Our Sponsors Top-Shelf Sponsors Gold Sponsors Bronze Sponsors Edu Sponsors Apply to be a Sponsor More Info Apply to be a Speaker More Info Wild Weird SecureWV 15 Talks Sort By DateDate Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV 18 views 0 0 Erich Kron - Cyber Warzone: Establishing Your First Line of Digital Defense - Wild, Weird, SecureWV Erich Kron - Cyber Warzone: Establishing Your First Line of Digital Defense - Wild, Weird, SecureWV 28 views 1 0 Tuan Phan - Path for Forensic Examiner Aces - Wild, Weird, SecureWV 15 Tuan Phan - Path for Forensic Examiner Aces - Wild, Weird, SecureWV 15 10 views 0 0 Ryan Ashley - AI Enhanced Hacks: Model in the Middle - Wild, Weird, SecureWV 15 Ryan Ashley - AI Enhanced Hacks: Model in the Middle - Wild, Weird, SecureWV 15 30 views 0 0 Branden Miller - What Texas Urban Legends Taught Me About Information Security Branden Miller - What Texas Urban Legends Taught Me About Information Security 12 views 0 0 Micah Brown - Zero to GRC Hero - Wild, Weird, SecureWV 15 Micah Brown - Zero to GRC Hero - Wild, Weird, SecureWV 15 16 views 0 0 Brandon Curnette - Amateur Radio 101 Brandon Curnette - Amateur Radio 101 30 views 2 0 D Cody Cutright - Introduction to Satellite Link Security Standards with CryptoLib D Cody Cutright - Introduction to Satellite Link Security Standards with CryptoLib 124 views 7 0 Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools 8 views 0 0 James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals 18 views 2 0 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 8 views 0 0 Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity 33 views 2 0 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 23 views 2 0 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 22 views 1 0 Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi 8 views 0 0 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 51 views 6 0 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 12 views 1 0 KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec 66 views 1 0 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 41 views 1 0
Sort By DateDate Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV 18 views 0 0 Erich Kron - Cyber Warzone: Establishing Your First Line of Digital Defense - Wild, Weird, SecureWV Erich Kron - Cyber Warzone: Establishing Your First Line of Digital Defense - Wild, Weird, SecureWV 28 views 1 0 Tuan Phan - Path for Forensic Examiner Aces - Wild, Weird, SecureWV 15 Tuan Phan - Path for Forensic Examiner Aces - Wild, Weird, SecureWV 15 10 views 0 0 Ryan Ashley - AI Enhanced Hacks: Model in the Middle - Wild, Weird, SecureWV 15 Ryan Ashley - AI Enhanced Hacks: Model in the Middle - Wild, Weird, SecureWV 15 30 views 0 0 Branden Miller - What Texas Urban Legends Taught Me About Information Security Branden Miller - What Texas Urban Legends Taught Me About Information Security 12 views 0 0 Micah Brown - Zero to GRC Hero - Wild, Weird, SecureWV 15 Micah Brown - Zero to GRC Hero - Wild, Weird, SecureWV 15 16 views 0 0 Brandon Curnette - Amateur Radio 101 Brandon Curnette - Amateur Radio 101 30 views 2 0 D Cody Cutright - Introduction to Satellite Link Security Standards with CryptoLib D Cody Cutright - Introduction to Satellite Link Security Standards with CryptoLib 124 views 7 0 Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools 8 views 0 0 James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals 18 views 2 0 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 8 views 0 0 Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity 33 views 2 0 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 23 views 2 0 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 22 views 1 0 Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi 8 views 0 0 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 51 views 6 0 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 12 views 1 0 KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec 66 views 1 0 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 41 views 1 0