1:29:20 Workshop: VerSprite Threat Hunting Workshop (Jack Niederer, VerSprite) Triad of NC Chapter ISSA 337 views - 5 years ago
41:54 Pentesting FAQ: Our Penetration Tester Answers the Internet's Most Asked Questions VerSprite 2.2K views - 4 years ago
1:02:11 PASTA Threat Modeling for Cybersecurity | OWASP All Chapters 2020 Presentation VerSprite 32.1K views - 5 years ago
1:57 SECURITY TIPS FOR WORKING REMOTELY FROM HOME | Cybersecurity Education for Employees Online VerSprite 4.1K views - 5 years ago
27:53 Responsible Disclosure Examples: Bug Bounty vs. Security Research - What's Right For Your Business? VerSprite 200 views - 4 years ago
31:08 OSINT and the Dark Web: Using OSINT to gather threat intelligence (Bethany Keele, VerSprite) CREST Videos 5K views - 5 years ago
28:43 What is Ransomware? - Rethinking Ransomware Attack Prevention with Botnets VerSprite 52 views - 4 years ago
38:22 Pasta Cyber Security Experts Discuss the FireEye Attack, Transparency, & Moving Forward VerSprite 1.9K views - 5 years ago
34:55 Threat Modeling - Updates on the SolarWinds Sunburst Supply Chain Attack | FireEye Hack VerSprite 2K views - 5 years ago
19:41 PASTA Threat Modeling for Cybersecurity | Threat Modeling Example VerSprite 8.7K views - 4 years ago
1:01:43 🔴 Threat Modelling and Beyond with CAIRIS | #DevSecOps LIVE 🚨 #devsecops #threatmodeling Practical DevSecOps 936 views - 3 years ago
22:37 Web App Penetration Testing - The Future of Security is Password Less with FIDO VerSprite 247 views - 4 years ago
1:10 What Does Smishing and Vishing Mean? I How Phishing Via Text Message Works VerSprite 9.2K views - 4 years ago