58:32 Luke Jennings - The new SaaS cyber kill chain 44CON Information Security Conference 442 views - 2 years ago
56:03 Marta Janus and Eoin Wickens - Sleeping with one AI open 44CON Information Security Conference 515 views - 2 years ago
53:31 44CON - Lessons from 10+ Years Running a Cyber Security Conference Cyber Risk Engineering 92 views - 3 years ago
30:34 Khang Nguyen - Lessons Learned from a Red Teamer's Journey into the Kernel 44CON Information Security Conference 411 views - 2 years ago
49:01 David Rogers - A Security Research Journey: how the mobile industry met hackers in the middle 44CON Information Security Conference 376 views - 2 years ago
47:08 Kev Sheldrake - Detection and Blocking with BPF via YAML 44CON Information Security Conference 189 views - 2 years ago
23:56 Gerald Benischke - Precision Munitions for Denial of Service 44CON Information Security Conference 62 views - 2 years ago
1:10:29 From Zero To Hero: Threat Modeling In 90 Minutes by Steven Wierckx 44CON Information Security Conference 8.2K views - 6 years ago
47:11 Melissa Goldsmith - Threat Hunting: From Bodging to Efficiency in 7 Steps 44CON Information Security Conference 93 views - 2 years ago
57:30 What it Means to Have the C Word in the National Security Agenda - Presented By Emil Tan 44CON Information Security Conference 65 views - 6 years ago
46:57 Security Analytics Beyond Cyber - Presented By Phil Huggins 44CON Information Security Conference 148 views - 6 years ago
21:53 Jen Ellis - A Brief Intro to Cyber Policy 44CON Information Security Conference 24 views - 4 months ago
50:07 Phil Huggins - Cyber Security in Health & Care 44CON Information Security Conference 413 views - 2 years ago
50:14 Social Engineering Your Own – Developing An Awareness Training Program That Actually Works 44CON Information Security Conference 120 views - 6 years ago
52:08 Tony Gee - Getting In: Initial Access - 2023 and beyond 44CON Information Security Conference 980 views - 2 years ago
46:33 Robert Sell - The Art of the Breach 44CON Information Security Conference 166 views - 2 years ago
40:00 Andrew Ruddick - Exploring a New Class of Kernel Exploit Primitive 44CON Information Security Conference 255 views - 2 years ago
46:23 Lee Christensen and Max Harley - Nemesis 44CON Information Security Conference 222 views - 2 years ago
1:01:58 Security Research Teams - How To Manage, Grow And Retain Them - Guy Barnhart-Magen 44CON Information Security Conference 433 views - 6 years ago
35:51 James Forshaw - Missed Opportunities 44CON Information Security Conference 787 views - 2 years ago
42:09 Peter Allwright - Snookered in the Pool Room 44CON Information Security Conference 82 views - 2 years ago
55:54 Why Are We Still Doing Authentication Wrong? - Florent Daigniere 44CON Information Security Conference 744 views - 5 years ago
51:50 Meaningful Measurement: It’s About Time We Got This Right - Presented By Ian Trump 44CON Information Security Conference 61 views - 6 years ago