 104 whitelist is the new black damian profancik.mp4 |
142.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 105 developing a open source threat intelligence program edward mccabe.mp4 |
150.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 106 blurred lines when digital attacks get physical phil grimes.mp4 |
126 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 107 hackers attack anatomy and security trends ted harrington.mp4 |
143.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 108 exploring the target exfiltration malware with sandbox tools adam hogan.mp4 |
137.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 109 from grunt to operator tom gorup.mp4 |
100.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 110 moving the industry forward the purple team david kennedy.mp4 |
107.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 111 software assurance marketplace swamp von welch.mp4 |
145.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 112 owasp top 10 of 2013 it s still a thing and we re still not getting it barry schat.mp4 |
125.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 113 tape loops for industrial control protocols k reid wightman.mp4 |
135.7 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 114 openappid open source next gen firewall with snort adam hogan.mp4 |
131.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 115 challenge of natural security systems rockie brockway.mp4 |
132.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 117 how to create an attack path threat model wolfgang goerlich.mp4 |
143.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 119 are you a janitor or a cleaner john stauffacher matt hoy.mp4 |
78.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 120 ain t no half steppin martin bos.mp4 |
109.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 201 competitive hacking why you should capture the flag steve vittitoe.mp4 |
131.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 202 3 is a magic number or your reality check is about to bounce edward mccabe.mp4 |
123.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 203 the truecrypt audit how it happened and what we found kenneth white.mp4 |
145.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 204 seeing purple hybrid security teams for the enterprise mark kikta beltface.mp4 |
87.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.mp4 |
138 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.srt |
85 KB |
CircleCityCon/CircleCityCon 2014/circlecitycon 206 cognitive bias and critical thinking in open source intelligence osint benjamin br.mp4 |
131.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 208 hackers are people too amanda berlin.mp4 |
88.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 209 gitdigger creating useful wordlists and hashes from github repositories jaime fils.mp4 |
59.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 210 retrocomputing and you machines that made the net pete friedman.mp4 |
48.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 211 doge safes very electronic much fail wow jeff popio.mp4 |
61.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 212 human trafficking in the digital age chris jenks.mp4 |
118 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 213 keys that go bump in the night loak.mp4 |
39.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.mp4 |
76.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.srt |
36 KB |
CircleCityCon/CircleCityCon 2014/circlecitycon 215 ten commandments of incident response for hackers lesley carhart full.mp4 |
88.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 216 threat modeling fear fun and operational james robinson.mp4 |
69.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 217 decrypting communication getting your point across to the masses katherine cook fr.mp4 |
55.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 218 how often should you perform a penetration test jason samide.mp4 |
35.7 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 219 proactive defense eliminating the low hanging fruit matt kelly.mp4 |
115.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 220 active directory real defense for domain admins jason lang.mp4 |
99.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 222 profiling campus crime chris j jason j katelyn c alex h.mp4 |
77.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 223 proper seasoning improves taste james siegel.mp4 |
108 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon closing.mp4 |
136.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon closing.srt |
47 KB |
CircleCityCon/CircleCityCon 2014/Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan.mp4 |
352.8 MB |
CircleCityCon/CircleCityCon 2015/100-Opening-Ceremonies.mp4 |
31.3 MB |
CircleCityCon/CircleCityCon 2015/102-Keynote-SpaceRogue.mp4 |
137.5 MB |
CircleCityCon/CircleCityCon 2015/103-Rethinking-the-Trust-Chain-Auditing-OpenSSL-and-Beyond-Kenneth-White.mp4 |
58.9 MB |
CircleCityCon/CircleCityCon 2015/104-Actionable-Threat-Intelligence-ISIS-and-the-SuperBall-Ian-Amit.mp4 |
71.3 MB |
CircleCityCon/CircleCityCon 2015/105-Security-Culture-in-Development-Wolfgang-Goerlich.mp4 |
90.3 MB |
CircleCityCon/CircleCityCon 2015/106-Simulating-Cyber-Operations-Do-you-want-to-play-a-game-Bryan-Fite.mp4 |
56.4 MB |
CircleCityCon/CircleCityCon 2015/107-Hacking-IIS-and-NET-Kevin-Miller.mp4 |
74.5 MB |
CircleCityCon/CircleCityCon 2015/108-User-Awareness-Were-Doing-It-Wrong-Arlie-Hartman.mp4 |
63.3 MB |
CircleCityCon/CircleCityCon 2015/109-Departmentalizing-Your-SecOps-Tom-Gorup.mp4 |
65.3 MB |
CircleCityCon/CircleCityCon 2015/110-Shooting-Phish-in-a-Barrel-and-Other-Terrible-Fish-Related-Puns-Amanda-Berlin.mp4 |
96.7 MB |
CircleCityCon/CircleCityCon 2015/111-ZitMo-NoM-Clientless-Android-Malware-Control-David-Schwartzberg.mp4 |
71.7 MB |
CircleCityCon/CircleCityCon 2015/112-Data-Loss-Prevention-Where-do-I-start-Jason-Samide.mp4 |
29.7 MB |
CircleCityCon/CircleCityCon 2015/113-Reducing-Your-Organizations-Social-Engineering-Attack-Surface-Jen-Fox.mp4 |
59.1 MB |
CircleCityCon/CircleCityCon 2015/114-1993-BC-Before-Cellphones-Johnny-Xmas.mp4 |
106.8 MB |
CircleCityCon/CircleCityCon 2015/115-Building-a-Comprehensive-Incident-Management-Program-Owen-Creger.mp4 |
87.8 MB |
CircleCityCon/CircleCityCon 2015/115-Is-that-a-psvsvc-in-your-pocket-Jake-Williams.mp4 |
107 MB |
CircleCityCon/CircleCityCon 2015/116-Analyzing-the-Entropy-of-Document-Hidden-Code-Adam-Hogan.mp4 |
69.8 MB |
CircleCityCon/CircleCityCon 2015/117-Making-Androids-Bootable-Recovery-Work-For-You-Drew-Suarez.mp4 |
68.9 MB |
CircleCityCon/CircleCityCon 2015/118-Does-anyone-remember-Enterprise-Security-Architecture-Rockie-Brockway.mp4 |
72.1 MB |
CircleCityCon/CircleCityCon 2015/119-Malware-Armor-Tyler-Halfpop.mp4 |
64.8 MB |
CircleCityCon/CircleCityCon 2015/200-Ruby-Not-just-for-hipster-Carl-Sampson.mp4 |
112.8 MB |
CircleCityCon/CircleCityCon 2015/201-Configure-your-assets-save-your-butt-Caspian-Kilkelly.mp4 |
41.5 MB |
CircleCityCon/CircleCityCon 2015/202-Digital-Supply-Chain-Security-The-Exposed-Flank-Dave-Lewis.mp4 |
65.5 MB |
CircleCityCon/CircleCityCon 2015/203-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4 |
47.6 MB |
CircleCityCon/CircleCityCon 2015/204-Wireless-Intrusion-Detection-System-with-Raspberry-Pi-Chris-Jenks.mp4 |
53.3 MB |
CircleCityCon/CircleCityCon 2015/205-The-Answer-is-42-InfoSec-Data-Visualization-Making-Metric-Magic-Business-Decisions-Edward-McCabe.mp4 |
64.6 MB |
CircleCityCon/CircleCityCon 2015/206-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4 |
70.7 MB |
CircleCityCon/CircleCityCon 2015/207-Lessons-Learned-from-Implementing-Software-Security-Programs-Todd-Grotenhuis.mp4 |
50.7 MB |
CircleCityCon/CircleCityCon 2015/209-Findings-to-date-Cameron-Maerz.mp4 |
52.3 MB |
CircleCityCon/CircleCityCon 2015/211-From-Parking-Lot-to-Pwnage-Brent-White-Tim-Roberts.mp4 |
89.8 MB |
CircleCityCon/CircleCityCon 2015/212-PlagueScanner-An-Open-Source-Multiple-AV-Scanner-Framework-Robert-Simmons.mp4 |
68.8 MB |
CircleCityCon/CircleCityCon 2015/213-How-not-to-Infosec-Dan-Tentler.mp4 |
52.5 MB |
CircleCityCon/CircleCityCon 2015/215-Hacking-the-Jolla-An-Intro-to-Assessing-A-Mobile-Device-Vitaly-McLain-Drew-Suarez.mp4 |
244.4 MB |
CircleCityCon/CircleCityCon 2015/300-Operationalizing-Yara-Chad-Robertson.mp4 |
32.1 MB |
CircleCityCon/CircleCityCon 2015/301-An-Inconvenient-Truth-Security-Monitoring-vs-Privacy-in-the-Workplace-Ana-Orozco.mp4 |
23.2 MB |
CircleCityCon/CircleCityCon 2015/302-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4 |
70.2 MB |
CircleCityCon/CircleCityCon 2015/303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs-part2.mp4 |
81.7 MB |
CircleCityCon/CircleCityCon 2015/303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs.mp4 |
80.2 MB |
CircleCityCon/CircleCityCon 2015/304-Surfing-the-Sea-and-Drowning-in-Tabs-An-Introduction-to-Cross-Site-Request-Forgery-Barry-Schatz.mp4 |
68.5 MB |
CircleCityCon/CircleCityCon 2015/305-Turn-Your-Head-And-Cough-Why-Architecture-Risk-Assessments-Are-Like-Being-A-General-Physician-Nathaniel-Husted.mp4 |
79.3 MB |
CircleCityCon/CircleCityCon 2015/306-OBAMAS-CYBER-SECURITY-PLAN-DISSECTED-Jonathan-Thompson.mp4 |
58.4 MB |
CircleCityCon/CircleCityCon 2015/307-The-Hacker-Community-is-Dead-Long-Live-the-Hacker-Community-Bruce-Potter.mp4 |
79.9 MB |
CircleCityCon/CircleCityCon 2015/308-Square-Peg-Round-Hole-Developing-a-Security-Culture-Within-an-Enterprise-Jeff-Pergal-Stuart-McIntosh.mp4 |
62.1 MB |
CircleCityCon/CircleCityCon 2015/309-Smuggling-Plums-Using-Active-Defnse-techniques-to-hide-your-web-apps-from-your-attackers-and-their-scanners-John-Stauffacher.mp4 |
67.3 MB |
CircleCityCon/CircleCityCon 2015/310-Deploying-Honeypots-To-Gather-Actionable-Threat-Intelligence-James-Taliento.mp4 |
54.8 MB |
CircleCityCon/CircleCityCon 2015/311-Clear-as-FUD-A-look-at-how-confusing-jargon-and-technology-can-create-fear-uncertainty-and-doubt-Chris-Maddalena.mp4 |
66.9 MB |
CircleCityCon/CircleCityCon 2015/312-How-to-Budget-for-IDS-Brian-Heitzman.mp4 |
74.3 MB |
CircleCityCon/CircleCityCon 2015/313-Reverse-Engineering-Windows-AFDsys-Steven-Vittitoe.mp4 |
55.9 MB |
CircleCityCon/CircleCityCon 2015/314-Nepenthes-Netpens-With-Less-Pain-Andy-Schmitz.mp4 |
50.3 MB |
CircleCityCon/CircleCityCon 2015/315-Do-We-Still-Need-Pen-Testing-Jeff-Man.mp4 |
83.4 MB |
CircleCityCon/CircleCityCon 2015/Building-an-Incident-Response-Program-Lesley-Carhart.mp4 |
267.8 MB |
CircleCityCon/CircleCityCon 2015/CircleCity-Con-lock-picking-class-irongeek.mp4 |
221.2 MB |
CircleCityCon/CircleCityCon 2015/Closing.mp4 |
81.8 MB |
CircleCityCon/CircleCityCon 2015/Security-Auditing-Android-Apps-Sam-Bowne.mp4 |
77.1 MB |
CircleCityCon/CircleCityCon 2014/Circle City Con 2014.m3u |
3 KB |
CircleCityCon/CircleCityCon thank you.txt |
670 B |