CircleCityCon/CircleCityCon 2014/Executive Management Manaing the Executives Beau Woods & Engaging the Media API Steve Ragan.mp4 |
383.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 101 conference opening 35.mp4 |
34.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 101 conference opening.mp4 |
38.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 102 keynote beau woods fixed.mp4 |
181.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 103 containing privileged processes with selinux and pax and attacking hardened system.mp4 |
139.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 104 whitelist is the new black damian profancik.mp4 |
162.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 105 developing a open source threat intelligence program edward mccabe.mp4 |
185.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 106 blurred lines when digital attacks get physical phil grimes.mp4 |
153.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 107 hackers attack anatomy and security trends ted harrington.mp4 |
177 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 108 exploring the target exfiltration malware with sandbox tools adam hogan.mp4 |
177.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 109 from grunt to operator tom gorup.mp4 |
119.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 110 moving the industry forward the purple team david kennedy.mp4 |
151.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 111 software assurance marketplace swamp von welch.mp4 |
160.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 112 owasp top 10 of 2013 it s still a thing and we re still not getting it barry schat.mp4 |
134.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 113 tape loops for industrial control protocols k reid wightman.mp4 |
142.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 114 openappid open source next gen firewall with snort adam hogan.mp4 |
167.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 115 challenge of natural security systems rockie brockway.mp4 |
161.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 117 how to create an attack path threat model wolfgang goerlich.mp4 |
155.3 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 119 are you a janitor or a cleaner john stauffacher matt hoy.mp4 |
118.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 120 ain t no half steppin martin bos.mp4 |
138.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 201 competitive hacking why you should capture the flag steve vittitoe.mp4 |
140.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 202 3 is a magic number or your reality check is about to bounce edward mccabe.mp4 |
143.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 203 the truecrypt audit how it happened and what we found kenneth white.mp4 |
172.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 204 seeing purple hybrid security teams for the enterprise mark kikta beltface.mp4 |
128.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.mp4 |
142.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 205 eyes on izon surveilling ip camera security mark stanislav.srt |
85 KB |
CircleCityCon/CircleCityCon 2014/circlecitycon 206 cognitive bias and critical thinking in open source intelligence osint benjamin br.mp4 |
163.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 208 hackers are people too amanda berlin.mp4 |
110.9 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 209 gitdigger creating useful wordlists and hashes from github repositories jaime fils.mp4 |
64.2 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 210 retrocomputing and you machines that made the net pete friedman.mp4 |
56.7 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 211 doge safes very electronic much fail wow jeff popio.mp4 |
72.5 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 212 human trafficking in the digital age chris jenks.mp4 |
32.6 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 213 keys that go bump in the night loak.mp4 |
56.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.mp4 |
92.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 214 how hackers for charity possibly saved me a lot of money branden miller & emily mi.srt |
36 KB |
CircleCityCon/CircleCityCon 2014/circlecitycon 215 ten commandments of incident response for hackers lesley carhart full.mp4 |
123 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 216 threat modeling fear fun and operational james robinson.mp4 |
113.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 217 decrypting communication getting your point across to the masses katherine cook fr.mp4 |
65.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 218 how often should you perform a penetration test jason samide.mp4 |
39 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 219 proactive defense eliminating the low hanging fruit matt kelly.mp4 |
150.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 220 active directory real defense for domain admins jason lang.mp4 |
122.4 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 222 profiling campus crime chris j jason j katelyn c alex h.mp4 |
109.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon 223 proper seasoning improves taste james siegel.mp4 |
148.1 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon closing.mp4 |
147.8 MB |
CircleCityCon/CircleCityCon 2014/circlecitycon closing.srt |
47 KB |
CircleCityCon/CircleCityCon 2015/100-Opening-Ceremonies.mp4 |
40.9 MB |
CircleCityCon/CircleCityCon 2015/102-Keynote-SpaceRogue.mp4 |
150.4 MB |
CircleCityCon/CircleCityCon 2015/103-Rethinking-the-Trust-Chain-Auditing-OpenSSL-and-Beyond-Kenneth-White.mp4 |
80.2 MB |
CircleCityCon/CircleCityCon 2015/104-Actionable-Threat-Intelligence-ISIS-and-the-SuperBall-Ian-Amit.mp4 |
78.4 MB |
CircleCityCon/CircleCityCon 2015/105-Security-Culture-in-Development-Wolfgang-Goerlich.mp4 |
93.3 MB |
CircleCityCon/CircleCityCon 2015/106-Simulating-Cyber-Operations-Do-you-want-to-play-a-game-Bryan-Fite.mp4 |
63.9 MB |
CircleCityCon/CircleCityCon 2015/107-Hacking-IIS-and-NET-Kevin-Miller.mp4 |
81.8 MB |
CircleCityCon/CircleCityCon 2015/108-User-Awareness-Were-Doing-It-Wrong-Arlie-Hartman.mp4 |
70.4 MB |
CircleCityCon/CircleCityCon 2015/109-Departmentalizing-Your-SecOps-Tom-Gorup.mp4 |
85.9 MB |
CircleCityCon/CircleCityCon 2015/110-Shooting-Phish-in-a-Barrel-and-Other-Terrible-Fish-Related-Puns-Amanda-Berlin.mp4 |
100.5 MB |
CircleCityCon/CircleCityCon 2015/111-ZitMo-NoM-Clientless-Android-Malware-Control-David-Schwartzberg.mp4 |
93.6 MB |
CircleCityCon/CircleCityCon 2015/112-Data-Loss-Prevention-Where-do-I-start-Jason-Samide.mp4 |
32.9 MB |
CircleCityCon/CircleCityCon 2015/113-Reducing-Your-Organizations-Social-Engineering-Attack-Surface-Jen-Fox.mp4 |
64.3 MB |
CircleCityCon/CircleCityCon 2015/114-1993-BC-Before-Cellphones-Johnny-Xmas.mp4 |
109.6 MB |
CircleCityCon/CircleCityCon 2015/115-Building-a-Comprehensive-Incident-Management-Program-Owen-Creger.mp4 |
100 MB |
CircleCityCon/CircleCityCon 2015/115-Is-that-a-psvsvc-in-your-pocket-Jake-Williams.mp4 |
106.9 MB |
CircleCityCon/CircleCityCon 2015/116-Analyzing-the-Entropy-of-Document-Hidden-Code-Adam-Hogan.mp4 |
81.5 MB |
CircleCityCon/CircleCityCon 2015/117-Making-Androids-Bootable-Recovery-Work-For-You-Drew-Suarez.mp4 |
85.5 MB |
CircleCityCon/CircleCityCon 2015/118-Does-anyone-remember-Enterprise-Security-Architecture-Rockie-Brockway.mp4 |
76.2 MB |
CircleCityCon/CircleCityCon 2015/119-Malware-Armor-Tyler-Halfpop.mp4 |
72 MB |
CircleCityCon/CircleCityCon 2015/200-Ruby-Not-just-for-hipster-Carl-Sampson.mp4 |
20 MB |
CircleCityCon/CircleCityCon 2015/201-Configure-your-assets-save-your-butt-Caspian-Kilkelly.mp4 |
45.1 MB |
CircleCityCon/CircleCityCon 2015/202-Digital-Supply-Chain-Security-The-Exposed-Flank-Dave-Lewis.mp4 |
64.7 MB |
CircleCityCon/CircleCityCon 2015/203-I-Amateur-Radio-And-So-Can-You-Kat-Sweet.mp4 |
54.3 MB |
CircleCityCon/CircleCityCon 2015/204-Wireless-Intrusion-Detection-System-with-Raspberry-Pi-Chris-Jenks.mp4 |
66 MB |
CircleCityCon/CircleCityCon 2015/205-The-Answer-is-42-InfoSec-Data-Visualization-Making-Metric-Magic-Business-Decisions-Edward-McCabe.mp4 |
94.5 MB |
CircleCityCon/CircleCityCon 2015/206-Running-Away-from-Security-Web-App-Vulnerabilities-and-OSINT-Collide-Micah-Hoffman.mp4 |
87.8 MB |
CircleCityCon/CircleCityCon 2015/207-Lessons-Learned-from-Implementing-Software-Security-Programs-Todd-Grotenhuis.mp4 |
62.9 MB |
CircleCityCon/CircleCityCon 2015/209-Findings-to-date-Cameron-Maerz.mp4 |
59.9 MB |
CircleCityCon/CircleCityCon 2015/211-From-Parking-Lot-to-Pwnage-Brent-White-Tim-Roberts.mp4 |
98.9 MB |
CircleCityCon/CircleCityCon 2015/212-PlagueScanner-An-Open-Source-Multiple-AV-Scanner-Framework-Robert-Simmons.mp4 |
70.5 MB |
CircleCityCon/CircleCityCon 2015/213-How-not-to-Infosec-Dan-Tentler.mp4 |
59.9 MB |
CircleCityCon/CircleCityCon 2015/215-Hacking-the-Jolla-An-Intro-to-Assessing-A-Mobile-Device-Vitaly-McLain-Drew-Suarez.mp4 |
55.5 MB |
CircleCityCon/CircleCityCon 2015/300-Operationalizing-Yara-Chad-Robertson.mp4 |
38.5 MB |
CircleCityCon/CircleCityCon 2015/301-An-Inconvenient-Truth-Security-Monitoring-vs-Privacy-in-the-Workplace-Ana-Orozco.mp4 |
27 MB |
CircleCityCon/CircleCityCon 2015/302-From-Blue-To-Red-What-Matters-and-What-Really-Doesnt-Jason-Lang.mp4 |
90.3 MB |
CircleCityCon/CircleCityCon 2015/303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs-part2.mp4 |
96.7 MB |
CircleCityCon/CircleCityCon 2015/303-Using-Evernote-as-an-Threat-Intelligence-Management-Platform-Grecs.mp4 |
96.9 MB |
CircleCityCon/CircleCityCon 2015/304-Surfing-the-Sea-and-Drowning-in-Tabs-An-Introduction-to-Cross-Site-Request-Forgery-Barry-Schatz.mp4 |
82 MB |
CircleCityCon/CircleCityCon 2015/305-Turn-Your-Head-And-Cough-Why-Architecture-Risk-Assessments-Are-Like-Being-A-General-Physician-Nathaniel-Husted.mp4 |
84.6 MB |
CircleCityCon/CircleCityCon 2015/306-OBAMAS-CYBER-SECURITY-PLAN-DISSECTED-Jonathan-Thompson.mp4 |
62 MB |
CircleCityCon/CircleCityCon 2015/307-The-Hacker-Community-is-Dead-Long-Live-the-Hacker-Community-Bruce-Potter.mp4 |
77.9 MB |
CircleCityCon/CircleCityCon 2015/308-Square-Peg-Round-Hole-Developing-a-Security-Culture-Within-an-Enterprise-Jeff-Pergal-Stuart-McIntosh.mp4 |
81.7 MB |
CircleCityCon/CircleCityCon 2015/309-Smuggling-Plums-Using-Active-Defnse-techniques-to-hide-your-web-apps-from-your-attackers-and-their-scanners-John-Stauffacher.mp4 |
85.2 MB |
CircleCityCon/CircleCityCon 2015/310-Deploying-Honeypots-To-Gather-Actionable-Threat-Intelligence-James-Taliento.mp4 |
65.2 MB |
CircleCityCon/CircleCityCon 2015/311-Clear-as-FUD-A-look-at-how-confusing-jargon-and-technology-can-create-fear-uncertainty-and-doubt-Chris-Maddalena.mp4 |
66.8 MB |
CircleCityCon/CircleCityCon 2015/312-How-to-Budget-for-IDS-Brian-Heitzman.mp4 |
72.3 MB |
CircleCityCon/CircleCityCon 2015/313-Reverse-Engineering-Windows-AFDsys-Steven-Vittitoe.mp4 |
55.3 MB |
CircleCityCon/CircleCityCon 2015/314-Nepenthes-Netpens-With-Less-Pain-Andy-Schmitz.mp4 |
61 MB |
CircleCityCon/CircleCityCon 2015/315-Do-We-Still-Need-Pen-Testing-Jeff-Man.mp4 |
111.3 MB |
CircleCityCon/CircleCityCon 2015/Building-an-Incident-Response-Program-Lesley-Carhart.mp4 |
347.7 MB |
CircleCityCon/CircleCityCon 2015/CircleCity-Con-lock-picking-class-irongeek.mp4 |
270.8 MB |
CircleCityCon/CircleCityCon 2015/Closing.mp4 |
110.3 MB |
CircleCityCon/CircleCityCon 2015/Security-Auditing-Android-Apps-Sam-Bowne.mp4 |
91.9 MB |
CircleCityCon/CircleCityCon 2015/Your-Own-Worst-Enemy-Landing-Your-First-Infosec-Gig-Despite-Yourself-Johnny-Xmas.mp4 |
282.7 MB |
CircleCityCon/CircleCityCon 2016/101-Keynote-Dave-Lewis-Dave-Lewis.mp4 |
67 MB |
CircleCityCon/CircleCityCon 2016/102-Food-Fight-Wolfgang-Goerlich.mp4 |
87.2 MB |
CircleCityCon/CircleCityCon 2016/103-IoT-on-Easy-Mode-Reversing-and-Exploiting-Embedded-Devices-Elvis-Collado.mp4 |
73.5 MB |
CircleCityCon/CircleCityCon 2016/105-Break-on-Through-to-the-Other-Side-Grape-Ape.mp4 |
108.9 MB |
CircleCityCon/CircleCityCon 2016/106-Creating-a-Successful-Collegiate-Security-Club-Adam-Ringwood-and-Chris-Spehn.mp4 |
54.2 MB |
CircleCityCon/CircleCityCon 2016/107-Now-You-See-Me-Now-You-Dont-Leaving-your-Digital-Footprint-Aamir-Lakhani.mp4 |
69.8 MB |
CircleCityCon/CircleCityCon 2016/108-Red-Team-Madness-Or-How-I-Learned-To-Stop-Worrying-and-Expect-Pentester-Mistakes-Jeremy-Nielson.mp4 |
84.7 MB |
CircleCityCon/CircleCityCon 2016/110-Top-10-Mistakes-in-Security-Operations-Centers-Incident-Handling-Response-Paul-R-Jorgensen.mp4 |
102.5 MB |
CircleCityCon/CircleCityCon 2016/111-Head-in-the-Sand-Defence-or-A-Stuxnet-for-Mainframes-Haydn-Johnson-Cheryl-Biswas.mp4 |
68 MB |
CircleCityCon/CircleCityCon 2016/112-Haking-the-Next-Generation-David-Schwartzberg.mp4 |
87.9 MB |
CircleCityCon/CircleCityCon 2016/114-Hacking-Our-Way-Into-Hacking-Kat-Sweet.mp4 |
82.8 MB |
CircleCityCon/CircleCityCon 2016/114-Your-Password-Policy-Still-Sucks-Martin-Bos.mp4 |
95.1 MB |
CircleCityCon/CircleCityCon 2016/115-Closing-Ceremony-CircleCityCon-Staff.mp4 |
88.5 MB |
CircleCityCon/CircleCityCon 2016/201-Bootstrapping-A-Security-Research-Project-Andrew-Hay.mp4 |
66.6 MB |
CircleCityCon/CircleCityCon 2016/202-Planes-Trains-and-Automobiles-The-Internet-of-Deadly-Things-Bryan-K-Fite.mp4 |
65.3 MB |
CircleCityCon/CircleCityCon 2016/203-Open-Source-Malware-Lab-Robert-Simmons.mp4 |
105.6 MB |
CircleCityCon/CircleCityCon 2016/204-Title-You-want-to-put-whatwhere-John-Stauffacher.mp4 |
35.5 MB |
CircleCityCon/CircleCityCon 2016/205-Untrusted-Onions-Is-Tor-Broken-Joshua-Galloway.mp4 |
42.2 MB |
CircleCityCon/CircleCityCon 2016/206-SIEM-Supersized-Walleed-Aljony.mp4 |
47.6 MB |
CircleCityCon/CircleCityCon 2016/208-Attacking-OSX-for-fun-and-profit-Toolset-Limitations-Frustration-and-Table-Flipping-Viss-Tentler.mp4 |
90.1 MB |
CircleCityCon/CircleCityCon 2016/300-Why-its-all-snake-oil-and-that-may-be-ok-Pablo-Breuer.mp4 |
69.2 MB |
CircleCityCon/CircleCityCon 2016/301-Playing-Doctor-Lessons-the-Blue-Team-Can-Learn-from-Patient-Engagement-Wolfgang-Goerlich.mp4 |
78.3 MB |
CircleCityCon/CircleCityCon 2016/302-Killing-you-softly-Josh-Bressers.mp4 |
58.5 MB |
CircleCityCon/CircleCityCon 2016/303-So-you-want-to-be-a-CISO-Von-Welch.mp4 |
52 MB |
CircleCityCon/CircleCityCon 2016/305-Contextual-Threat-Intelligence-Building-a-Data-Science-Capability-into-the-Hunt-Team-Brian-Genz.mp4 |
90.9 MB |
CircleCityCon/CircleCityCon 2016/306-Fantastic-OSINT-and-where-to-find-it-Tony-Robinson-da667.mp4 |
112.1 MB |
CircleCityCon/CircleCityCon 2016/307-Where-to-Start-When-Your-Environment-is-FK3d-InfoSystir-Amanda-Berlin.mp4 |
89.8 MB |
CircleCityCon/CircleCityCon 2016/308-Intro-to-Mobile-Device-Testing-Damian-Profancik.mp4 |
48.1 MB |
CircleCityCon/CircleCityCon 2016/Binary-Defense-Without-Privilege-Steve-Vittitoe.mp4 |
73.4 MB |
CircleCityCon/CircleCityCon 2016/Exfil-and-Reverse-Shells-in-a-Whitelisted-World.mp4 |
48.4 MB |
CircleCityCon/CircleCityCon 2016/Opening-Ceremony-CircleCityCon-Staff.mp4 |
71.1 MB |
CircleCityCon/CircleCityCon 2017/000-Closing-Keynote-Lectures-or-Life-Experiences-Awareness-Training-that-Works-Tottenkoph-Cindy-Jones.mp4 |
81.6 MB |
CircleCityCon/CircleCityCon 2017/001-Closing-Ceremonies.mp4 |
87.3 MB |
CircleCityCon/CircleCityCon 2017/100-Opening-Ceremonies.mp4 |
98.7 MB |
CircleCityCon/CircleCityCon 2017/101-Opening-Keynote-Words-Have-Meanings-Dan-Tentler.mp4 |
85.8 MB |
CircleCityCon/CircleCityCon 2017/103-And-the-Clouds-Break-Continuity-in-the-21st-Century-Wolfgang-Goerlich.mp4 |
92.2 MB |
CircleCityCon/CircleCityCon 2017/104-DNS-Dark-Matter-Discovery-Theres-Evil-In-Those-Queries-Jim-Nitterauer.mp4 |
73.7 MB |
CircleCityCon/CircleCityCon 2017/105-Trials-and-Tribulations-of-setting-up-a-Phishing-Campaign-Insight-into-the-how-Haydn-Johnson.mp4 |
80.5 MB |
CircleCityCon/CircleCityCon 2017/106-Fuzzing-with-AFL-Adam-DC949.mp4 |
89.8 MB |
CircleCityCon/CircleCityCon 2017/107-Effective-Report-Writing-for-Security-Practitioners-Benjamin-Robinson.mp4 |
71.6 MB |
CircleCityCon/CircleCityCon 2017/108-Application-Security-Metrics-Caroline-Wong.mp4 |
80.7 MB |
CircleCityCon/CircleCityCon 2017/109-OSINT-And-Your-World-A-Love-Story-Michael-James.mp4 |
77.3 MB |
CircleCityCon/CircleCityCon 2017/110-Network-manipulation-on-video-games-Alex-Kot.mp4 |
83.4 MB |
CircleCityCon/CircleCityCon 2017/111-Phing-Phishers-JAe-.mp4 |
90.2 MB |
CircleCityCon/CircleCityCon 2017/112-Open-Sesamee-Max-Power.mp4 |
54.7 MB |
CircleCityCon/CircleCityCon 2017/114-Ichthyology-Phishing-as-a-Science-Karla-Burnett.mp4 |
63.6 MB |
CircleCityCon/CircleCityCon 2017/115-Peakaboo-I-own-you-Owning-hundreds-of-thousands-of-devices-with-a-broken-HTTP-packet-Amit-Serper.mp4 |
63.7 MB |
CircleCityCon/CircleCityCon 2017/200-Everything-is-Not-Awesome-How-to-Overcome-Barriers-to-Proper-Network-Segmentation-Jason-Beatty.mp4 |
102.5 MB |
CircleCityCon/CircleCityCon 2017/201-Cybersecurity-for-real-life-Using-the-NIST-Framework-to-protect-your-critical-infrastructure-Ryan-Koop.mp4 |
97.6 MB |
CircleCityCon/CircleCityCon 2017/202-The-Decision-Makers-Guide-To-Managing-Risk-Joel-Cardella.mp4 |
103.3 MB |
CircleCityCon/CircleCityCon 2017/203-Network-Security-What-About-The-Data-0ddj0bb-0ddj0bb.mp4 |
88.1 MB |
CircleCityCon/CircleCityCon 2017/204-Detecting-DNS-Anomalies-with-Statistics-Jamie-Buening.mp4 |
95.5 MB |
CircleCityCon/CircleCityCon 2017/205-Threat-Intelligence-Zero-to-Basics-Chris-J.mp4 |
118.8 MB |
CircleCityCon/CircleCityCon 2017/206-The-State-of-Security-in-the-Medical-Industry-Cannibal-billy.mp4 |
111.7 MB |
CircleCityCon/CircleCityCon 2017/208-See-beyond-the-veil-Automating-malicious-javascript-deobfuscation-Chad-Robertson.mp4 |
91 MB |
CircleCityCon/CircleCityCon 2017/209-Youre-not-old-enough-for-that-A-TLS-extension-to-put-the-past-behind-us-Falcon-Darkstar-Momot.mp4 |
93.4 MB |
CircleCityCon/CircleCityCon 2017/210-Ye-Olde-Hacking-Johnny-Xmas.mp4 |
169.2 MB |
CircleCityCon/CircleCityCon 2017/300-Tales-from-the-Cryptanalyst-Jeff-Man.mp4 |
74.2 MB |
CircleCityCon/CircleCityCon 2017/301-Talky-Horror-Picture-Show-Overcoming-CFP-Fears-Kat-Sweet.mp4 |
61.3 MB |
CircleCityCon/CircleCityCon 2017/302-Why-is-the-Internet-still-working-James-Troutman.mp4 |
96.3 MB |
CircleCityCon/CircleCityCon 2017/303-Security-Training-Making-Your-Weakest-Link-The-Strongest-Aaron-Hnatiw.mp4 |
100.2 MB |
CircleCityCon/CircleCityCon 2017/304-Its-A-Disaster-Cheryl-Biswas.mp4 |
59.7 MB |
CircleCityCon/CircleCityCon 2017/305-The-Kids-Arent-Alright-Security-and-K-12-Education-in-America-Vivienne-Pustell.mp4 |
100.4 MB |
CircleCityCon/CircleCityCon 2017/306-How-To-Be-Curious-Bret-Mattingly.mp4 |
64.4 MB |
CircleCityCon/CircleCityCon 2017/306-Of-Flags-Frogs-4chan-OPSec-vs-Weaponized-Autism-Adrian-Crenshaw.mp4 |
55.9 MB |
CircleCityCon/CircleCityCon 2017/307-Changing-our-future-with-3D-Printing-Emily-Peed.mp4 |
80.9 MB |
CircleCityCon/CircleCityCon 2017/308-We-Dont-Always-Go-Lights-and-Sirens-Kendra-Cooley.mp4 |
52 MB |
CircleCityCon/CircleCityCon 2017/309-Creating-Your-Own-Customized-Metamorphic-Algorithm-Raul-Alvarez.mp4 |
52.5 MB |
CircleCityCon/CircleCityCon 2017/CircleCityCon-4-logo.png |
236 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 000 Opening Ceremonies Circle City Con Staff.en.transcribed.srt |
66 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 000 Opening Ceremonies Circle City Con Staff.mp4 |
25.7 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 100 Espionage In The Modern Age of Information Warfare Scot Terban.en.transcribed.srt |
144 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 100 Espionage In The Modern Age of Information Warfare Scot Terban.mp4 |
54.9 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 101 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.en.transcribed.srt |
125 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 101 The Never Ending Hack Mental Health in InfoSec Community Danny Akacki.mp4 |
44.7 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 102 The Network Night Watch Eric Rand Lesley Carhart.en.transcribed.srt |
132 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 102 The Network Night Watch Eric Rand Lesley Carhart.mp4 |
48.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 103 Ransomware Robbed with a Toy Gun Brian Baskin.en.transcribed.srt |
153 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 103 Ransomware Robbed with a Toy Gun Brian Baskin.mp4 |
50.7 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 104 Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.en.transcribed.srt |
134 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 104 Dear Blue Team Proactive Steps to Supercharge your IR Joe Gray.mp4 |
108 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 107 Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.en.transcribed.srt |
146 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 107 Stealing Cycles Mining Coin An introduction to Malicious Cryptomining Edmund.mp4 |
62.2 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 108 IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.en.transcribed.srt |
125 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 108 IoT 4n6 The Growing Impact of the Internet of Things on Digital Forensics Jes.mp4 |
51.5 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 109 Backdooring with Metadata Itzik Kotler.en.transcribed.srt |
109 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 109 Backdooring with Metadata Itzik Kotler.mp4 |
49.5 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 110 Containers Exploits Surprises and Security Elissa Shevinsky.en.transcribed.srt |
79 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 110 Containers Exploits Surprises and Security Elissa Shevinsky.mp4 |
44.9 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 111 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.en.transcribed.srt |
75 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 111 Deploying Deceptive Systems Luring Attackers from the Shadows Kevin Gennuso.mp4 |
52.5 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 112 Quick Retooling in Net for Red Teams Dimitry Snezhkov.en.transcribed.srt |
117 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 112 Quick Retooling in Net for Red Teams Dimitry Snezhkov.mp4 |
58.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 113 Abuse Case Testing in DevOps Stephen Deck.en.transcribed.srt |
154 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 113 Abuse Case Testing in DevOps Stephen Deck.mp4 |
66.2 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 200 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.en.transcribed.srt |
161 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 200 Classic Cons in Cryptocurrency Wolfgang Goerlich Zachary Sarakun.mp4 |
53.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 201 Enterprise Vulnerability Management Assessing Implementing and Maintaining De.en.transcribed.srt |
168 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 201 Enterprise Vulnerability Management Assessing Implementing and Maintaining De.mp4 |
60.6 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 202 Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.en.transcribed.srt |
125 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 202 Security Beyond the Security Team Getting Everyone Involved Luka Trbojevic.mp4 |
33.9 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 203 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.en.transcribed.srt |
79 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 203 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke.mp4 |
29 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 204 SAEDY Subversion and Espionage Directed Against You Judy Towers.en.transcribed.srt |
175 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 205 Rise of the Machines Aamir Lakhani.mp4 |
43.5 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 206 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.en.transcribed.srt |
135 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 206 Automahack Automate going from zero to domain admin with 2 tools Dan McInerne.mp4 |
49.5 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 207 Playing Russian Troll Whack a Mole Courtney Falk.en.transcribed.srt |
113 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 207 Playing Russian Troll Whack a Mole Courtney Falk.mp4 |
42.8 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 208 ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.en.transcribed.srt |
114 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 208 ReThinking Cyber Security Given the Spectre of a Meltdown Someone Hold My Bee.mp4 |
44.1 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 209 Operator The Well Rounded Hacker Matthew Curtin.en.transcribed.srt |
136 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 209 Operator The Well Rounded Hacker Matthew Curtin.mp4 |
64.9 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 300 CTF Tips and Tricks Aaron Lintile.en.transcribed.srt |
133 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 300 CTF Tips and Tricks Aaron Lintile.mp4 |
40.2 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 302 The consequences of lack of security in the Healthcare and how to handle it J.mp4 |
58.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 303 How to Lie with Statistics Information Security Edition Tony Martin Vegue.en.transcribed.srt |
105 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 303 How to Lie with Statistics Information Security Edition Tony Martin Vegue.mp4 |
50.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 304 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.en.transcribed.srt |
98 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 304 A Very Particular Set of Skills Geolocation Techniques For OSINT and Investig.mp4 |
43.3 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 305 Patching Its Complicated Cheryl Biswas.en.transcribed.srt |
87 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 305 Patching Its Complicated Cheryl Biswas.mp4 |
45.4 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 306 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.en.transcribed.srt |
150 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 306 The FaaS and the Curious AWS Lambda Threat Modeling Bryan McAninch.mp4 |
53.8 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 307 Carrot vs Stick Motivation Metrics and Awareness Magen Wu.en.transcribed.srt |
102 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 307 Carrot vs Stick Motivation Metrics and Awareness Magen Wu.mp4 |
42.4 MB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 308 Securing without Slowing DevOps Wolfgang Goerlich.en.transcribed.srt |
158 KB |
CircleCityCon/CircleCityCon 2018/Circle City Con 50 308 Securing without Slowing DevOps Wolfgang Goerlich.mp4 |
49.6 MB |
CircleCityCon/CircleCityCon 2018/CircleCityCon 5 Closing.en.transcribed.srt |
82 KB |
CircleCityCon/CircleCityCon 2018/CircleCityCon 5 Closing.mp4 |
65.5 MB |
CircleCityCon/CircleCityCon 2018/Shaver Phone.en.transcribed.srt |
2 KB |
CircleCityCon/CircleCityCon 2018/Shaver Phone.mp4 |
3.1 MB |
CircleCityCon/CircleCityCon 2018/global00 GreatSCT Gotta Catch Em AWL Chris Spehn.en.transcribed.srt |
136 KB |
CircleCityCon/CircleCityCon 2018/global00 GreatSCT Gotta Catch Em AWL Chris Spehn.mp4 |
41.7 MB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 Closing Cermonies.en.transcribed.srt |
137 KB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 Closing Cermonies.mp4 |
160.3 MB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 Opening.en.transcribed.srt |
37 KB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 Opening.mp4 |
37.6 MB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 behind the scenes.en.transcribed.srt |
14 KB |
CircleCityCon/CircleCityCon 2019/Circle City Con 2019 behind the scenes.mp4 |
33.4 MB |
CircleCityCon/CircleCityCon 2019/How the video rig works.en.transcribed.srt |
12 KB |
CircleCityCon/CircleCityCon 2019/How the video rig works.mp4 |
22.9 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 00 Data Access Rights Exploits under New Privacy Laws Amber Welch.en.transcribed.srt |
88 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 00 Data Access Rights Exploits under New Privacy Laws Amber Welch.mp4 |
80.1 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 01 More Tales from the CryptAnalyst Jeff Man.en.transcribed.srt |
105 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 01 More Tales from the CryptAnalyst Jeff Man.mp4 |
101.8 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 02 Cons Careers Steven Bernstein.en.transcribed.srt |
95 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 02 Cons Careers Steven Bernstein.mp4 |
58.4 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 03 3D printing canister launchable drones for city scale wardriving Glytch Tech.en.transcribed.srt |
44 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 03 3D printing canister launchable drones for city scale wardriving Glytch Tech.mp4 |
39.6 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 04 Security lessons from the Woofmutt Chris Roberts.en.transcribed.srt |
81 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 04 Security lessons from the Woofmutt Chris Roberts.mp4 |
68.4 MB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 05 Don't Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.en.transcribed.srt |
50 KB |
CircleCityCon/CircleCityCon 2019/Main Track 1 2 05 Don't Wait 5 Tactics to Leveling Up Your InfoSec Career Meag Lees.mp4 |
55.3 MB |
CircleCityCon/CircleCityCon 2019/Track 3 00 How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.en.transcribed.srt |
74 KB |
CircleCityCon/CircleCityCon 2019/Track 3 00 How to reach and teach youth about Cybersecurity if anybody will let you Jason Smith.mp4 |
61.8 MB |
CircleCityCon/CircleCityCon 2019/Track 3 01 Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.en.transcribed.srt |
33 KB |
CircleCityCon/CircleCityCon 2019/Track 3 01 Could Static Code Analysis and Secure Coding have Saved the Death Star Mary Waddick.mp4 |
38.2 MB |
CircleCityCon/CircleCityCon 2019/Track 3 02 Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.en.transcribed.srt |
81 KB |
CircleCityCon/CircleCityCon 2019/Track 3 02 Ill Complete My Threat Model Later Mom Infosec in Middle School Ashley Benitez Smith.mp4 |
49.4 MB |
CircleCityCon/CircleCityCon thank you.txt |
771 B |
CircleCityCon/CircleCityCon-logo.jpg |
26 KB |