Sort By DateDate Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV 11 views 0 0 Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools 2 views 0 0 Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity 4 views 1 0 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 2 views 0 0 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 6 views 0 0 Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi 1 views 0 0 James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals 3 views 0 0 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 9 views 1 0 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 17 views 3 0 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 10 views 1 0 KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec 61 views 1 0 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 39 views 1 0 Matt Perry - Web Application Security Assessments Matt Perry - Web Application Security Assessments 25 views 0 0 Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT 32 views 1 0 Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT 135 views 2 0 Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World 45 views 0 0 Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax 26 views 1 0 Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT 29 views 0 0 Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT 43 views 2 0 Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT 48 views 3 0 Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction 39 views 1 0 Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT 69 views 4 0 DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT 21 views 0 0 Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT 12 views 0 0 Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT 38 views 1 0 Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT 28 views 0 0 James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT 207 views 1 0 James Mcquiggan ISC2 CyberSecurity Certification Workshop James Mcquiggan ISC2 CyberSecurity Certification Workshop 92 views 3 0 Erich Kron SecureWV 14 Friday Keynote Erich Kron SecureWV 14 Friday Keynote 45 views 0 0 Erich and James SecureWV 14 REBOOT Erich and James SecureWV 14 REBOOT 24 views 2 0 James Mcquiggan SecureWV 14 Reboot James Mcquiggan SecureWV 14 Reboot 64 views 5 0 Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN 214 views 12 0 Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN 23 views 0 0 Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN 19 views 0 0 Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN 18 views 3 0 Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN 27 views 2 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 17 views 0 0 Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN 6 views 0 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 12 views 0 0 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 14 views 0 0 James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN 70 views 3 0 Nathan Rice -Malware 101 - LUCKY TH1RT3EN Nathan Rice -Malware 101 - LUCKY TH1RT3EN 45 views 5 0 Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN 9 views 0 0 Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN 101 views 2 0 Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN 32 views 1 0 Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN 33 views 0 0 Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN 27 views 0 0 Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN 39 views 2 0 Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN 11 views 1 0 Brian Martin - Career Arcs - LUCKY TH1RT3EN Brian Martin - Career Arcs - LUCKY TH1RT3EN 17 views 1 0 Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN 29 views 1 0 Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN 70 views 2 0 Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN 121 views 4 0 Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры 40 views 0 0 Paying it Forward with Threat Intelligence 2.0 Paying it Forward with Threat Intelligence 2.0 37 views 1 0 Hacker Rights Hacker Rights 41 views 1 0 Story time: How I fell into security and what you can learn from my mistakes Story time: How I fell into security and what you can learn from my mistakes 38 views 0 0 WE ARE... ANONYMOUS - A Study of Neutralizations WE ARE... ANONYMOUS - A Study of Neutralizations 95 views 6 0 If A User Can Ruin Your Network, Your Network Sucks If A User Can Ruin Your Network, Your Network Sucks 36 views 0 0 I broke in, now what? Linux manual privilege escalation 101 I broke in, now what? Linux manual privilege escalation 101 87 views 9 0 Daleks performing a Jedi Mind Meld: Communicating Risk and Issues Daleks performing a Jedi Mind Meld: Communicating Risk and Issues 16 views 1 0 Vishing, Vishing Everywhere Vishing, Vishing Everywhere 38 views 1 0 KeyNote: Cyber Deception- Even MITRE thinks it's cool KeyNote: Cyber Deception- Even MITRE thinks it's cool 71 views 3 0 Welcome Welcome 59 views 0 0 Russia’s Campaign to Influence U.S. Elections Russia’s Campaign to Influence U.S. Elections 48 views 1 0 Bash Scripting Bash Scripting 53 views 0 0 Robert Krug - Keynote Robert Krug - Keynote 94 views 0 0 Python for Data Science Python for Data Science 67 views 1 0 Workforce Development Using the NICE Framework Workforce Development Using the NICE Framework 314 views 7 0 Containerization for the Hybrid Cloud Containerization for the Hybrid Cloud 44 views 3 0 Mobile Forensics An Introduction Mobile Forensics An Introduction 653 views 30 0 Closing Awards Closing Awards 16 views 0 0 Bitcoin From Zero to I get it Bitcoin From Zero to I get it 4 views 0 0 Securing The Secure Shell The Automated Way Securing The Secure Shell The Automated Way 36 views 1 0 How to hack all the bug bounty things automagically reap the rewards profit How to hack all the bug bounty things automagically reap the rewards profit 127 views 5 0 Giving Back Submitting to PTES 101 Giving Back Submitting to PTES 101 4 views 0 0 SecureWV Hack3rcon Live Stream 2of2 SecureWV Hack3rcon Live Stream 2of2 11 views 0 0 SecureWV Hack3rcon Live Stream 1of2 SecureWV Hack3rcon Live Stream 1of2 16 views 0 0 Closing Ceremony 2019 Closing Ceremony 2019 16 views 0 0 Closed for Business: Taking Down Darknet Markets Closed for Business: Taking Down Darknet Markets 320 views 5 0 It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots 55 views 0 0 Lend me your IR’s! Lend me your IR’s! 56 views 0 0 Cyber Defense In The Modern Org Cyber Defense In The Modern Org 27 views 0 0 Dissect Tor Bridge and Pluggable Transport Dissect Tor Bridge and Pluggable Transport 233 views 4 0 Emergent Gameplay Emergent Gameplay 20 views 1 0 Hackers Hugs and Drugs Hackers Hugs and Drugs 13 views 0 0 FLDigi E mail over Packet Radio FLDigi E mail over Packet Radio 150 views 0 0 Speaker00 Intro Speaker00 Intro 24 views 0 0 Pis Pis and wifi Pis Pis and wifi 10 views 1 0 Vehicle Forensics An Emerging Source of Evidence Vehicle Forensics An Emerging Source of Evidence 381 views 7 0 Hillbilly Storytime Pentest Fails Hillbilly Storytime Pentest Fails 9 views 0 0 Fighting Advanced Persistent Threats with Advanced Persistent Security Fighting Advanced Persistent Threats with Advanced Persistent Security 56 views 1 0 Digital Forensic Analysis Planning and Execution - part2 Digital Forensic Analysis Planning and Execution - part2 12 views 0 0 Security Through Ansible Automation Security Through Ansible Automation 69 views 1 0 Value of threat intelligence Value of threat intelligence 7 views 0 0 Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x 12 views 0 0 Secrets of Superspies Secrets of Superspies 25 views 1 0 SDR RF Hacking Primer SDR RF Hacking Primer 84 views 1 0 Technical Testimony Doing the Heavy Lifting for the Jury Technical Testimony Doing the Heavy Lifting for the Jury 3 views 0 0 911 DDOS 911 DDOS 5 views 0 0 Network Forensics using Kali Linux andor SANS Sift Network Forensics using Kali Linux andor SANS Sift 488 views 10 0 From junk to jewels Destruction is the key to building From junk to jewels Destruction is the key to building 2 views 0 0 Total Recall Using Implicit Memory as a Cryptographic Primitive Total Recall Using Implicit Memory as a Cryptographic Primitive 11 views 0 0 I survived Ransomeware Twice I survived Ransomeware Twice 8 views 0 0 Digital Forensic Analysis Planning and Execution - part1 Digital Forensic Analysis Planning and Execution - part1 34 views 1 0 Intro to WireShark Intro to WireShark 38 views 0 0 SCAP A Primer and Customization SCAP A Primer and Customization 135 views 2 0 IoT Panel IoT Panel 7 views 0 0 Closing Ceremonies Closing Ceremonies 7 views 0 0 Election Officials as IT Managers Election Officials as IT Managers 269 views 0 0 What We Do In The Shadows: "Going Dark" With Consumer Electronics What We Do In The Shadows: "Going Dark" With Consumer Electronics 61 views 1 0 Building an Application Security Program Building an Application Security Program 43 views 1 0 "Paying it Forward" with Threat Intelligence "Paying it Forward" with Threat Intelligence 8 views 0 0 Ham radio and YOU Ham radio and YOU 34 views 2 0 Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted 25 views 0 0 Block chain and Crypto Currency Block chain and Crypto Currency 9 views 0 0 The cost savings of NOT terrifying your leadership. The cost savings of NOT terrifying your leadership. 8 views 0 0 2019 TV News Coverage - Featuring ILF 2019 TV News Coverage - Featuring ILF 34 views 1 0 2019 TV News Coverage 2019 TV News Coverage 68 views 0 0 Automating Security Operations on a budget Automating Security Operations on a budget 11 views 0 0 Advanced threat hunting with open source tools and no budget Advanced threat hunting with open source tools and no budget 108 views 6 0 Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges 8 views 0 0 Security Automation for the Blue Team Security Automation for the Blue Team 77 views 2 0 A deep look at Stack Buffer Overflows and Format String Vulnerabilities A deep look at Stack Buffer Overflows and Format String Vulnerabilities 12 views 0 0 The New Age of Ransomware Cybercriminals Adopt Nation State Techniques The New Age of Ransomware Cybercriminals Adopt Nation State Techniques 8 views 0 0 Mobile devices and you Mobile devices and you 11 views 2 0 Why The Legal System Needs Your Help Why The Legal System Needs Your Help 5 views 0 0 A Brief Introduction to Metasploit A Brief Introduction to Metasploit 14 views 0 0 Welcome to SecureWV Hack3rCon Welcome to SecureWV Hack3rCon 23 views 0 0 Gun Safety Class Gun Safety Class 5 views 0 0 Keynote Hackers Hugs Drugs Part II Keynote Hackers Hugs Drugs Part II 3 views 0 0 Applying the principles of Dodgeball A True Underdog Story to CTFs Applying the principles of Dodgeball A True Underdog Story to CTFs 24 views 1 0 Red Hat Enterprise Linux Security Technologies Lab Red Hat Enterprise Linux Security Technologies Lab 6 views 0 0 Securing your networks with Ansible Securing your networks with Ansible 27 views 0 0 The Hybrid Home Lab From Laptop to Cloud The Hybrid Home Lab From Laptop to Cloud 28 views 0 0 Python Scripting Python Scripting 18 views 0 0
Sort By DateDate Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV Matt Schuerer - Lies, Telephony, and Hacking History - Wild, Weird, SecureWV 11 views 0 0 Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools Dwayne Mcdaniel - Who Goes There? Actively Detecting Intruders With Cyber Deception Tools 2 views 0 0 Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity Nick Kelly - I CAN Do That, Dave: AI in Attack & Defend Scenarios in Cybersecurity 4 views 1 0 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 Dwayne McDaniel - Championing Security: Scaling Security At Every Level - Wild, Weird, SecureWV 15 2 views 0 0 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 Karinne Bessette - Essential Microsoft 365 security features crash course - Wild, Weird, SecureWV 15 6 views 0 0 Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi Hudson Bush - Adversarial Thinking: Using Threat Modeling to Develop a Cognitive Map of Your Securi 1 views 0 0 James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals James Mcquiggan - AI Enhanced - Synthetic Media The New Weapon of Choice for Cybercriminals 3 views 0 0 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 Philip Polstra - More Forensics Fun with Bash - Wild, Weird, SecureWV 15 9 views 1 0 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 Shane Mccombs - Helping Our Children Thrive on the Internet WILD WEIRD SECUREWV 15 17 views 3 0 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 KEYNOTE Matt Scheurer - Dont Stop Believing On This Journey - Wild, Weird, SecureWV 15 10 views 1 0 KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec KEYNOTE Adam Compton - Hillbilly Storytime: Fails, Fumbles, and Finding My Way in InfoSec 61 views 1 0 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 Ryan Gebaurer - AI, Cyber, and Where We Really Are - Wild, Weird, SecureWV 15 39 views 1 0 Matt Perry - Web Application Security Assessments Matt Perry - Web Application Security Assessments 25 views 0 0 Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT Suzette Bailey Jones - Cyber Defense: The Big Picture - SECUREWV 14 REBOOT 32 views 1 0 Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT Nathan Rice Breaking In to Breaking in: How to be a pentester - SECUREWV 14 REBOOT 135 views 2 0 Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World Jim Jones - Yes, Backups Do Matter: Designing Disaster Recovery for a Ransomware World 45 views 0 0 Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax Shana Nicholson - The Cybersecurity Master: The Cyber Force Path to Secure your Business Galax 26 views 1 0 Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT Karinne Bessette - Azure Storage And Security: Best Practices Redesigned - SECUREWV 14 REBOOT 29 views 0 0 Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT Karinne Bessette - Essential Microsoft 365 Security Features - SECUREWV 14 REBOOT 43 views 2 0 Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT Benny Karnes - Pivoting Basics Workshop - SECUREWV 14 REBOOT 48 views 3 0 Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction Matt Schuerer & Tuan Phan - The Artifacts Aren't Fiction 39 views 1 0 Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT Kenneth Peeples - Scale Team Threat Hunting with Kestrel as a Service - SECUREWV 14 REBOOT 69 views 4 0 DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT DJ Holly - Going Deep! - Defense-in-Depth with overlapping capability - SECUREWV 14 REBOOT 21 views 0 0 Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT Chris Galaska - Enterprise Network Design - SECUREWV 14 REBOOT 12 views 0 0 Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT Chris May - Cyber Security: 2023 Threat and Strategy Update - SECUREWV 14 REBOOT 38 views 1 0 Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT Adam Compton Finding your Home in Infosec - SECUREWV 14 REBOOT 28 views 0 0 James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT James McQuiggan - KEYNOTE - The Dark Side of AI: Malware, Scams, and Beyond - SECUREWV 14 REBOOT 207 views 1 0 James Mcquiggan ISC2 CyberSecurity Certification Workshop James Mcquiggan ISC2 CyberSecurity Certification Workshop 92 views 3 0 Erich Kron SecureWV 14 Friday Keynote Erich Kron SecureWV 14 Friday Keynote 45 views 0 0 Erich and James SecureWV 14 REBOOT Erich and James SecureWV 14 REBOOT 24 views 2 0 James Mcquiggan SecureWV 14 Reboot James Mcquiggan SecureWV 14 Reboot 64 views 5 0 Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN Nate Hicks - Threat Hunting For Dummies - LUCKY TH1RT3EN 214 views 12 0 Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN Micah Brown - I Got 99 Problems but a WAF ain’t one - LUCKY TH1RT3EN 23 views 0 0 Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN Aurthur Sions - Perceptions of Sharing cyber threat intel - LUCKY TH1RT3EN 19 views 0 0 Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN Eric Shultz - Introduction to Powershell - LUCKY TH1RT3EN 18 views 3 0 Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN Brian Hoskinson - A Look at Developing Cybersecurity Policies - LUCKY TH1RT3EN 27 views 2 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 17 views 0 0 Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN Micah Brown - Star Wars: How an ineffective Data Governance destroyed the Gal Emp LUCKY TH1RT3EN 6 views 0 0 Women in Tech Round Table - LUCKY TH1RT3EN Women in Tech Round Table - LUCKY TH1RT3EN 12 views 0 0 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 Daniel Faltisco - From Black Cat to Blue Hat The State of Ransomware 2022 LUCKY TH1RT3EN mp4 14 views 0 0 James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN James Mcquiggan - Ransomware, Ransom war & Ran some where - LUCKY TH1RT3EN 70 views 3 0 Nathan Rice -Malware 101 - LUCKY TH1RT3EN Nathan Rice -Malware 101 - LUCKY TH1RT3EN 45 views 5 0 Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN Dwayne Mcdaniel - App Security Does Not Need To Be Fun - LUCKY TH1RT3EN 9 views 0 0 Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN Jason Shirley - Greenbone Security Assistant - LUCKY TH1RT3EN 101 views 2 0 Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN Eric Shultz - CTF with Powershell - LUCKY TH1RT3EN 32 views 1 0 Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN Mick Douglas - Defending Against Advanced Adversaries - LUCKY TH1RT3EN 33 views 0 0 Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN Adam Compton - Hillbilly Storytime (2022 Edition) - Pentest Fails - LUCKY TH1RT3EN 27 views 0 0 Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN Brandon Curnutte - Amateur Radio 101 - LUCKY TH1RT3EN 39 views 2 0 Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN Ryan Ashley - AI Assurance for system operators - LUCKY TH1RT3EN 11 views 1 0 Brian Martin - Career Arcs - LUCKY TH1RT3EN Brian Martin - Career Arcs - LUCKY TH1RT3EN 17 views 1 0 Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN Bill Gardner - Demystifying Zero Trust - LUCKY TH1RT3EN 29 views 1 0 Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN Philip Polstra - Bashing into Forensics - LUCKY TH1RT3EN 70 views 2 0 Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN Matt Scheurer - Becoming an IR Superstar - LUCKY TH1RT3EN 121 views 4 0 Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры 40 views 0 0 Paying it Forward with Threat Intelligence 2.0 Paying it Forward with Threat Intelligence 2.0 37 views 1 0 Hacker Rights Hacker Rights 41 views 1 0 Story time: How I fell into security and what you can learn from my mistakes Story time: How I fell into security and what you can learn from my mistakes 38 views 0 0 WE ARE... ANONYMOUS - A Study of Neutralizations WE ARE... ANONYMOUS - A Study of Neutralizations 95 views 6 0 If A User Can Ruin Your Network, Your Network Sucks If A User Can Ruin Your Network, Your Network Sucks 36 views 0 0 I broke in, now what? Linux manual privilege escalation 101 I broke in, now what? Linux manual privilege escalation 101 87 views 9 0 Daleks performing a Jedi Mind Meld: Communicating Risk and Issues Daleks performing a Jedi Mind Meld: Communicating Risk and Issues 16 views 1 0 Vishing, Vishing Everywhere Vishing, Vishing Everywhere 38 views 1 0 KeyNote: Cyber Deception- Even MITRE thinks it's cool KeyNote: Cyber Deception- Even MITRE thinks it's cool 71 views 3 0 Welcome Welcome 59 views 0 0 Russia’s Campaign to Influence U.S. Elections Russia’s Campaign to Influence U.S. Elections 48 views 1 0 Bash Scripting Bash Scripting 53 views 0 0 Robert Krug - Keynote Robert Krug - Keynote 94 views 0 0 Python for Data Science Python for Data Science 67 views 1 0 Workforce Development Using the NICE Framework Workforce Development Using the NICE Framework 314 views 7 0 Containerization for the Hybrid Cloud Containerization for the Hybrid Cloud 44 views 3 0 Mobile Forensics An Introduction Mobile Forensics An Introduction 653 views 30 0 Closing Awards Closing Awards 16 views 0 0 Bitcoin From Zero to I get it Bitcoin From Zero to I get it 4 views 0 0 Securing The Secure Shell The Automated Way Securing The Secure Shell The Automated Way 36 views 1 0 How to hack all the bug bounty things automagically reap the rewards profit How to hack all the bug bounty things automagically reap the rewards profit 127 views 5 0 Giving Back Submitting to PTES 101 Giving Back Submitting to PTES 101 4 views 0 0 SecureWV Hack3rcon Live Stream 2of2 SecureWV Hack3rcon Live Stream 2of2 11 views 0 0 SecureWV Hack3rcon Live Stream 1of2 SecureWV Hack3rcon Live Stream 1of2 16 views 0 0 Closing Ceremony 2019 Closing Ceremony 2019 16 views 0 0 Closed for Business: Taking Down Darknet Markets Closed for Business: Taking Down Darknet Markets 320 views 5 0 It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots 55 views 0 0 Lend me your IR’s! Lend me your IR’s! 56 views 0 0 Cyber Defense In The Modern Org Cyber Defense In The Modern Org 27 views 0 0 Dissect Tor Bridge and Pluggable Transport Dissect Tor Bridge and Pluggable Transport 233 views 4 0 Emergent Gameplay Emergent Gameplay 20 views 1 0 Hackers Hugs and Drugs Hackers Hugs and Drugs 13 views 0 0 FLDigi E mail over Packet Radio FLDigi E mail over Packet Radio 150 views 0 0 Speaker00 Intro Speaker00 Intro 24 views 0 0 Pis Pis and wifi Pis Pis and wifi 10 views 1 0 Vehicle Forensics An Emerging Source of Evidence Vehicle Forensics An Emerging Source of Evidence 381 views 7 0 Hillbilly Storytime Pentest Fails Hillbilly Storytime Pentest Fails 9 views 0 0 Fighting Advanced Persistent Threats with Advanced Persistent Security Fighting Advanced Persistent Threats with Advanced Persistent Security 56 views 1 0 Digital Forensic Analysis Planning and Execution - part2 Digital Forensic Analysis Planning and Execution - part2 12 views 0 0 Security Through Ansible Automation Security Through Ansible Automation 69 views 1 0 Value of threat intelligence Value of threat intelligence 7 views 0 0 Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x Coming Up with the Next Wave of Cyber Innovations Start by Thinking 1ns1d3 th3 B0x 12 views 0 0 Secrets of Superspies Secrets of Superspies 25 views 1 0 SDR RF Hacking Primer SDR RF Hacking Primer 84 views 1 0 Technical Testimony Doing the Heavy Lifting for the Jury Technical Testimony Doing the Heavy Lifting for the Jury 3 views 0 0 911 DDOS 911 DDOS 5 views 0 0 Network Forensics using Kali Linux andor SANS Sift Network Forensics using Kali Linux andor SANS Sift 488 views 10 0 From junk to jewels Destruction is the key to building From junk to jewels Destruction is the key to building 2 views 0 0 Total Recall Using Implicit Memory as a Cryptographic Primitive Total Recall Using Implicit Memory as a Cryptographic Primitive 11 views 0 0 I survived Ransomeware Twice I survived Ransomeware Twice 8 views 0 0 Digital Forensic Analysis Planning and Execution - part1 Digital Forensic Analysis Planning and Execution - part1 34 views 1 0 Intro to WireShark Intro to WireShark 38 views 0 0 SCAP A Primer and Customization SCAP A Primer and Customization 135 views 2 0 IoT Panel IoT Panel 7 views 0 0 Closing Ceremonies Closing Ceremonies 7 views 0 0 Election Officials as IT Managers Election Officials as IT Managers 269 views 0 0 What We Do In The Shadows: "Going Dark" With Consumer Electronics What We Do In The Shadows: "Going Dark" With Consumer Electronics 61 views 1 0 Building an Application Security Program Building an Application Security Program 43 views 1 0 "Paying it Forward" with Threat Intelligence "Paying it Forward" with Threat Intelligence 8 views 0 0 Ham radio and YOU Ham radio and YOU 34 views 2 0 Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted Cybersecurity Maturity Model – The Compliance Standard You’ve Always Wanted 25 views 0 0 Block chain and Crypto Currency Block chain and Crypto Currency 9 views 0 0 The cost savings of NOT terrifying your leadership. The cost savings of NOT terrifying your leadership. 8 views 0 0 2019 TV News Coverage - Featuring ILF 2019 TV News Coverage - Featuring ILF 34 views 1 0 2019 TV News Coverage 2019 TV News Coverage 68 views 0 0 Automating Security Operations on a budget Automating Security Operations on a budget 11 views 0 0 Advanced threat hunting with open source tools and no budget Advanced threat hunting with open source tools and no budget 108 views 6 0 Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges Outside the Box How the Internet of Things Poses New Cybersecurity Risks and Challenges 8 views 0 0 Security Automation for the Blue Team Security Automation for the Blue Team 77 views 2 0 A deep look at Stack Buffer Overflows and Format String Vulnerabilities A deep look at Stack Buffer Overflows and Format String Vulnerabilities 12 views 0 0 The New Age of Ransomware Cybercriminals Adopt Nation State Techniques The New Age of Ransomware Cybercriminals Adopt Nation State Techniques 8 views 0 0 Mobile devices and you Mobile devices and you 11 views 2 0 Why The Legal System Needs Your Help Why The Legal System Needs Your Help 5 views 0 0 A Brief Introduction to Metasploit A Brief Introduction to Metasploit 14 views 0 0 Welcome to SecureWV Hack3rCon Welcome to SecureWV Hack3rCon 23 views 0 0 Gun Safety Class Gun Safety Class 5 views 0 0 Keynote Hackers Hugs Drugs Part II Keynote Hackers Hugs Drugs Part II 3 views 0 0 Applying the principles of Dodgeball A True Underdog Story to CTFs Applying the principles of Dodgeball A True Underdog Story to CTFs 24 views 1 0 Red Hat Enterprise Linux Security Technologies Lab Red Hat Enterprise Linux Security Technologies Lab 6 views 0 0 Securing your networks with Ansible Securing your networks with Ansible 27 views 0 0 The Hybrid Home Lab From Laptop to Cloud The Hybrid Home Lab From Laptop to Cloud 28 views 0 0 Python Scripting Python Scripting 18 views 0 0