<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <generator>RSS Builder by B!Soft</generator>
    <title>Irongeek's Security Site</title>
    <link>http://www.irongeek.com/</link>
    <description>Irongeek.com, Adrian Crenshaw's Information Security site (along with a bit about weightlifting and other things that strike my fancy).  Home of my articles and videos on computer security. As I write articles and tutorials I will be posting them here. If you would like to republish one of the articles from this site on your webpage or print journal please e-mail me. Enjoy the site and write us if you have any good ideas for articles or links. </description>
    <language>en-us</language>
    <managingEditor>irongeek@irongeek.com</managingEditor>
    <webMaster>irongeek@irongeek.com</webMaster>
    <copyright>2014 Irongeek (Adrian Crenshaw)</copyright>
    <item>
      <title>OISF 2023 Videos</title>
      <pubDate>Sat, 8 Jul 2023 16:34:17 -0400</pubDate>
      <link>https://www.irongeek.com/i.php?page=videos/oisf2023/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="https://www.irongeek.com/i.php?page=videos/oisf2023/mainlist">OISF 2023 Videos</a>
<p>These are the videos from the <a href="http://www.ohioinfosec.org">OISF Anniversary Event</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-00-opening-remarks-dr-john-carls">Opening Remarks<br/>Dr. John Carls</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-01-future-shock-the-future-of-fraud-today-bryan-fite">Future Shock: The Future of Fraud Today<br/>Bryan Fite</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-02-securing-the-frontlines-how-users-are-being-targeted-today-pedram-amini">Securing the Frontlines: How Users are Being Targeted Today<br/>Pedram Amini</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-03-these-artifacts-arent-fiction-matt-scheurer-tuan-phan">These Artifacts aren't Fiction<br/>Matt Scheurer &amp; Tuan Phan</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-04-remarks-jon-mcfly-mcellroy-self-roping-programs-for-fun-and-profit-pre-recorded-dr-john-carls">Jon “McFly” McEllroy - Self ROPing Programs for Fun and Profit… (pre-recorded)<br/>&nbsp;</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-05-building-better-authentication-requirements-in-a-zero-trust-world-micah-brown">Building Better Authentication Requirements in a Zero Trust World<br/>Micah Brown</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2023/oisf-06-phones-the-good-the-bad-and-the-ugly-barry-kimball">Phones : The Good, The Bad, and the Ugly<br/>Barry Kimball</a>
<p>Developing Hands-on IoT Training Exercises<br/>Deral Heiland<br/>(not recorded)</p>]]></description>
    </item>
    <item>
      <title>OISF 2022</title>
      <pubDate>Sun, 10 Jul 2022 08:49:30 -0400</pubDate>
      <link>https://www.irongeek.com/i.php?page=videos/oisf2022/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="https://www.irongeek.com/i.php?page=videos/oisf2022/mainlist">OISF 2022</a><br/>These are the videos from the <a href="http://www.ohioinfosec.org">OISF Anniversary Event</a>. 
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/intro">Intro</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/oisf-00-becoming-an-ir-superstar-matt-scheurer">Becoming an IR Superstar<br/>Matt Scheurer</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/oisf-01-ransomware-is-not-the-problem-scott-nusbaum">Ransomware Is NOT the problem<br/>Scott Nusbaum</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/oisf-02-hybrid-image-based-approaches-for-modern-malware-classification-dr-phu-phung">Hybrid image-based approaches for modern malware classification<br/>Dr. Phu Phung</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/oisf-03-how-a-1993-ccg-prepared-me-for-a-life-in-info-sec-micah-brown">How a 1993 CCG prepared me for a life in Info Sec<br/>Micah Brown</a></p>
<p><a href="https://www.irongeek.com/i.php?page=videos/oisf2022/oisf-04-rethinking-cybersecurity-in-the-quantum-age-jerod-brennen">Rethinking Cybersecurity in the Quantum Age<br/>Jerod Brennen</a></p>
<p>Evaluating the Security of an Enterprise IoT Deployment - From Acquisition to Support<br/>Deral Heiland</p>
<p>Download from:<br/><a href="https://archive.org/details/oisf2022">https://archive.org/details/oisf2022</a> </p>]]></description>
    </item>
    <item>
      <title>Brian Rea (DeviantOllam Deviant) and Lesley Carhart (Hacks4Pancakes) continue their harassment of me</title>
      <pubDate>Sun, 27 Feb 2022 14:49:12 -0400</pubDate>
      <link>https://twitter.com/HikeInstead/status/1497725495789588481</link>
      <description><![CDATA[Please notice I left these people alone for a long period of time and then they start harassing me. Seriously search for when I've mentioned them on twitter last. Check out details in link. These two had a lot to do with why Derbycon ended. They are terrible human beings and this is punching up.]]></description>
    </item>
    <item>
      <title>OSInt, Doxing And Cyberstalking Page Updated</title>
      <pubDate>Thu, 2 Sep 2021 13:03:18 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking</link>
      <category>article</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking">http://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking</a><br/>I added (<a href="https://usersearch.org/">https://usersearch.org</a>) to the site. I also moved dead links to the bottom of the page. If you know sites/tools I should add, please contact me. The site has gotten a bit dated I think.]]></description>
    </item>
    <item>
      <title>OISF 2021 Videos</title>
      <pubDate>Sat, 10 Jul 2021 21:40:35 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/oisf2021/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/oisf2021/mainlist">OISF 2021 Videos</a> 
<p>These are the videos from the <a href="http://www.ohioinfosec.org">OISF Anniversary Event</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-00-opening-remarks-oisf-president">Opening Remarks<br/>OISF President</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-01-inside-the-mind-of-a-threat-actor-beyond-pentesting-phillip-wylie">Inside the Mind of a Threat Actor: Beyond Pentesting<br/>Phillip Wylie</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-02-i-got-99-problems-but-a-waf-aint-one-micah-brown">I Got 99 Problems but a WAF ain't one<br/>Micah Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-03-code-hedgehogs-changing-the-s-in-sdlc-to-secure-penelope-rozhkova">Code Hedgehogs - Changing the "S" in SDLC to Secure<br/>Penelope Rozhkova</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-04-a-look-at-cellular-services-in-iot-technology-deral-heiland">A Look at Cellular Services in IoT technology<br/>Deral Heiland</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-05-chats-cheats-and-cracks-abuse-of-collaboration-platforms-in-malware-campaigns-edmund-brumaghin">Chats, Cheats, and Cracks: Abuse of Collaboration Platforms in Malware Campaigns<br/>Edmund Brumaghin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2021/oisf-2021-06-lend-me-your-irs-matt-scheurer">Lend me your IR's!<br/>Matt Scheurer</a></p><br/>
<p></p>
<p></p>Download from:<br/><a href="https://archive.org/details/oisf2021">https://archive.org/details/oisf2021</a><br/>
<p></p>]]></description>
    </item>
    <item>
      <title>BSides Cleveland 2021 Videos</title>
      <pubDate>Sun, 20 Jun 2021 14:40:32 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescleveland2021/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2021/mainlist">BSides Cleveland 2021 Videos</FONT></B></a><br/>These are the videos from the <a href="https://www.bsidescleveland.com/">Bsides Cleveland</a> conference. Thanks to Rich, <a role=presentation class="twitter-atreply pretty-link" href="https://twitter.com/securid">securid</a>&nbsp;as the video team. Thanks to <a href="https://twitter.com/twuntymcslore">twuntymcslore</a> &amp; <a href="https://twitter.com/RockieBrockway">RockieBrockway</a> for being con mom &amp; dad.
<p>These are the first con recordings I've done in 1 year and 3 months. It seems something may have changed after some updates. These OBS videos have variable audio sync problems that are not a set number of milliseconds I could easily set the same sync settings to. I fixed them the best I could, but I've included the raw files if someone can figure a better way to fix variable sync delays. Contact me if you find a better way. <a href="https://twitter.com/Ministraitor">Ministraitor</a> (my European counterpart that does more cons than me) gave me some tips to fix future problems.</p>
<CENTER></CENTER>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/0-intro-rockie-brockway">Intro <br/>Rockie Brockway</a>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/1-i-don-t-know-snow">I Don t Know <br/>Snow</a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/2-computer-forensics-case-files-tyler-hudak">Computer Forensics Case Files <br/>Tyler Hudak </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/5-improving-cyber-security-alex-kot">Improving Cyber Security<br/>Alex Kot</a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/3-lend-me-you-irs-matt-scheurer">Lend Me You IRs <br/>Matt Scheurer </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/6-tale-from-the-audit-justin-leapline">Tale From The Audit <br/>Justin Leapline </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/7-table-top-jeremy-mio">Table Top <br/>Jeremy Mio </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/8-vulnerability-disclosure-policies-hack-responsibly-mzbat">Vulnerability Disclosure Policies Hack Responsibly <br/>MzBat </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/9-pentest-stories-justin-bollinger">Pentest Stories <br/>Justin Bollinger </a></p>
<p align="left"><a href="//www.irongeek.com/i.php?page=videos/bsidescleveland2021/10-advisor-person-rick-yocum">Advisor Person <br/>Rick Yocum</a></p>
<p></p>]]></description>
    </item>
    <item>
      <title>Who's Your Hacker </title>
      <pubDate>Sat, 4 Apr 2020 16:01:54 -0400</pubDate>
      <link>https://www.whosyourhacker.com/webinars-free-cpes/</link>
      <category>videos</category>
      <description><![CDATA[<a href="https://www.whosyourhacker.com/webinars-free-cpes/">Who's Your Hacker Con Webinar Series</a><br/>Who's Your Hacker Con is putting on webinars leading up to the in person event. They are using my channel for promotion. The first webinar is an AMA with Jayson Steet. Video archives and future schedule of events can be found at:<br/><a href="https://www.whosyourhacker.com/webinars-free-cpes/">https://www.whosyourhacker.com/webinars-free-cpes/</a>]]></description>
    </item>
    <item>
      <title>BSides Tampa 2020 Videos </title>
      <pubDate>Sun, 1 Mar 2020 14:02:12 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidestampa2020/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/mainlist">http://www.irongeek.com/i.php?page=videos/bsidestampa2020/mainlist</a> <br/>These are the videos from the <a href="http://bsidestampa.net/">BSides Tampa</a> conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew: Joshua, Patrick, Scott and Brett. 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/keynote-01-attacking-the-data-before-the-decision-rhett-greenhagen">Attacking the data before the decision<br/>Rhett Greenhagen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-b-00-turn-down-for-raas-seperating-hype-from-reality-in-the-ransomware-as-a-service-market-allan-liska">Turn down for RaaS: Seperating hype from reality in the ransomware as a service market<br/>Allan Liska</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-b-02-practical-crypto-review-for-developers-david-dillard">Practical Crypto Review for Developers<br/>David Dillard</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-b-03-rf-for-red-team-david-switzer">RF for Red Team<br/>David Switzer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-b-05-a-devsec-ops-approach-to-bringing-security-beyond-the-security-team-julien-vehent">A DevSec ops approach to bringing security beyond the security team<br/>Julien Vehent</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-b-06-the-ethics-of-data-collection-vanessa-ferguson">The Ethics of Data Collection<br/>Vanessa Ferguson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-00-loosing-our-reality-understanding-and-combating-the-deep-fake-threat-alyssa-miller">Loosing our Reality: Understanding and combating the deep fake threat<br/>Alyssa Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-01-network-gravity-exploiring-a-enterprise-network-casey-martin">Network gravity: Exploiring a enterprise network<br/>Casey Martin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-02-owasp-samm-hardik-parekh">OWASP SAMM<br/>Hardik Parekh</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-03-stopping-cyberboom-mitiaging-user-error-ira-winkler">Stopping Cyberboom: Mitiaging User error<br/>Ira Winkler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-04-post-quantum-cryptography-for-dummies-jeremy-rasmussen">Post-Quantum Cryptography for Dummies<br/>Jeremy Rasmussen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-d-05-broken-arrow-will-baggett">Broken Arrow<br/>Will Baggett</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-01-breaking-nbad-and-ueba-detection-charles-herring">Breaking NBAD and UEBA detection<br/>Charles Herring</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-03-how-to-arm-yourself-beau-bullock-ralph-may-derek-banks">How to ARM yourself<br/>Derek Banks<br/>Ralph May<br/>Beau Bullock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-04-is-that-a-wifi-sniffer-in-your-pocket-jacob-baines">Is that a WiFi sniffer in your pocket<br/>Jacob Baines</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-05-offensive-python-for-pentesters-joff-thyer">Offensive Python for Pentesters<br/>Joff Thyer and Mike Felch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-07-extracting-an-elf-from-an-esp32-nicholas-miles">Extracting an ELF from an ESP32<br/>Nicholas Miles &amp; Chris Lyne</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2020/track-e-09-http-covert-channel-using-only-htmlcss-thomas-slota-william-york">HTTP Covert channel using only HTML/CSS<br/>Thomas Slota &amp; William York</a></p>]]></description>
    </item>
    <item>
      <title>Louisville Infosec 2019 Videos</title>
      <pubDate>Mon, 18 Nov 2019 18:46:02 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/mainlist">http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/mainlist</a><br/>Below are the videos from the <a href="http://louisvilleinfosec.com/">Louisville Infosec 2019</a> conference. Thanks to all the video volunteers for helping me record. Caleb, Richard, Harold and Andre. 
<p></p>
<p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/opening">Opening</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/keynote-00-preventing-mobile-cuberattacks-james-traxel"'>Preventing Mobile Cuberattacks<br/>James Traxel</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/keynote-01-real-world-zero-trust-implementation-mark-loveless"'>Real World Zero Trust Implementation<br/>Mark Loveless</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/keynote-02-surviving-the-modern-compliance-minefield-harlen-r-compton-cissp-attorney-at-law"'>Surviving the Modern Compliance Minefield<br/>Harlen R. Compton, CISSP, Attorney at Law</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-1-00-digital-transformation-means-security-transformation-allyn-crowe"'>Digital Transformation Means Security Transformation<br/>Allyn Crowe</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-1-01-ransowmare-recovery-edward-mccabe"'>Ransowmare Recovery<br/>Edward McCabe</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-1-02-understanding-why-breaches-occur-john-survant-don-wolfe"'>Understanding Why Breaches Occur<br/>John Survant &amp; Don Wolfe</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-2-00-building-your-iam-program-from-start-to-finish-jerod-brennen"'>Building Your IAM Program from Start to Finish<br/>Jerod Brennen</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-2-01-common-observations-from-a-security-assessor-corey-shell"'>Common Observations from a Security Assessor<br/>Corey Shell</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-2-02-a-gentle-introduction-to-hacking-mainframes-dan-helton"'>A Gentle Introduction to Hacking Mainframes<br/>Dan Helton</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-3-00-taking-the-next-steps-in-cyber-security-connie-matthews-reynolds"'>Taking the Next Steps in Cyber Security<br/>Connie Matthews Reynolds</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-3-01-weaponizing-statistics-jeremy-druin-and-erich-jackson"'>Weaponizing Statistics<br/>Jeremy Druin and Erich Jackson</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-3-02-keeping-your-head-in-the-clouds-but-your-feet-on-the-ground-carl-alexander"'>Keeping Your Head in the Clouds, But Your Feet on the Ground<br/>Carl Alexander</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-4-00-the-escape-map-pivoting-to-a-new-life-of-infosec-erich-jackson"'>The Escape Map: Pivoting to a New Life of InfoSec<br/>Erich Jackson</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-4-01-data-loss-prevention-demystified-micah-k-brown"'>Data Loss Prevention Demystified <br/>Micah K Brown</a></p>
<p><a href='http://www.irongeek.com/i.php?page=videos/louisvilleinfosec2019/track-4-02-improv-comedy-for-social-engineering-dave-mattingly"'>Improv Comedy for Social Engineering<br/>Dave Mattingly</a></p>]]></description>
    </item>
    <item>
      <title>BSidesCT 2019 Video </title>
      <pubDate>Sun, 10 Nov 2019 08:11:01 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesct2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesct2019/mainlist</a> 
<p>These are the videos of the presentations from <a href="https://bsidesct.org/">BSidesCT 2019</a>. Thanks to Will Genovese, Tom Barber and Bill Reyor for having me out. Thanks to Greg Jurman, Spencer Smalley, Steven Swabby and Daniel Robels.</p>
<p></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/opening">Opening<br/>Roman Simanovich</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-00-keynote-brian-kelly">Keynote<br/>Brian Kelly</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-02-event-injections-sending-evil-to-the-cloud-tal-melamed">Event Injections: Sending Evil to the Cloud<br/>Tal Melamed</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-00-blue-teaming-incident-response-for-the-win-roy-wattanasin">Blue-teaming &amp; Incident Response for the "Win"!<br/>Roy Wattanasin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-03-election-hacking-defined-and-how-to-fight-back-andy-dennis">Election hacking defined, and how to fight back<br/>Andy Dennis</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-01-rethinking-privileged-access-management-for-agile-clouds-data-center-environments-brian-gladstein">Rethinking Privileged Access Management for Agile Clouds &amp; Data Center Environments<br/>Brian Gladstein (Audio missing after 40:50)</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-04-reversing-and-bypassing-drmhsm-dongles-jeremy-mill">Reversing and Bypassing DRM/HSM Dongles<br/>Jeremy Mill</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-02-extensible-devsecops-pipelines-with-jenkins-docker-terraform-and-a-kitchen-sink-full-of-scanners-richard-bullington-mcguire">Extensible DevSecOps pipelines with Jenkins, Docker, Terraform, and a kitchen sink full of scanners<br/>Richard Bullington-McGuire (No audio after 36 min)</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-05-vigilante-bringing-a-nail-bat-to-a-gun-fight-nobletrout">Vigilante: Bringing a nail bat to a gun fight<br/>nobletrout</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-03-trust-and-security-the-odd-couple-driving-your-business-loren-dealy-mahler">Trust and Security: The Odd Couple Driving Your Business<br/>Loren Dealy Mahler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-06-wrangle-your-defense-using-offensive-tactics-matt-dunn">Wrangle Your Defense Using Offensive Tactics<br/>Matt Dunn</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-04-most-vulnerable-product-easy-to-implement-security-solutions-and-strategies-for-the-modern-web-application-stack-jason-portnoy">Most Vulnerable Product: Easy to implement security solutions and strategies for the modern web application stack<br/>Jason Portnoy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-07-the-unmanaged-device-tsunami-surf-or-suffer-ziv-dines">The Unmanaged Device Tsunami: Surf or Suffer?<br/>Ziv Dines</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-05-building-castles-in-the-cloud-aws-security-and-self-assessment-rami-mccarthy">Building Castles in the Cloud: AWS Security and Self-Assessment<br/>Rami McCarthy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-08-zoom-0-day-how-not-to-handle-a-vulnerability-report-jonathan-leitschuh">Zoom 0-Day: How not to handle a vulnerability report<br/>Jonathan Leitschuh</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/2-06-securing-active-directory-pam-for-adds-rohit-dsouza">Securing Active Directory &amp; PAM for ADDS<br/>Rohit D'Souza</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesct2019/1-09-prizes-and-closing-remarks-roman-simanovich">Prizes and closing remarks<br/>Roman Simanovich</a></p>]]></description>
    </item>
    <item>
      <title>GrrCON 2019 Videos</title>
      <pubDate>Sat, 26 Oct 2019 18:45:39 -0500</pubDate>
      <link>https://www.irongeek.com/i.php?page=videos/grrcon2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="https://www.irongeek.com/i.php?page=videos/grrcon2019/mainlist">GrrCON 2019 Videos</a><br/>These are the videos of the presentations from <a href="http://www.GrrCON.com">GrrCON 2019</a>. Big thanks to <a href="https://twitter.com/P1nkN1ghtmare">P1nkN1ghtmare</a> <a href="https://twitter.com/EggDropX">and EggDropX</a> for having me out, and my video crew&nbsp; (<a href="https://twitter.com/paint27">paint27</a>, <a href="https://twitter.com/LizardSlack">LizardSlack</a>, <a href="https://twitter.com/BrettAHansen">BrettAHansen</a>, and <a href="https://twitter.com/ZTC1980">ZTC1980</a>) for recording.
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-01-keynote-amanda-infosystir-berlin">Keynote<br/>Amanda 'Infosystir' Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-02-baselining-behavior-tradecraft-through-simulations-dave-kenendy">Baselining Behavior Tradecraft through Simulations<br/>Dave Kenendy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-03-i-pwn-thee-i-pwn-thee-not-jayson-street">I PWN thee, I PWN thee not!<br/>Jayson Street</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-04-automating-phishing-analysis-kyle-eaton">Automating Phishing Analysis<br/>Kyle Eaton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-05-black-hats-white-collars-bitcoin-dark-nets-and-insider-trading-ken-westin">Black Hats &amp; White Collars : Bitcoin, Dark Nets and Insider Trading<br/>Ken Westin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-06-ssshhhh-atlas-of-doom">Ssshhhh<br/>Atlas of Doom</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-07-how-nathan-crashed-and-burned-nathan-dragun">How Nathan Crashed and Burned <br/>Nathan Dragun</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-08-reverse-engineering-malware-for-n00bs-gregb33fjames">Reverse Engineering Malware for N00bs<br/>GregB33f/James</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-09-host-hunting-on-a-budget-cybergoatpsyops">Host-Hunting on a Budget<br/>cyberGoatPsyOps</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-11-keynote-rachel-soul-crusher86-g">Keynote<br/>Rachel "Soul Crusher86" G</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-12-cons-careers-sciaticnerd">Cons &amp; Careers<br/>SciaticNerd</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-14-hacking-the-boardroom-how-to-communicate-effectively-to-get-your-budget-ryan-wisniewski">Hacking the Boardroom: How to communicate effectively to get your budget<br/>Ryan Wisniewski</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-16-the-science-of-breaking-and-entering-alissa-dnsprincess">The Science of Breaking and Entering<br/>Alissa dnsprincess</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-17-hashes-smothered-and-scattered-modern-password-cracking-as-a-methodology-lee-wangenheim-joshua-platz">Hashes; Smothered and Scattered: Modern Password Cracking as a Methodology<br/>Lee Wangenheim &amp; Joshua Platz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-1-19-big-plane-little-plane-how-common-aviation-attacks-affect-airlines-and-general-aviation-phil-polstra">Big Plane, Little Plane: How common aviation attacks affect airlines and general aviation<br/>Phil Polstra</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-00-psd2-sca-wtf-kelley-robinson">PSD2, SCA, WTF?!<br/>Kelley Robinson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-01-nerding-out-with-machine-data-nick-maier">Nerding out with machine data<br/>Nick Maier</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-03-the-past-present-future-of-cyber-threats-chris-russell">The Past, Present &amp; Future of Cyber Threats<br/>Chris Russell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-04-symbolically-executing-a-fuzzy-tyrant-lojikil">Symbolically executing a fuzzy tyrant<br/>Lojikil</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-05-a-theme-of-fear-hacking-the-paradigm-catherine-ullman">A Theme of Fear: Hacking the Paradigm<br/>Catherine Ullman</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-06-qa-on-our-industry-and-other-things-that-are-top-of-mind-chris-roberts">Q&amp;A on our industry and other things that are top of mind<br/>Chris Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-07-how-to-make-a-honeypot-stickier-ssh-jose-hernandez">How to Make a Honeypot Stickier (SSH*)<br/>Jose Hernandez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-08-data-access-rights-exploits-under-new-privacy-laws-amber-welch">Data Access Rights Exploits under New Privacy Laws<br/>Amber Welch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-09-data-security-how-to-avoid-an-embarrassing-breach-matt-mattrix-hoy">Data Security: How to avoid an embarrassing breach<br/>Matt "mattrix" Hoy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-10-mssps-are-greatand-other-lies-i-tell-myself-scott-thomas">MSSPs are great...and other lies I tell myself<br/>Scott Thomas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-11-devaluing-cloud-breaches-while-gaining-safe-harbor-eric-wolff">Devaluing Cloud Breaches while Gaining Safe Harbor<br/>Eric Wolff</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-12-good-cyber-hygiene-and-using-analytics-to-drive-the-need-for-it-on-print-david-rose">Good Cyber Hygiene and using analytics to drive the need for it on Print<br/>David Rose</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-13-varna-custom-robust-aws-monitoring-for-cents-a-day-using-eql-adam-ringwood">Varna: Custom, robust AWS monitoring for cents a day using EQL<br/>Adam Ringwood</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-14-a-day-in-the-life-of-a-security-operations-center-what-do-you-get-when-you-partner-with-cybersecurity-experts-milan-patel">A Day in the Life of a Security Operations Center: What do you get when you partner with cybersecurity experts?<br/>Milan Patel</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-15-malicious-cryptomining-is-exploding-are-you-at-risk-john-fatten">Malicious Cryptomining is Exploding: Are you at risk?<br/>John Fatten</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-2-18-dance-fancybear-dance-a-study-in-macos-cat-self">Dance, Fancybear, Dance: a study in macOS<br/>Cat Self</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-00-the-spider-economy-emotet-dridex-and-trickbot-oh-my-adam-hogan">The Spider Economy: Emotet, Dridex, and TrickBot, Oh My<br/>Adam Hogan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-01-cloudy-with-a-chance-of-secops-ricardo-lafosse-matthew-speakman">Cloudy with a chance of SecOps<br/>Ricardo Lafosse &amp; Matthew Speakman</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-02-destroy-everything-tom-somerville">Destroy Everything<br/>Tom Somerville</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-03-surfing-and-security-ride-the-wave-chris-burrows">Surfing and Security - Ride the wave<br/>Chris Burrows</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-04-the-importance-of-it-asset-visibility-brian-berk">The Importance of IT Asset Visibility<br/>Brian Berk</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-05-from-idea-to-badge-getting-started-finished-with-badge-making-dave-schwartzberg">From Idea to Badge: Getting Started &amp; Finished with badge making<br/>Dave Schwartzberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-06-cybercrime-trends-of-2019-a-look-into-cybercrime-nation-state-and-ransomware-monetization-activities-jared-phipps">CyberCrime Trends of 2019: A Look Into Cybercrime, Nation State and Ransomware Monetization Activities<br/>Jared Phipps</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-07-using-next-generation-fuzzing-tools-fixing-bugs-and-writing-memory-corruption-exploits-dr-jared-demott-john-stigerwalt">Using Next Generation Fuzzing Tools: Fixing Bugs and Writing Memory Corruption Exploits<br/>Dr. Jared DeMott &amp; John Stigerwalt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-08-what-are-we-doing-here-rethinking-security-jeff-man">What Are We Doing Here? Rethinking Security<br/>Jeff Man</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-09-how-hackers-evade-your-ai-enabled-endpoint-detection-tools-dan-allen">How Hackers Evade Your AI-enabled Endpoint Detection Tools<br/>Dan Allen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-10-hillbilly-storytime-pentest-fails-adam-compton">Hillbilly Storytime - Pentest Fails<br/>Adam Compton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-11-want-to-play-a-game-john-deryke">Want to Play a Game..<br/>John DeRyke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-12-the-hacker-hippocampus-meet-your-brain-on-games-chlo-messdaghi">The Hacker Hippocampus: Meet your brain on games<br/>Chloe Messdaghi</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-13-departing-employees-departing-data-todd-thorsen">Departing Employees = Departing Data<br/>Todd Thorsen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-14-beginners-guide-to-mobile-applications-penetration-testing-whitney-phillips">Beginner's Guide to Mobile Applications Penetration Testing<br/>Whitney Phillips</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-15-understanding-how-public-places-introduce-additional-risks-to-business-travelers-how-the-tools-used-by-hackers-continue-to-evolve-len-noe">Understanding how public places introduce additional risks to business travelers &amp; how the tools used by hackers continue to evolve<br/>Len Noe</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-16-million-dollar-malware-using-the-viper-framework-to-investigate-and-track-ryuks-success-colin-cowie">Million Dollar Malware: Using the Viper Framework to Investigate and Track Ryuk's Success<br/>Colin Cowie</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-17-the-importance-of-relevant-timely-and-qualitative-intelligence-analysis-aamil-ak">The Importance of Relevant, Timely, and Qualitative Intelligence Analysis<br/>Aamil AK</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-18-deepfakes-if-anything-can-be-real-then-nothing-is-real-april-c-wright">Deepfakes: If anything can be real then nothing is real<br/>April C Wright</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2019/grrcon-2019-3-19-network-exploitation-of-iot-ecosystems-fotios-ithilgore-chantzis">Network exploitation of IoT ecosystems<br/>Fotios (ithilgore) Chantzis</a></p>]]></description>
    </item>
    <item>
      <title>BSidesSTL 2019 Videos</title>
      <pubDate>Sun, 22 Sep 2019 00:40:15 -0400</pubDate>
      <link>"http://www.irongeek.com/i.php?page=videos/bsidesstl2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/mainlist">"http://www.irongeek.com/i.php?page=videos/bsidesstl2019/mainlist</a><br/>These are the videos of the presentations from <a href="https://bsidesstl.org">BSidesSTL 2019</a>. Big thanks to my video jockeys <a href="https://twitter.com/Mayer302">@Mayer302</a> and <a href="https://twitter.com/l00tation">@l00tation</a> and the video crew Mike and Bob. 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-00-bsidesstl-2019-opening">BSidesSTL 2019 Opening</a><br/></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-01-hacking-is-dead-long-live-hacking-michael-collins">Hacking is Dead - Long Live Hacking<br/>Michael Collins</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-02-pyews-a-cross-platform-python-package-to-interact-with-exchange-web-services-josh-rickard">pyews: A cross platform python package to interact with Exchange Web Services<br/>Josh Rickard</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-03-dont-hate-remediate-brandon-wunderle">Don't Hate - Remediate<br/>Brandon Wunderle</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-04-the-2019-data-breach-investigations-report-from-a-dbir-author-gabriel-bassett">The 2019 Data Breach Investigations Report. From a DBIR author<br/>Gabriel Bassett</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-05-opening-the-door-to-infosec-alexis-womble">Opening the door to InfoSec<br/>Alexis Womble</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-06-everything-i-need-to-know-about-infosec-i-learned-from-gambling-cliff-smith">Everything I Need to Know About Infosec I Learned from Gambling<br/>Cliff Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/2-00-judo-threat-intelligence-frank-angiolelli">Judo Threat Intelligence<br/>Frank Angiolelli</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/2-01-do-you-live-or-die-explaining-machine-learning-with-azure-and-the-titanic-dataset-beth-young">Do You Live or Die? Explaining Machine Learning with Azure and the Titanic dataset<br/>Beth Young</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/2-02-my-trudge-through-it-burnout-keeping-it-at-bay-eric-lee">My Trudge Through IT Burnout &amp; Keeping it at Bay<br/>Eric Lee</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/2-03-securtle-the-security-turtle-sanchari-das">Securtle (The Security Turtle)<br/>Sanchari Das</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesstl2019/1-07-bsidesstl-2019-closing">BSidesSTL 2019 Closing</a></p>]]></description>
    </item>
    <item>
      <title>DerbyCon 9 Videos</title>
      <pubDate>Sun, 8 Sep 2019 21:50:58 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/derbycon9/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/derbycon9/mainlist">http://www.irongeek.com/i.php?page=videos/derbycon9/mainlist</a><br/>These are the videos of the presentations from <a href="http://www.derbycon.com">Derbycon 2019</a>. Big thanks to my video jockeys <a href="https://twitter.com/AlexGatti" data-mentioned-user-id="3456961">AlexGatti</a>, <a href="https://twitter.com/nightcarnage" data-mentioned-user-id="14489536">nightcarnage</a>, <a href="https://twitter.com/securid" data-mentioned-user-id="14575278">securid</a>, <a href="https://twitter.com/theglennbarrett" data-mentioned-user-id="15040085">theglennbarrett</a>, <a href="https://twitter.com/LenIsham" data-mentioned-user-id="17406334">LenIsham</a>, <a href="https://twitter.com/someninjamaster" data-mentioned-user-id="26050165">someninjamaster</a>, <a href="https://twitter.com/SciaticNerd" data-mentioned-user-id="349355831">SciaticNerd</a>,&nbsp; <a href="https://twitter.com/CoryJ1983">CoryJ1983</a>, <a href="https://twitter.com/Skiboy941" data-mentioned-user-id="1852876046">Skiboy941</a>, <a href="https://twitter.com/livebeef" data-mentioned-user-id="2423425960">livebeef</a>, <a href="https://twitter.com/buccaneeris" data-mentioned-user-id="3079305529">buccaneeris</a>, <a href="https://twitter.com/mjnbrn" data-mentioned-user-id="14177000">mjnbrn</a>, <a href="https://twitter.com/sfzombie13" data-mentioned-user-id="4039189756">sfzombie13</a>, <a href="https://twitter.com/kandi3kan3" data-mentioned-user-id="741776247584378880">kandi3kan3</a>, <a href="https://twitter.com/ZTC1980" data-mentioned-user-id="60677211">ZTC1980</a>, <a href="https://twitter.com/soc_analyst" data-mentioned-user-id="891008077662638081">soc_analyst</a>, <a href="https://twitter.com/m3l1e" data-mentioned-user-id="18829968">m3l1e</a>, <a href="https://twitter.com/primestick" data-mentioned-user-id="66065772">primestick</a>, <a href="https://twitter.com/dmmeurdebitcard">dmmeurdebitcard</a>, Mel&nbsp; and <a href="https://twitter.com/TeaPartyTechie" data-mentioned-user-id="2324176069">TeaPartyTechie.</a>]]></description>
    </item>
    <item>
      <title>OISF 2019 Videos</title>
      <pubDate>Sat, 13 Jul 2019 21:03:32 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/oisf2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/oisf2019/mainlist">OISF 2019 Videos</a><br/>These are the videos from the <a href="http://www.ohioinfosec.org">OISF Anniversary Event</a>
<p></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-00-introduction-dr-john-carls-paul-hankins">Introduction<br/>Dr. John Carls/Paul Hankins</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-01-uboot-to-root-deral-heiland">UBoot to Root<br/>Deral Heiland</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-02-a-discussion-of-secrets-robert-stewart">A Discussion of Secrets<br/>Robert Stewart</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-03-continuous-skills-improvement-for-everyone-matt-scheurer">Continuous Skills Improvement For Everyone<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-04-dlp-demystified-micah-brown">DLP Demystified<br/>Micah Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2019/oisf-2019-05-pixel-tracking-how-its-used-and-abused-barry-kimball">Pixel Tracking: How it’s used and abused<br/>Barry Kimball</a></p>]]></description>
    </item>
    <item>
      <title>BSides Cleveland 2019 Videos</title>
      <pubDate>Sat, 22 Jun 2019 17:31:19 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/mainlist">http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/mainlist</FONT></B></a><br/>These are the videos from the <a href="http://bsidescle.com">Bsides Cleveland</a> conference. Thanks to Rich, <a href="https://twitter.com/ninewires">ninewires</a>, <a href="https://twitter.com/justinschmitt">justinschmitt</a> &amp; <a role=presentation class="twitter-atreply pretty-link" href="https://twitter.com/securid">securid</a>&nbsp;as the video team. Thanks to <a href="https://twitter.com/twuntymcslore">twuntymcslore</a> &amp; <a href="https://twitter.com/RockieBrockway">RockieBrockway</a> for being con mom &amp; dad.
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-00-keynote-david-kennedy">Keynote<br/>David Kennedy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-01-operationalizing-the-mitre-attck-framework-robert-olson">Operationalizing the MITRE ATT&amp;CK Framework<br/>Robert Olson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-02-markets-for-malware-adam-hogan">Markets for Malware<br/>Adam Hogan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-03-the-tip-of-the-stinger-efficiently-using-threat-intelligence-with-thehive-matthew-gracie">The TIP of the Stinger: Efficiently Using Threat Intelligence With TheHive<br/>Matthew Gracie</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-04-calls-to-arms-us-elections-hacking-damian-huising">Calls to Arms: US Elections Hacking<br/>Damian Huising</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-b-05-the-overlooked-cyber-security-risk-3rd-party-risk-management-rose-songer">The Overlooked Cyber-Security Risk: 3rd Party Risk Management<br/>Rose Songer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-a-00-the-politics-of-cyber-ian-thornton-trump">The Politics of Cyber<br/>Ian Thornton-Trump</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-a-01-unix-the-other-white-meat-adam-len-compton-david-boyd">Unix: the Other White Meat<br/>Adam Len Compton &amp; David Boyd</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-a-02-hack-for-show-report-for-dough-brian-king">Hack for Show, Report for Dough<br/>Brian King</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-a-04-early-detection-through-deception-jason-nester">Early Detection through Deception<br/>Jason Nester</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-00-eval-villain-simplifying-dom-xss-and-js-reversing-dennis-goodlett">Eval Villain: Simplifying DOM XSS and JS Reversing<br/>Dennis Goodlett</a><br/>(Most Audio Missing)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-01-securing-the-dom-from-the-bottom-up-mike-samuel">Securing the DOM from the Bottom Up<br/>Mike Samuel</a><br/>(Missing Most Audio)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-02-data-access-rights-exploits-under-new-privacy-laws-amber-welch">Data Access Rights Exploits under New Privacy Laws <br/>Amber Welch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-a-03-public-partnership-panel-for-security-response-jeremy-mio">Public Partnership Panel for Security Response<br/>Jeremy Mio and Others</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-03-automating-windows-kernel-analysis-with-symbolic-execution-spencer-mcintyre">Automating Windows Kernel Analysis With Symbolic Execution<br/>Spencer McIntyre</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-04-incident-response-on-macos-thomas-reed">Incident response on macOS<br/>Thomas Reed</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2019/bsides-cleveland-c-05-getting-youth-interested-in-infosec-from-a-youths-perspective-tristan-messner">Getting youth interested in infosec from a youth's perspective.<br/>Tristan Messner</a></p>
<p>Keynote<br/>Joshua Corman <br/>(Not Recorded)</p>]]></description>
    </item>
    <item>
      <title>ShowMeCon 2019 Videos</title>
      <pubDate>Sat, 15 Jun 2019 05:43:19 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/showmecon2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<p align="left">Link:<a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/mainlist">http://www.irongeek.com/i.php?page=videos/showmecon2019/mainlist</a><br/>These are the videos <a href="http://www.showmecon.com">ShowMeCon 2019</a>. Thanks to Renee &amp; Dave Chronister (<a href="https://twitter.com/bagomojo">@bagomojo</a>) and others for having me out to record and speak. Also thanks to my video crew <a href="https://twitter.com/r3tr0_cod3x">@r3tr0_cod3x</a>, James, Aaron, Jon, <a href="https://twitter.com/AlexTShell">@AlexTShell</a>, <a href="https://twitter.com/Mayer302">@Mayer302</a>, <a href="https://twitter.com/MatthewRekos">@MatthewRekos</a>&nbsp; and some other people I may have forgotten.</p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-welcome">Welcome</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-00-a-practical-approach-to-purple-teaming-matt-thelen">A Practical Approach to Purple Teaming<br/>Matt Thelen</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-01-some-assumbly-required-instructions-not-included-dave-chronister">Some assembly required, instructions not included<br/>Dave Chronister</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-02-the-dark-side-of-physical-access-control-systems-valerie-thomas">The Dark Side of Physical Access Control Systems<br/>Valerie Thomas</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-03-the-art-of-cyberwar-a-foundation-and-framework-for-the-development-of-ttps-kevin-l-johnson">The Art of Cyberwar: A Foundation and Framework for the Development of TTPs<br/>Kevin L. Johnson</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-04-human-centered-design-and-you-hack-your-life-hudson-harris">Human Centered Design and You: Hack Your Life<br/>Hudson Harris</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-05-the-rising-geopolitical-cyber-power-kurt-aubuchon">The rising geopolitical cyber power<br/>Kurt Aubuchon</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-06-cracking-the-code-hacking-the-human-mind-scott-holman">Cracking the Code - Hacking the Human Mind<br/>Scott Holman</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-07-confessions-of-really-bad-sysadmins-andy-thompson">Confessions of Really Bad SysAdmins<br/>Andy Thompson</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-08-sync-your-sht-why-its-time-you-paid-attention-to-time-john-clark">Sync Your Sh*t: Why it's time you paid attention to time<br/>John Clark</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-09-how-to-screw-up-your-incident-response-investigation-in-10-steps-or-less-vadon-willis">How to screw up your Incident Response investigation in 10 steps or less<br/>Vadon Willis</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-10-control-of-unclassified-information-in-non-federal-it-systems-or-what-you-dont-know-can-cost-you-tim-grace">Control of Unclassified Information in Non-Federal IT Systems - Or What You Don't Know Can Cost You<br/>Tim Grace</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-11-why-should-your-employees-know-how-to-phish-mike-morris">Why should your employees know how to phish<br/>Mike Morris</a></p>
<CENTER>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-13-redesigning-password-authentication-for-the-modern-web-cliff-smith">Redesigning Password Authentication for the Modern Web<br/>Cliff Smith</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-14-penetration-testing-the-good-bad-and-the-ugly-of-vendor-management-reporting-and-risk-management-or-lack-thereof-justin-l-bauman">Penetration Testing: The Good, Bad, and the Ugly of Vendor Management, Reporting and Risk Management (or lack thereof)<br/>Justin L. Bauman</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-15-why-your-red-team-shouldnt-be-snowflakes-isaiah-sarju">Why your red team shouldn't be snowflakes<br/>Isaiah Sarju</a></p>
<CENTER>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-17-0day-to-heroday-bringing-a-company-from-scorched-earth-to-a-modern-security-organization-ryan-wisniewski">0Day to HeroDay: Bringing a company from scorched earth to a modern security organization<br/>Ryan Wisniewski</a></p>
<CENTER>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-19-the-great-explainer-feynman-and-standing-on-the-shoulders-of-giants-kevin-johnson">The Great Explainer: Feynman and Standing on the Shoulders of Giants<br/>Kevin Johnson</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-20-tlsv13-minor-version-major-changes-john-wagnon">TLSv1.3: Minor Version, Major Changes<br/>John Wagnon</a></p>
<CENTER>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/showmecon2019/showmecon-2019-21-i-pwn-thee-i-pwn-thee-not-jayson-street">I PWN thee, I PWN thee not!<br/>Jayson Street</a></p></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER></CENTER>]]></description>
    </item>
    <item>
      <title>Circle City Con 2019 Videos</title>
      <pubDate>Sun, 2 Jun 2019 14:16:47 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/circlecitycon2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/mainlist">http://www.irongeek.com/i.php?page=videos/circlecitycon2019/mainlist</a><br/>These are the <a href="http://circlecitycon.com/">Circle City Con</a> videos. Thanks to the staff for inviting me down to record. Big thanks to <a href="https://twitter.com/irishjack">@irishjack</a>, <a href="https://twitter.com/TheHomoHacker">@TheHomoHacker</a>, <a href="https://twitter.com/Paint27">@Paint27</a>, <a href="https://twitter.com/songsthatsaved">@songsthatsaved</a>, <a href="https://twitter.com/nogoodrobot">@nogoodrobot</a>, <a href="https://twitter.com/kitwessendorf">@kitwessendorf</a>, <a href="https://twitter.com/cxstephens">@cxstephens</a>, <a href="https://twitter.com/uncrustabl3">@uncrustabl3</a>&nbsp; and others for helping set up AV and record. 
<p>&nbsp;
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/opening">Opening</a>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-00-data-access-rights-exploits-under-new-privacy-laws-amber-welch">Data Access Rights Exploits under New Privacy Laws<br/>Amber Welch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-00-how-to-reach-and-teach-youth-about-cybersecurity-if-anybody-will-let-you-jason-smith">How to reach and teach youth about Cybersecurity (if anybody will let you)<br/>Jason Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-01-more-tales-from-the-cryptanalyst-jeff-man">More Tales from the Crypt...Analyst<br/>Jeff Man</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-01-could-static-code-analysis-and-secure-coding-have-saved-the-death-star-mary-waddick">Could Static Code Analysis and Secure Coding have Saved the Death Star?<br/>Mary Waddick</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-02-ill-complete-my-threat-model-later-mom-infosec-in-middle-school-ashley-benitez-smith">I’ll Complete My Threat Model Later Mom!: Infosec in Middle School.<br/>Ashley Benitez Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-02-cons-careers-steven-bernstein">Cons &amp; Careers<br/>Steven Bernstein</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-03-3d-printing-canister-launchable-drones-for-city-scale-wardriving-glytch-tech">3D printing canister-launchable drones for city-scale wardriving<br/>Glytch Tech</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-03-the-hunter-games-how-to-find-the-adversary-with-event-query-language-ross-wolf">The Hunter Games: How to find the adversary with Event Query Language<br/>Ross Wolf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-04-star-wars-how-an-ineffective-data-governance-program-destroyed-the-galactic-empire-micah-brown">Star Wars: How an ineffective Data Governance Program destroyed the Galactic Empire<br/>Micah Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/main-track-1-2-04-security-lessons-from-the-woofmutt-chris-roberts">Security lessons from the Woofmutt…<br/>Chris Roberts</a></p>
<p>What The Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing<br/>Priyank Nigam<br/>(Not Recorded)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-05-its-coming-from-inside-the-house-an-inside-out-approach-to-nodejs-application-security-yolonda-smith">It's Coming From Inside the House: An Inside-Out Approach to NodeJS Application Security<br/>Yolonda Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-00-get-off-my-lawn-or-are-we-looking-for-the-right-people-mike-shecky-kavka">Get off my lawn… or are we looking for the right people?<br/>Mike (Shecky) Kavka</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-01-endpoint-security-swimming-through-the-snake-oil-dan-beavin">Endpoint Security, Swimming Through the Snake Oil<br/>Dan Beavin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-01-do-you-have-what-it-takes-how-to-support-your-career-from-community-involvement-kathleen-smith">Do You Have What It Takes? How to Support Your Career From Community Involvement<br/>Kathleen Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-06-catching-the-guerrilla-powershell-counterinsurgency-aaron-sawyer">Catching the Guerrilla: Powershell Counterinsurgency<br/>Aaron Sawyer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-07-sigint-for-the-masses-building-and-using-a-signals-intelligence-platform-for-less-than-150-josh-conway">SigInt for the Masses: Building and Using a Signals Intelligence Platform for Less than $150<br/>Josh Conway</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-02-infosuck-the-nasty-bits-of-the-industry-we-want-to-tell-noobs-but-arent-allowed-to-in-polite-company-danny-akacki">InfoSuck: The Nasty Bits Of The Industry We Want To Tell Noobs But Aren't Allowed To In Polite Company.<br/>Danny Akacki</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-02-standardizer-a-standardization-framework-for-your-security-alerts-christian-burrows">Standardizer: a standardization framework for your security alerts<br/>Christian Burrows</a></p>
<p>Call Of Duty, Modernest Browser Warfare v2<br/>Dhiraj Mishra<br/>(Did not happen)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-03-information-security-practice-principles-a-rosetta-stone-for-information-security-work-susan-sons">Information Security Practice Principles a Rosetta Stone for information security work<br/>Susan Sons</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-03-what-can-data-science-do-for-security-wendy-edwards">What Can Data Science Do for Security?<br/>Wendy Edwards</a></p>
<p>Deepfakes: If anything can be real then nothing is real<br/>April Wright<br/>(Not Recorded)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-04-evicting-the-password-from-the-digital-estate-alex-chalmers">Evicting the Password from the Digital Estate<br/>Alex Chalmers</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-04-a-theme-of-fear-hacking-the-paradigm-catherine-ullman">A Theme of Fear: Hacking the Paradigm<br/>Catherine Ullman</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-09-beginning-dfir-how-to-get-started-with-cooties-lisa-wallace">Beginning DFIR - How to get started with Cooties<br/>Lisa Wallace</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-05-of-cors-its-exploitable-whats-possible-with-cross-origin-resource-sharing-rebecca-deck">Of CORS it's Exploitable! What's Possible with Cross-Origin Resource Sharing?<br/>Rebecca Deck</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-10-nexus-zeta-how-a-newbie-hacker-managed-to-create-a-monster-botnet-adi-ikan">Nexus Zeta - How a newbie hacker managed to create a monster botnet<br/>Adi Ikan</a></p>
<p>5G: Security Pitfalls and Considerations<br/>Swapnil Deshmukh<br/>(Did not happen)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-06-training-and-education-for-the-new-realities-of-privacy-and-security-mitchell-parker">Training and Education for the New Realities of Privacy and Security<br/>Mitchell Parker</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-06-container-security-deep-dive-yashvier-kosaraju">Container Security Deep Dive<br/>Yashvier Kosaraju</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-11-hacking-humans-addressing-vulnerabilities-in-the-advancing-medical-device-landscape-gabrielle-hempel">Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape<br/>Gabrielle Hempel</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-07-one-random-insecure-wep-application-please-oriwap-nancy-snoke">One Random Insecure Wep Application Please (ORIWAP)<br/>Nancy Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-07-an-implantable-computer-doug-c00p3r-copeland">an Implantable Computer<br/>Doug "c00p3r" Copeland</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-12-modern-appsec-gotchas-fletcher-heisler">Modern AppSec Gotchas<br/>Fletcher Heisler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-08-a-few-things-right-insights-from-live-and-simulated-incident-response-chad-calease">A Few Things Right: Insights from Live and Simulated Incident Response<br/>Chad Calease</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-08-the-resilient-reddit-c2-zach-zenner">The Resilient Reddit C2<br/>Zach Zenner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-13-behind-the-locked-door-we-built-an-escape-room-for-security-awareness-matthew-southworth-christian-bobadilla">Behind The Locked Door: we built an escape room for security awareness<br/>Matthew Southworth Christian Bobadilla</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-1-09-f-attribution-xena-olsen-jared-peck">F! Attribution<br/>Xena Olsen Jared Peck</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-3-14-inside-out-security-building-castles-not-warehouses-alyssa-miller">Inside Out Security - Building Castles not Warehouses<br/>Alyssa Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/track-2-09-failure-is-not-an-option-developing-realistic-disaster-recovery-tests-colin-campbell">Failure Is Not an Option: Developing Realistic Disaster Recovery Tests<br/>Colin Campbell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/global-00-wibbly-wobbly-designing-security-for-systems-that-are-bigger-on-the-inside-wolfgang-goerlich">Wibbly Wobbly: Designing Security for Systems that are Bigger on the Inside<br/>Wolfgang Goerlich</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2019/closing">Closing Ceremonies</a></p>]]></description>
    </item>
    <item>
      <title>NolaCon 2019 Videos</title>
      <pubDate>Sun, 19 May 2019 14:46:06 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/nolacon2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/mainlist">http://www.irongeek.com/i.php?page=videos/nolacon2019/mainlist</a><br/>Recorded at <a href="https://nolacon.com/">NolaCon</a> 2019. Thanks to <a href="https://twitter.com/CurtisLaraque">@CurtisLaraque</a>, <a href="https://twitter.com/mikearbrouet">@mikearbrouet</a>, <a href="https://twitter.com/openbayou">@openbayou</a>, <a href="https://twitter.com/takanola">@takanola</a>, <a href="https://twitter.com/therealmacjeezy">@therealmacjeezy</a>, Jason, Cole &amp; <a href="https://twitter.com/klulue">@klulue</a> for the video recording help, and <a href="https://twitter.com/nola_con">@nola_con</a>, <a href="https://twitter.com/erikburgess_">@erikburgess_</a>, <a href="https://twitter.com/NolaConYvonne">@NolaConYvonne</a> &amp; Rob for having me down to record. 
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-00-one-random-insecure-wep-application-please-oriwap-nancy-snoke">One Random Insecure Wep Application Please (ORIWAP)<br/>Nancy Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-02-understanding-xss-christina-mitchell">Understanding XSS<br/>Christina Mitchell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-02-social-engineering-at-work-how-to-use-positive-influence-to-gain-management-buy-in-for-anything-april-c-wright">Social Engineering At Work - How to use positive influence to gain management buy-in for anything<br/>April C. Wright</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-03-dns-strategies-for-reducing-data-leakage-protecting-online-privacy-jim-nitterauer">DNS - Strategies for Reducing Data Leakage &amp; Protecting Online Privacy<br/>Jim Nitterauer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-04-automating-hashtopolis-evil-mog">Automating Hashtopolis<br/>Evil Mog</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-04-its-malware-time-a-bar-crawl-from-skunked-homebrew-to-rotten-apples-erika-noerenberg">"It's Malware Time" - A Bar Crawl from Skunked Homebrew to Rotten Apples<br/>Erika Noerenberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-05-breaking-into-cyber-how-the-hell-are-you-supposed-to-get-started-josh-millsap">Breaking into Cyber: How the hell are you supposed to get started?<br/>Josh Millsap</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-06-after-mirai-cyber-security-implications-of-iot-botnet-proliferation-against-critical-infrastructure-paul-w-brager-jr-msci-cissp-gicsp-cism">After Mirai: Cyber Security Implications of IoT Botnet Proliferation Against Critical Infrastructure<br/>Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-05-making-an-internal-lets-encrypt-relay-server-josh-harvey">Making an internal Let's Encrypt relay server<br/>Josh Harvey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-06-keynote-i-pwn-thee-i-pwn-thee-not-jayson-e-street">Keynote - I PWN thee, I PWN thee not!<br/>Jayson E. Street</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-07-breaking-into-your-building-a-hackers-guide-to-unauthorized-physical-access-brent-white-tim-roberts">Breaking Into Your Building: A Hacker's Guide to Unauthorized Physical Access<br/>Brent White. Tim Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-07-formula-for-a-bug-bounty-program-chris-holt">Formula for a Bug Bounty Program<br/>Chris Holt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-08-forensics-phish-tank-breaking-down-analysis-of-advanced-phishing-emails-joe-gray-sophia-fadli">Forensics Phish Tank: Breaking Down Analysis of Advanced Phishing Emails<br/>Joe Gray &amp; Sophia Fadli</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-09-baking-your-anomalous-cookies-jim-allee">Baking Your Anomalous Cookies<br/>Jim Allee</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-10-waiter-theres-a-compiler-in-my-shellcode-josh-stone">Waiter, there's a compiler in my shellcode!<br/>Josh Stone</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-08-empathy-for-the-developer-lessons-learned-building-an-application-security-module-yolonda-smith">Empathy for the (Devel)oper: Lessons Learned Building An Application Security Module<br/>Yolonda Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-11-more-tales-from-the-cryptanalyst-jeff-man">MORE Tales From the Crypt...Analyst<br/>Jeff Man</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-09-ir-with-volatility-framework-evan-wagner">IR with Volatility Framework<br/>Evan Wagner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-10-lets-talk-about-waf-bypass-baby-brett-gravois">Let's Talk About WAF (Bypass) Baby<br/>Brett Gravois</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-d-12-behavioral-security-and-offensive-psychology-at-scale-josh-schwartz-samantha-davison">Behavioral Security and Offensive Psychology at Scale<br/>Josh Schwartz. Samantha Davison</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-11-my-making-of-a-metasploit-module-aaron-ringo">My making of a Metasploit Module<br/>Aaron Ringo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-12-dont-panic-a-beginners-guide-to-hardware-hacking-phoenix-snoke">Don't Panic! A Beginner's Guide To Hardware Hacking<br/>Phoenix Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-13-the-jazz-improv-of-infosec-damon-j-small">The Jazz Improv of Infosec<br/>Damon J. Small</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2019/nolacon-2019-c-14-elliptic-curve-cryptography-what-it-is-and-who-needs-it-michele-bousquet">Elliptic Curve Cryptography: What it is and who needs it<br/>Michele Bousquet</a></p>]]></description>
    </item>
    <item>
      <title>Hacker/Infosec Con Types &amp; Getting More Out Of Hacker/Infosec Conferences</title>
      <pubDate>Fri, 5 Apr 2019 19:35:06 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=security/hacker-infosec-con-types-getting-more-out-of-hacker-infosec-conferences</link>
      <category>article</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=security/hacker-infosec-con-types-getting-more-out-of-hacker-infosec-conferences">Hacker/Infosec Con Types &amp; Getting More Out Of Hacker/Infosec Conferences</a>
<p>Link:<a href="http://www.irongeek.com/i.php?page=security/hacker-infosec-con-types-getting-more-out-of-hacker-infosec-conferences">http://www.irongeek.com/i.php?page=security/hacker-infosec-con-types-getting-more-out-of-hacker-infosec-conferences</a></p>]]></description>
    </item>
    <item>
      <title>BSides Columbus 2019 Video</title>
      <pubDate>Fri, 1 Mar 2019 23:18:53 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/mainlist">
http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/mainlist</a><br>
These are the videos from the BSides Columbus Ohio conference. Thanks to Mitch &amp; 
Mike Spaulding for having me up and those who manned the video rigs such as 
Cody, Matt, Dillon, Nick, Cole Chris and others whose name I can't seem to 
remember in my old age..<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/opening">
Opening</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-g-00-morning-keynote-featuring-runa-sandvik-runa-sandvik">
Morning Keynote Featuring Runa Sandvik<br>
Runa Sandvik</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-1-00-hackers-hooligans-heists-history-brian-contos">
HACKERS, HOOLIGANS, HEISTS, &amp; HISTORY<br>
Brian Contos</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-2-00-scrapping-for-pennies-how-to-implement-security-without-a-budget-ryan-wisniewski">
Scrapping for Pennies: How to implement security without a budget<br>
Ryan Wisniewski</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-3-00-check-your-privilege-escalation-kate-broussard">
Check Your Privilege (Escalation)<br>
Kate Broussard</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-4-00-wow-it-really-is-always-dns-becoming-a-part-of-the-ddos-problem-on-purpose-cody-smith">
Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose 
).<br>
Cody Smith</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-1-01-unix-the-other-white-meat-adam-compton-and-david-boyd">
Unix: The Other White Meat<br>
Adam Compton and David Boyd</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-2-01-puppet-masters-how-social-engineers-continue-to-pull-our-strings-erich-kron">
Puppet Masters: How Social Engineers Continue to Pull Our Strings<br>
Erich Kron</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-3-01-e-zhack-an-update-on-sdr-and-toll-booth-reverse-engineering-kyle-westhaus">
E-ZHack: An Update on SDR and Toll Booth Reverse Engineering<br>
Kyle Westhaus</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-4-01-mobile-app-vulnerabilities-the-bad-the-worse-and-the-ugly-ray-kelly">
Mobile App Vulnerabilities - The Bad, The Worse And The Ugly<br>
Ray Kelly</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-1-02-mixing-and-baking-a-new-appsec-person-bill-sempf">
Mixing and Baking a New AppSec Person<br>
Bill Sempf</a><br>
(Some Missing Audio)</p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-2-02-how-online-dating-made-me-better-at-threat-modeling-isaiah-sarju">
How Online Dating Made Me Better at Threat Modeling<br>
Isaiah Sarju</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-3-02-what-on-earth-is-quantum-computing-and-will-it-break-all-my-encryption-craig-stuntz">
What On Earth Is Quantum Computing?!? (And will it break all my encryption?)<br>
Craig Stuntz</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-4-02-battling-magecart-the-risks-of-third-party-scripts-kevin-gennuso">
Battling Magecart: The Risks of Third-Party Scripts<br>
Kevin Gennuso</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-1-03-ship-hacking-data-on-the-open-seas-brian-olson">
Ship Hacking: Data on the Open Seas<br>
Brian Olson</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-3-03-common-developer-crypto-mistakes-with-illustrations-in-java-kevin-wall">
Common Developer Crypto Mistakes (with illustrations in Java)<br>
Kevin Wall</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-4-03-the-overlooked-cyber-security-risk-3rd-party-risk-management-rose-songer">
The Overlooked Cyber Security Risk: 3rd Party Risk Management<br>
Rose Songer</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-1-04-the-path-to-iam-maturity-jerod-brennan">
The Path to IAM Maturity<br>
Jerod Brennan</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-2-04-assumed-breach-testing-brendan-oconnor">
Assumed Breach Testing<br>
Brendan O'Connor</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-3-04-api-security-tokens-flows-and-the-big-bad-wolf-ingy-youssef">
API Security: Tokens, Flows and the Big Bad Wolf<br>
Ingy Youssef</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-4-04-demystifying-dmarc-a-guide-to-preventing-email-spoofing-sean-whalen">
Demystifying DMARC: A guide to preventing email spoofing<br>
Sean Whalen</a></p>
<p>
<a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2019/bsidescmh2019-g-01-afternoon-keynote-featuring-craig-hoffman-craig-hoffman">
Afternoon Keynote Featuring Craig Hoffman<br>
Craig Hoffman</a>]]></description>
    </item>
    <item>
      <title>BSides Tampa 2019 Videos</title>
      <pubDate>Sun, 3 Feb 2019 14:31:09 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidestampa2019/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/mainlist">http://www.irongeek.com/i.php?page=videos/bsidestampa2019/mainlist</a><br/>These are the videos from the <a href="http://bsidestampa.net/">BSides Tampa</a> conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew: Matthew, Bridget, Patrick, Dan, Mike, Audrey and Chris <br/>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/opening">Opening</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/b-00-doesnt-it-make-you-wannacry-mitigating-ransomware-on-a-windows-network-david-branscome">Doesn't It make You WannaCry: Mitigating Ransomware on a Windows Network<br/>David Branscome</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/b-01-regex-for-incident-response-daniel-nutting-bryan-turner">RegEx for Incident Response<br/>Daniel Nutting Bryan Turner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/b-02-intermediate-physical-security-justin-wynn">Intermediate Physical Security<br/>Justin Wynn</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/b-03-security-analytics-in-the-cloud-marc-baker">Security Analytics in the Cloud<br/>Marc Baker</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/de-00-how-to-use-400m-endpoints-to-build-strong-ai-detection-systems-filip-chytry">How to use 400+M endpoints to build strong AI detection systems<br/>Filip Chytry</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-00-2020-enterprise-security-monitoring-seeing-clearly-with-security-onion-wes-lambert">20/20 Enterprise Security Monitoring: Seeing clearly with Security Onion<br/>Wes Lambert</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/beyond-lockpicking-brian-etchieso">Beyond Lockpicking<br/>Brian Etchieson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-02-social-forensication-a-multidisciplinary-approach-to-successful-social-engineering-joe-gray">Social Forensication: A Multidisciplinary Approach to Successful Social Engineering<br/>Joe Gray</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-03-phishing-u2f-protected-accounts-nikita-mazurov-kenny-brown">Phishing U2F-Protected Accounts<br/>Nikita Mazurov Kenny Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-04-election-hacking-getting-ready-for-the-russian-onslaught-in-2020-jeremy-rasmussen">Election Hacking: Getting Ready for the Russian Onslaught in 2020<br/>Jeremy Rasmussen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-05-logging-pitfalls-and-how-to-abuse-them-kevin-kaminski-michael-music">Logging Pitfalls and How to Abuse Them<br/>Kevin Kaminski Michael Music</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/e-06-personal-security-while-on-travel-with-additional-pro-tips-from-seasoned-travelers-derek-banks-beau-bullock">Personal security while on travel with additional pro-tips from seasoned travellers.<br/>Derek Banks Beau Bullock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-00-securing-shadow-it-gene-cronk">Securing Shadow IT<br/>Gene Cronk</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-01-day-when-quantum-computers-breaks-crypto-roger-grimes">Day When Quantum Computers Breaks Crypto<br/>Roger Grimes</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-02-an-inside-look-at-stopping-unauthorized-sellers-counterfeiters-on-amazon-bruce-anderson">An Inside Look At Stopping Unauthorized Sellers &amp; Counterfeiters On Amazon<br/>Bruce Anderson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-03-the-sound-of-evil-wes-widner">The Sound of Evil<br/>Wes Widner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-04-serverless-security-top-10-tal-melamed">Serverless Security Top 10<br/>Tal Melamed</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-05-hacking-iot-devices-by-chaining-application-security-vulnerabilities-rick-ramgattie">Hacking IoT devices by chaining application security vulnerabilities<br/>Rick Ramgattie</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/d-06-becoming-a-human-nmap-cultivating-a-renaissance-approach-for-the-social-engineer-tigran-terpandjian">Becoming a Human nMAP! Cultivating a Renaissance Approach for the Social Engineer<br/>Tigran Terpandjian</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2019/vciso-is-that-the-right-answer-mike-brooks">vCISO Is That the Right Answer<br/>Mike Brooks</a></p>]]></description>
    </item>
    <item>
      <title>SecureWV/Hack3rcon 2018 Videos </title>
      <pubDate>Sun, 2 Dec 2018 20:20:00 -0500</pubDate>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/mainlist">http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/mainlist</a><br/>These are the videos of the presentations from <a href="http://securewv.com/">Secure West Virginia 2018</a>. Thanks to Justin, Tim, Lacy, Dave, Katie, Kevin, Todd, Alice, Brian, Brandon &amp; Jon for helping record. 
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-00-intro-welcome-to-securewv-hack3rcon-benny-karnes">Intro/Welcome to SecureWV / Hack3rCon</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-01-keynote-hackers-hugs-drugs-part-ii-amanda-berlin">Keynote - Hackers, Hugs, &amp; Drugs.... Part II<br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-02-why-the-legal-system-needs-your-help-brian-martin">Why The Legal System Needs Your Help<br/>Brian Martin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-03-mobile-devices-and-you-detective-jeremy-m-thompson">Mobile devices and you.<br/>Detective Jeremy M. Thompson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-04-the-new-age-of-ransomware-cybercriminals-adopt-nation-state-techniques-allan-liska">The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques<br/>Allan Liska</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-06-outside-the-box-how-the-internet-of-things-poses-new-cybersecurity-risks-and-challenges-the-law-evan-kime">Outside the Box: How the Internet of Things Poses New Cybersecurity Risks and Challenges the Law<br/>Evan Kime</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-07-applying-the-principles-of-dodgeball-a-true-underdog-story-to-ctfs-branden-miller">Applying the principles of Dodgeball: A True Underdog Story to CTFs<br/>Branden Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/gun-safety-class-branden-miller">Gun Safety Class<br/>Branden Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-1-01-python-scripting-justin-rogosky">Python Scripting<br/>Justin Rogosky</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-2-00-red-hat-enterprise-linux-security-technologies-lab-lucy-kerner-and-roy-williams">Red Hat Enterprise Linux Security Technologies Lab<br/>Lucy Kerner and Roy Williams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-2-01-automating-security-operations-on-a-budget-jeremy-mio">Automating Security Operations - on a budget<br/>Jeremy Mio</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-08-security-automation-for-the-blue-team-eric-waters">Security Automation for the Blue Team<br/>Eric Waters</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-09-home-alone-a-pentester-perspective-craig-vincent-derek-banks">Home Alone: A Pentester Perspective<br/>Craig Vincent &amp; Derek Banks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-10-simplified-red-hat-enterprise-linux-identity-authentication-and-authorization-management-with-microsoft-active-directory-and-red-hat-identity-management-trust-roy-williams">Simplified Red Hat Enterprise Linux Identity, Authentication, and Authorization management with Microsoft Active Directory and Red Hat Identity Management Trust<br/>Roy Williams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-11-simple-attribution-in-social-media-and-websites-brian-martin">Simple Attribution in Social Media and Websites<br/>Brian Martin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-12-offensive-and-defensive-security-with-ansible-lucy-kerner">Offensive and Defensive Security with Ansible<br/>Lucy Kerner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-13-high-school-competitive-robotics-and-why-you-should-care-charleston-area-robotics-team-cart">High School Competitive Robotics and why you should care.<br/>Charleston Area Robotics Team (CART)</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-14-guaranteed-failure-awareness-the-greatest-cyber-insanity-joshua-crumbaugh">Guaranteed Failure - Awareness The Greatest Cyber Insanity<br/>Joshua Crumbaugh</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-15-developing-a-cloud-based-cyber-security-simulation-portal-david-krovich">Developing a Cloud Based Cyber Security Simulation Portal<br/>David Krovich</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-1-02-the-hybrid-home-lab-from-laptop-to-cloud-holden-fenner">The Hybrid Home Lab: From Laptop to Cloud<br/>Holden Fenner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-1-03-securing-your-networks-with-ansible-adam-vincent">Securing your networks with Ansible<br/>Adam Vincent</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-2-02-a-deep-look-at-stack-buffer-overflows-and-format-string-vulnerabilities-philip-polstra">A deep look at Stack Buffer Overflows and Format String Vulnerabilities<br/>Philip Polstra</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-2-03-advanced-threat-hunting-with-open-source-tools-and-no-budget-joseph-deplato">Advanced threat hunting with open-source tools and no budget<br/>Joseph DePlato</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-16-whats-in-a-domain-name-collin-meadows">What's in a Domain Name?<br/>Collin Meadows</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-17-monitoring-your-home-lan-with-python-zach-tackett">Monitoring your home LAN with Python<br/>Zach Tackett</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-18-left-of-boom-ted-corbeill">Left of Boom<br/>Ted Corbeill</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-19-your-dead-now-what-how-to-help-your-family-after-your-gone-steven-truax">Your Dead! Now what. How to help your family after your gone.<br/>Steven Truax</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/class-1-04-a-brief-introduction-to-metasploit-joey-maresca">A Brief Introduction to Metasploit<br/>Joey Maresca</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2018/speaker-20-securewv-hack3rcon-closing-awards-benny-karnes">SecureWV / Hack3rCon Closing / Awards<br/>Benny Karnes</a></p>]]></description>
    </item>
    <item>
      <title>BSidesRDU 2018 Videos</title>
      <pubDate>Fri, 19 Oct 2018 19:54:53 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/mainlist</a><br/>These are the videos of the presentations from <a href="https://BSidesRDU.org">BSidesRDU</a>. Thanks to Cyrus, Brian, James Carl and others for all the work. 
<p></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-00-welcome-opening-remarks-bsidesrdu-staff">Welcome &amp; Opening Remarks<br/>BsidesRDU Staff</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-01-keynote-from-shahid-buttar-eff-director-of-grassroots-advocacy-shahid-buttar">Keynote from Shahid Buttar, EFF Director Of Grassroots Advocacy <br/>Shahid Buttar</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-02-approaching-parity-considerations-for-adapting-enterprise-monitoring-matt">Approaching Parity: Considerations for adapting enterprise monitoring and incident response (IR) capabilities for efficacy in cloud environments, and how to operationalize these capabilities with a playbook.<br/>Matt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-03-movement-after-initial-compromise-sleepz3r0-and-ha12tl3y">Movement After Initial Compromise<br/>SleepZ3R0 and HA12TL3Y</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-04-our-docker-app-got-hacked-now-what-joel-lathrop">Our Docker app got hacked. Now what?<br/>Joel Lathrop</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-06-sky-high-ir-ir-at-cloud-scale-aarondlancaster">Sky-high IR - IR at Cloud Scale<br/>@aarondlancaster</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-07-when-it-rains-it-pours-sam-granger">When it rains it pours<br/>Sam Granger</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-08-rise-of-the-advisor-neal-humphrey">Rise of the Advisor<br/>Neal Humphrey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-10-no-network-needed-ron-burkett">No Network Needed?!?!<br/>Ron Burkett</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesrdu2018/bsidesrdu-2018-11-wargames-justin-hoeckle">WarGames<br/>Justin Hoeckle</a></p>]]></description>
    </item>
    <item>
      <title>Derbycon 2018 Videos </title>
      <pubDate>Mon, 8 Oct 2018 13:51:15 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist">http://www.irongeek.com/i.php?page=videos/derbycon8/mainlist </a><br/>These are the videos of the presentations from <a href="http://www.derbycon.com">Derbycon 2018</a>. Big thanks to my video jockeys <a href="https://twitter.com/@nightcarnage">@nightcarnage</a>, <a href="https://twitter.com/@securid">@securid</a>, <a href="https://twitter.com/@theglennbarrett">@theglennbarrett</a>, <a href="https://twitter.com/@LenIsham">@LenIsham</a>, <a href="https://twitter.com/@curtisko">@curtisko</a>, <a href="https://twitter.com/@bsdbandit">@bsdbandit</a>, <a href="https://twitter.com/@someninjamaster">@someninjamaster</a>, <a href="https://twitter.com/@Simpo13">@Simpo13</a>, <a href="https://twitter.com/@primestick">@primestick</a>, <a href="https://twitter.com/@SciaticNerd">@SciaticNerd</a>, <a href="https://twitter.com/@CoryJ1983">@CoryJ1983</a>, <a href="https://twitter.com/@SDC_GodFix">@SDC_GodFix</a>, <a href="https://twitter.com/@Skiboy941">@Skiboy941</a>, <a href="mailto:h@TeaPartyTechie">@TeaPartyTechie</a>, <a href="https://twitter.com/@livebeef">@livebeef</a>, <a href="https://twitter.com/@buccaneeris">@buccaneeris</a>, <a href="https://twitter.com/@mjnbrn">@mjnbrn</a>, <a href="https://twitter.com/@sfzombie13">@sfzombie13</a>, <a href="https://twitter.com/@kandi3kan3">@kandi3kan3</a>, <a href="https://twitter.com/@paint27">@paint27</a>, <a href="https://twitter.com/@AlexGatti">@AlexGatti</a> 
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/opening">Opening</a></p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/keynote-00-how-to-influence-security-technology-in-kiwi-underpants-benjamin-delpy">How to influence security technology in kiwi underpants<br/>Benjamin Delpy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/keynote-01-panel-discussion-at-a-glance-information-security-ed-skoudis-john-strand-lesley-carhart-moderated-by-dave-kennedy">Panel Discussion - At a Glance: Information Security<br/>Ed Skoudis, John Strand, Lesley Carhart. Moderated by: Dave Kennedy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-00-red-teaming-gaps-and-musings-samuel-sayen">Red Teaming gaps and musings<br/>Samuel Sayen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-01-a-process-is-no-one-hunting-for-token-manipulation-jared-atkinson-robby-winchester">A Process is No One: Hunting for Token Manipulation<br/>Jared Atkinson, Robby Winchester</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-02-fuzz-your-smartphone-from-4g-base-station-side-tso-jen-liu">Fuzz your smartphone from 4G base station side<br/>Tso-Jen Liu</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-03-clippy-for-the-dark-web-looks-like-youre-trying-to-buy-some-dank-kush-can-i-help-you-with-that-emma-zaballos">Clippy for the Dark Web: Looks Like You're Trying to Buy Some Dank Kush, Can I Help You With That?<br/>Emma Zaballos</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-04-synfuzz-building-a-grammar-based-re-targetable-test-generation-framework-joe-rozner">Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework<br/>Joe Rozner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-05-escoteric-hashcat-attacks-evilmog">Escoteric Hashcat Attacks<br/>Evilmog</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-07-rfid-luggage-tags-iata-vs-real-life-daniel-lagos">RFID Luggage Tags, IATA vs Real Life<br/>Daniel Lagos</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-08-lol-they-placed-their-dmz-in-the-cloud-easy-pwnage-or-disruptive-protection-carl-alexander">#LOL They Placed Their DMZ in the Cloud: Easy Pwnage or Disruptive Protection<br/>Carl Alexander</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-09-maintaining-post-exploitation-opsec-in-a-world-with-edr-michael-roberts-martin-roberts">Maintaining post-exploitation opsec in a world with EDR<br/>Michael Roberts, Martin Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-10-hey-i-found-a-vulnerability-now-what-lisa-bradley-crob">Hey! I found a vulnerability - now what?<br/>Lisa Bradley, CRob</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-11-foxtrot-c2-a-journey-of-payload-delivery-dimitry-snezhkov">Foxtrot C2: A Journey of Payload Delivery<br/>Dimitry Snezhkov</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-12-ridesharks-kaleb-brown">Ridesharks<br/>Kaleb Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-00-irs-hr-microsoft-and-your-grandma-what-they-all-have-in-common-christopher-hadnagy-cat-murdock">IRS, HR, Microsoft and your Grandma: What they all have in common<br/>Christopher Hadnagy, Cat Murdock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-01-lolbins-nothing-to-lol-about-oddvar-moe">#LOLBins - Nothing to LOL about!<br/>Oddvar Moe</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-02-everything-else-i-learned-about-security-i-learned-from-hip-hop-paul-asadoorian">Everything Else I Learned About Security I Learned From Hip-Hop<br/>Paul Asadoorian</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-03-hackers-hugs-drugs-mental-health-in-infosec-amanda-berlin">Hackers, Hugs, &amp; Drugs: Mental Health in Infosec<br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-04-android-app-penetration-testing-101-joff-thyer-derek-banks">Android App Penetration Testing 101<br/>Joff Thyer, Derek Banks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-05-draw-a-bigger-circle-infosec-evolves-cheryl-biswas">Draw a Bigger Circle: InfoSec Evolves<br/>Cheryl Biswas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-00-i-can-be-apple-and-so-can-you-josh-pitts">I Can Be Apple, and So Can You<br/>Josh Pitts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-01-from-workstation-to-domain-admin-why-secure-administration-isnt-secure-and-how-to-fix-it-sean-metcalf">From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It<br/>Sean Metcalf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-02-ms17-010-zerosum0x0">MS17-010?<br/>zerosum0x0</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-03-the-unintended-risks-of-trusting-active-directory-lee-christensen-will-schroeder-matt-nelson">The Unintended Risks of Trusting Active Directory <br/>Lee Christensen, Will Schroeder, Matt Nelson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-04-lessons-learned-by-the-wordpress-security-team-aaron-d-campbell">Lessons Learned by the WordPress Security Team<br/>Aaron D. Campbell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-05-ironpython-omfg-marcello-salvati">IronPython... omfg<br/>Marcello Salvati</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-00-invoke-empirehound-merging-bloodhound-empire-for-enhanced-red-team-workflow-walter-legowski">Invoke-EmpireHound - Merging BloodHound &amp; Empire for Enhanced Red Team Workflow<br/>Walter Legowski</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-01-when-macs-come-under-attck-richie-cyrus">When Macs Come Under ATT&amp;CK<br/>Richie Cyrus</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-02-abusing-iot-medical-devices-for-your-precious-health-records-saurabh-harit-nick-delewski">Abusing IoT Medical Devices For Your Precious Health Records<br/>Saurabh Harit, Nick Delewski</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-03-detecting-wmi-exploitation-michael-gough">Detecting WMI exploitation<br/>Michael Gough</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-04-gryffindor-pure-javascript-covert-exploitation-matthew-toussain">Gryffindor | Pure JavaScript, Covert Exploitation<br/>Matthew Toussain</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-05-instant-response-making-ir-faster-than-you-thought-possible-mick-douglas-josh-johnson">Instant Response: Making IR faster than you thought possible!<br/>Mick Douglas, Josh Johnson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-00-the-history-of-the-future-of-cyber-education-winn-schwartau">The History of the Future of Cyber-Education<br/>Winn Schwartau</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-01-state-of-win32k-security-revisiting-insecure-design-vishal-chauhan">State of Win32k Security: Revisiting Insecure design<br/>Vishal Chauhan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-02-offensive-browser-extension-development-michael-weber">Offensive Browser Extension Development<br/>Michael Weber</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-03-protect-your-payloads-modern-keying-techniques-leo-loobeek">Protect Your Payloads: Modern Keying Techniques<br/>Leo Loobeek</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-04-jump-into-iot-hacking-with-the-damn-vulnerable-habit-helper-device-nancy-snoke-phoenix-snoke">Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device<br/>Nancy Snoke, Phoenix Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-13-tales-from-the-bug-mine-highlights-from-the-android-vrp-brian-claire-young">Tales From the Bug Mine - Highlights from the Android VRP<br/>Brian Claire Young</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-14-decision-analysis-applications-in-threat-analysis-frameworks-emily-shawgo">Decision Analysis Applications in Threat Analysis Frameworks<br/>Emily Shawgo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-15-threat-intel-on-the-fly-tazz">Threat Intel On The Fly<br/>Tazz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-16-make-me-your-dark-web-personal-shopper-emma-zaballos">Make Me Your Dark Web Personal Shopper!<br/>Emma Zaballos</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-17-driving-away-social-anxiety-joey-maresca">Driving Away Social Anxiety<br/>Joey Maresca</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-18-off-grid-coms-and-power-justin-herman">Off-grid coms and power<br/>Justin Herman</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-19-ctfs-leveling-up-through-competition-alex-flores">CTFs: Leveling Up Through Competition<br/>Alex Flores</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-21-extending-burp-to-find-struts-and-xxe-vulnerabilities-chris-elgee">Extending Burp to Find Struts and XXE Vulnerabilities<br/>Chris Elgee</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-22-introduction-to-x86-assembly-dazzlecatduo">Introduction to x86 Assembly<br/>DazzleCatDuo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-23-pacu-attack-and-post-exploitation-in-aws-spencer-gietzen">Pacu: Attack and Post-Exploitation in AWS<br/>Spencer Gietzen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-24-an-inconvenient-truth-evading-the-ransomware-protection-in-windows-10-soya-aoyama">An Inconvenient Truth: Evading the Ransomware Protection in Windows 10<br/>Soya Aoyama</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-25-brutal-blogging-go-for-the-jugular-kate-brew">Brutal Blogging - Go for the Jugular<br/>Kate Brew</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-26-rid-hijacking-maintaining-access-on-windows-machines-sebastin-castro">RID Hijacking: Maintaining Access on Windows Machines<br/>Sebastian Castro</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-27-your-training-data-is-bad-and-you-should-feel-bad-ryan-j-ogrady">Your Training Data is Bad and You Should Feel Bad<br/>Ryan J. O'Grady</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-28-so-many-pentesting-tools-from-a-4-arduino-kevin-bong-michael-vieau">So many pentesting tools from a $4 Arduino<br/>Kevin Bong, Michael Vieau</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-06-building-an-empire-with-ironpython-jim-shaver">Building an Empire with (Iron)Python<br/>Jim Shaver</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-07-saedy-subversion-and-espionage-directed-against-you-judy-towers">SAEDY: Subversion and Espionage Directed Against You<br/>Judy Towers</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-08-osxpirrit-reverse-engineering-mac-osx-malware-and-the-legal-department-of-the-company-who-makes-it-amit-serper-niv-yona-yuval-chuddy">OSX/Pirrit - Reverse engineering mac OSX malware and the legal department of the company who makes it<br/>Amit Serper, Niv Yona, Yuval Chuddy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-09-how-to-test-network-investigative-techniquesnits-used-by-the-fbi-dr-matthew-miller">How to test Network Investigative Techniques(NITs) used by the FBI<br/>Dr. Matthew Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-10-cloud-computing-therapy-session-cara-marie-andy-cooper">Cloud Computing Therapy Session<br/>Cara Marie, Andy Cooper</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-11-silent-compromise-social-engineering-fortune-500-businesses-joe-gray">Silent Compromise: Social Engineering Fortune 500 Businesses<br/>Joe Gray</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-12-dexter-the-friendly-forensics-expert-on-the-coinbase-security-team-hayden-parker">Dexter: the friendly forensics expert on the Coinbase security team<br/>Hayden Parker</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-13-going-on-a-printer-safari-hunting-zebra-printers-james-edge">Going on a Printer Safari - Hunting Zebra Printers<br/>James Edge</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-06-hardware-slashing-smashing-and-reconstructing-for-root-access-deral-heiland">Hardware Slashing, Smashing, and Reconstructing for Root access<br/>Deral Heiland</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-07-app-o-lockalypse-now-oddvar-moe">App-o-Lockalypse now!<br/>Oddvar Moe</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-08-web-app-101-getting-the-lay-of-the-land-mike-saunders">Web App 101: Getting the lay of the land<br/>Mike Saunders</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-09-invoke-dosfuscation-techniques-for-f-in-style-do-s-level-cmd-obfuscation-daniel-bohannon">Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)<br/>Daniel Bohannon</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-10-we-are-the-artillery-using-google-fu-to-take-down-the-grids-chris-sistrunk-krypt3ia-synackpwn">WE ARE THE ARTILLERY: Using Google Fu To Take Down The Grids<br/>Chris Sistrunk, Krypt3ia, SynAckPwn</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-11-just-let-yourself-in-david-boyd">Just Let Yourself In<br/>David Boyd</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-12-a-crash-course-in-exploiting-buffer-overflows-live-demos-parker-garrison">A "Crash" Course in Exploiting Buffer Overflows (Live Demos!)<br/>Parker Garrison</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-13-living-in-a-secure-container-down-by-the-river-jack-mannino">Living in a Secure Container, Down by the River<br/>Jack Mannino</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-06-vba-stomping-advanced-malware-techniques-carrie-roberts-kirk-sayre-harold-ogden-">VBA Stomping - Advanced Malware Techniques<br/>Carrie Roberts, Kirk Sayre, Harold Ogden </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-07-media-hacks-an-infosec-guide-to-dealing-with-journalists-sean-gallagher-steve-ragan-paul-wagenseil">Media hacks: an Infosec guide to dealing with journalists<br/>Sean Gallagher, Steve Ragan, Paul Wagenseil</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-08-deploying-deceptive-systems-luring-attackers-from-the-shadows-kevin-gennuso">Deploying Deceptive Systems: Luring Attackers from the Shadows<br/>Kevin Gennuso</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-09-the-money-laundering-cannon-real-cash-real-criminals-and-real-layoffs-arian-evans">The Money-Laundering Cannon: Real cash; Real Criminals; and Real Layoffs<br/>Arian Evans</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-10-perfect-storm-taking-the-helm-of-kubernetes-ian-coldwater">Perfect Storm: Taking the Helm of Kubernetes<br/>Ian Coldwater</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-11-how-to-put-on-a-con-for-fun-and-non-profit-benny-karnes-john-moore-rick-hayes-matt-perry-bill-gardner-justin-rogosky-mike-fry-steve-truax">How to put on a Con for Fun and (Non) Profit<br/>Benny Karnes, John Moore, Rick Hayes, Matt Perry, Bill Gardner, Justin Rogosky, Mike Fry, Steve Truax</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-12-web-app-testing-classroom-in-a-box-the-good-the-bad-and-the-ugly-lee-neely-chelle-clements-james-mcmurry">Web app testing classroom in a box - the good, the bad and the ugly<br/>Lee Neely, Chelle Clements, James McMurry</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-13-metasploit-town-hall-0x4-brent-cook-aaron-soto-adam-cammack-cody-pierce">Metasploit Town Hall 0x4<br/>Brent Cook, Aaron Soto, Adam Cammack, Cody Pierce</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-14-community-based-career-development-or-how-to-get-more-than-a-t-shirt-when-participating-as-part-of-the-community-kathleen-smith-magen-wu-cindy-jones-kathryn-seymour-kirsten-renner">Community Based Career Development or How to Get More than a T-Shirt When Participating as part of the Community <br/>Kathleen Smith, Magen Wu, Cindy Jones, Kathryn Seymour, Kirsten Renner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-06-disaster-strikes-a-hackers-cook-book-jose-quinones-carlos-perez">Disaster Strikes: A Hacker's Cook book<br/>Jose Quinones, Carlos Perez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-07-ninja-looting-like-a-pirate-infojanitor">Ninja Looting Like a Pirate<br/>Infojanitor</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-08-hacking-mobile-applications-with-frida-david-coursey">Hacking Mobile Applications with Frida<br/>David Coursey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-09-victor-or-victim-strategies-for-avoiding-an-infosec-cold-war-jason-lang-stuart-mcintosh">Victor or Victim? Strategies for Avoiding an InfoSec Cold War<br/>Jason Lang, Stuart McIntosh</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-10-ubiquitous-shells-jon-gorenflo">Ubiquitous Shells<br/>Jon Gorenflo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-11-99-reasons-your-perimeter-is-leaking-evolution-of-cc-john-askew">99 Reasons Your Perimeter Is Leaking - Evolution of C&amp;C<br/>John Askew</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-12-ship-hacking-a-primer-for-todays-pirate-brian-satira-brian-olson">Ship Hacking: a Primer for Today's Pirate<br/>Brian Satira, Brian Olson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-13-code-execution-with-jdk-scripting-tools-nashorn-javascript-engine-brett-hawkins">Code Execution with JDK Scripting Tools &amp; Nashorn Javascript Engine<br/>Brett Hawkins</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-14-phonopticon-leveraging-low-rent-mobile-ad-services-to-achieve-state-actor-level-mass-surveillance-on-a-shoestring-budget-mark-milhouse">PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget<br/>Mark Milhouse</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-29-patching-show-me-where-it-hurts-cheryl-biswas">Patching: Show me where it hurts<br/>Cheryl Biswas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-30-advanced-deception-technology-through-behavioral-biometrics-curt-barnard-dawud-gordon">Advanced Deception Technology Through Behavioral Biometrics <br/>Curt Barnard, Dawud Gordon</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-31-we-are-all-on-the-spectrum-what-my-10-year-old-taught-me-about-leading-teams-carla-a-raisler">We are all on the spectrum: What my 10-year-old taught me about leading teams <br/>Carla A Raisler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-32-no-place-like-home-real-estate-osint-and-opsec-fails-john-bullinger">No Place Like Home: Real Estate OSINT and OPSec Fails<br/>John Bullinger</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-33-the-layer2-nightmare-chris-mallz">The Layer2 Nightmare<br/>Chris Mallz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-34-attacking-azure-environments-with-powershell-karl-fosaaen">Attacking Azure Environments with PowerShell<br/>Karl Fosaaen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-35-blue-blood-injection-transitioning-red-to-purple-lsly-ayyy">Blue Blood Injection: Transitioning Red to Purple<br/>Lsly Ayyy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-36-mirai-satori-omg-and-owari-iot-botnets-oh-my-peter-arzamendi">Mirai, Satori, OMG, and Owari - IoT Botnets Oh My<br/>Peter Arzamendi</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-37-comparing-apples-to-apple-adam-mathis">Comparing apples to Apple<br/>Adam Mathis</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-38-how-online-dating-made-me-better-at-threat-modeling-isaiah-sarju">How online dating made me better at threat modeling<br/>Isaiah Sarju</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-39-threat-hunting-with-a-raspberry-pi-jamie-murdock">Threat Hunting with a Raspberry Pi<br/>Jamie Murdock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/stable-40-ma-defense-and-integration-all-that-glitters-is-not-gold-sara-leal-jason-morrow">M&amp;A Defense and Integration - All that Glitters is not Gold <br/>Sara Leal, Jason Morrow</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-14-social-engineering-at-work-how-to-use-positive-influence-to-gain-management-buy-in-for-anything-april-wright">Social Engineering At Work - How to use positive influence to gain management buy-in for anything<br/>April Wright</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-15-ham-radio-4-hackers-eric-watkins-devin-noel">Ham Radio 4 Hackers<br/>Eric Watkins, Devin Noel</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-16-getting-control-of-your-vendors-before-they-take-you-down-dan-browder">Getting Control of Your Vendors Before They Take You Down<br/>Dan Browder</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-17-cyber-intelligence-there-are-no-rules-and-no-certainties-coleman-kane">Cyber Intelligence: There Are No Rules, and No Certainties<br/>Coleman Kane</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-18-getting-started-in-ccdc-russell-nielsen">Getting Started in CCDC<br/>Russell Nielsen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-1-19-changing-our-mindset-from-technical-to-psychological-defenses-andrew-kalat">Changing Our Mindset From Technical To Psychological Defenses<br/>Andrew Kalat</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-14-red-mirror-bringing-telemetry-to-red-teaming-zach-grace">Red Mirror: Bringing Telemetry to Red Teaming<br/>Zach Grace</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-15-two-factor-too-furious-evading-and-protecting-evolving-mfa-schemes-austin-baker-doug-bienstock">Two-Factor, Too Furious: Evading (and Protecting) Evolving MFA Schemes<br/>Austin Baker, Doug Bienstock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-16-iot-not-even-your-bed-is-safe-darby-mullen">IoT: Not Even Your Bed Is Safe<br/>Darby Mullen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-17-fingerprinting-encrypted-channels-for-detection-john-althouse">Fingerprinting Encrypted Channels for Detection<br/>John Althouse</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-18-on-the-nose-bypassing-huaweis-fingerprint-authentication-by-exploiting-the-trustzone-nick-stephens">On the Nose: Bypassing Huawei's Fingerprint authentication by exploiting the TrustZone<br/>Nick Stephens</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-2-19-bypassing-port-security-in-2018-defeating-macsec-and-8021x-2010-gabriel-ryan">Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010<br/>Gabriel Ryan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-15-goodbye-obfuscation-hello-invisi-shell-hiding-your-powershell-script-in-plain-sight-omer-yair">Goodbye Obfuscation, Hello Invisi-Shell: Hiding Your Powershell Script in Plain Sight<br/>Omer Yair</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-16-cloud-forensics-putting-the-bits-back-together-brandon-sherman-">Cloud Forensics: Putting The Bits Back Together<br/>Brandon Sherman </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-17-killsuit-the-equation-groups-swiss-army-knife-for-persistence-evasion-and-data-exfil-francisco-donoso">Killsuit: The Equation Group's Swiss Army knife for persistence, evasion, and data exfil<br/>Francisco Donoso</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-18-the-ms-office-magic-show-stan-hegt-pieter-ceelen">The MS Office Magic Show<br/>Stan Hegt, Pieter Ceelen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-19-living-off-the-land-enterprise-post-exploitation-adam-reiser">Living off the land: enterprise post-exploitation<br/>Adam Reiser</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-20-hillbilly-storytime-pentest-fails-adam-compton">Hillbilly Storytime: Pentest Fails<br/>Adam Compton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-15-bug-hunting-in-routeros-jacob-baines">Bug Hunting in RouterOS<br/>Jacob Baines</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-16-breaking-into-your-building-a-hackers-guide-to-unauthorized-access-tim-roberts-brent-white">Breaking Into Your Building: A Hackers Guide to Unauthorized Access<br/>Tim Roberts, Brent White</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-17-the-making-of-an-ios-11-jailbreak-kiddie-to-kernel-hacker-in-14-sleepless-nights-bryce-soen-bearchell">The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.<br/>Bryce "soen" Bearchell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-18-who-watches-the-watcher-detecting-hypervisor-introspection-from-unprivileged-guests-tomasz-tuzel">Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests<br/>Tomasz Tuzel</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-19-pwning-in-the-sandbox-osx-macro-exploitation-beyond-adam-gold-danny-chrastil">Pwning in the Sandbox: OSX Macro Exploitation &amp; Beyond<br/>Adam Gold, Danny Chrastil</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/track-4-20-iocs-today-intelligence-led-security-tomorrow-katie-kusjanovic-matthew-shelton">IOCs Today, Intelligence-Led Security Tomorrow<br/>Katie Kusjanovic, Matthew Shelton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/derbycon8/closing">Closing Ceremonies</a></p>]]></description>
    </item>
    <item>
      <title>GrrCON 2018 Videos</title>
      <pubDate>Sat, 8 Sep 2018 13:56:48 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/grrcon2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/mainlist">GrrCON 2018 Videos</a><br/>These are the videos of the presentations from <a href="http://www.GrrCON.com">GrrCON 2018</a>. Big thanks to EggDropX and Jaime for having me out, and my video crew&nbsp; (<a href="https://twitter.com/paint27">paint27</a>, Erick, Jason, <a href="https://twitter.com/brettahansen">brettahansen</a>, Angela, Luke &amp; others) for recording.
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta00-keynote-dave-kennedy">Keynote<br/>Dave Kennedy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta01-an-inconvenient-truth-evading-the-ransomware-protection-in-windows-10-soya-aoyama">An Inconvenient Truth: Evading the Ransomware Protection in Windows 10<br/>Soya Aoyama</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta03-the-abyss-is-waving-backthe-four-paths-that-human-evolution-is-charging-down-and-how-we-choose-which-ones-right-chris-roberts">The Abyss is Waving Back - The four paths that human evolution is charging down, and how we choose which one's right<br/>Chris Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta04-crypto-gone-rogue-a-tale-of-ransomware-key-management-and-the-cryptoapi-pranshu-bajpai-dr-richard-enbody">Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI<br/>Pranshu Bajpai &amp; Dr. Richard Enbody</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta06-youre-right-this-talk-isnt-really-about-you-jayson-e-street">You're right, this talk isn't really about you!<br/>Jayson E Street</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta07-analyzing-pwned-passwords-with-apache-spark-kelley-robinson">Analyzing Pwned Passwords with Apache Spark<br/>Kelley Robinson</a></p>
<p>How to rob a bank over the phone<br/>Joshua "Naga" Crumbaugh<br/>(Posting Later Maybe)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta09-vibing-your-way-through-an-enterprise-how-attackers-are-becoming-more-sneaky-matthew-eidelberg">Vibing Your Way Through an Enterprise: How Attackers are Becoming More Sneaky<br/>Matthew Eidelberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta12-pwnbook-penetrating-with-googles-chromebook-corey-batiuk">PwnBook: Penetrating with Google's Chromebook<br/>Corey Batiuk</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta13-life-death-the-nematodes-long-live-cyber-resilience-chad-calease">Life, Death + the Nematodes: Long live Cyber Resilience!<br/>Chad Calease</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta14-data-data-everywhere-but-no-one-stops-to-think-scott-thomas-carl-hertz-robert">Data Data Everywhere but No One Stops to Think<br/>Scott Thomas, Carl Hertz &amp; Robert Wagner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta15-automation-and-open-source-turning-the-tide-on-attackers-john-grigg">Automation and Open Source: Turning the Tide on Attackers<br/>John Grigg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta16-we-we-internet-explorer-does-what-it-wants-aaron-heikkila">w.e w.e Internet Explorer Does What It Wants<br/>Aaron Heikkila</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta17-pacu-attack-and-post-exploitation-in-aws-spencer-gietzen">Pacu: Attack and Post-Exploitation in AWS<br/>Spencer Gietzen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-augusta19-hacker-tools-compliments-of-microsoft-david-fletcher-sally-vandeven">Hacker Tools, Compliments of Microsoft<br/>David Fletcher &amp; Sally Vandeven</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada00-how-to-conduct-a-product-security-test-and-how-it-fits-into-the-larger-security-strategy-dr-jared-demott">How to Conduct a Product Security Test: And How it Fits Into the Larger Security Strategy<br/>Dr. Jared DeMott</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada01-over-the-phone-authentication-spencer-brown">Over the Phone Authentication<br/>Spencer Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada02-designing-a-cloud-security-blueprint-sarah-elie">Designing a Cloud Security Blueprint<br/>Sarah Elie</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada03-to-fail-is-divine-danny-akacki">To Fail is Divine<br/>Danny Akacki</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada05-zero-to-owned-in-1-hour-securing-privilege-in-cloud-devops-on-prem-workflows-brandon-traffanstedt">Zero to Owned in 1 Hour: Securing Privilege in Cloud, DevOps, On-Prem Workflows<br/>Brandon Traffanstedt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada06-malware-mitigation-sample-detonation-intelligence-automation-make-your-binaries-work-for-you-adam-hogan">Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You<br/>Adam Hogan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada08-emulacra-and-emulation-an-intro-to-emulating-binary-code-with-vivisect-atlas-of-d00m">emulacra and emulation: an intro to emulating binary code with Vivisect<br/>Atlas of D00m</a><br/><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada10-sniffair-an-open-source-framework-for-wireless-security-assessments-matthew-eidelberg-steven-daracott">SniffAir - An Open-Source Framework for Wireless Security Assessments<br/>Matthew Eidelberg &amp; Steven Daracott</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada11-threat-hunting-the-macos-edition-megan-carney">Threat Hunting: the macOS edition<br/>Megan Carney</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada12-the-hybrid-analyst-how-phishing-created-a-new-type-of-intel-analyst-rachel-giacobozzi">The Hybrid Analyst: How Phishing Created A New Type of Intel Analyst<br/>Rachel Giacobozzi</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada13-dragnet-your-social-engineering-sidekick-truman-kain">Dragnet: Your Social Engineering Sidekick<br/>Truman Kain</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada14-intelligence-creating-intelligence-leveraging-what-you-know-to-improve-finding-what-you-dont-tomasz-bania">Intelligence Creating Intelligence: Leveraging what you know to improve finding what you don,t<br/>Tomasz Bania</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada15-guaranteed-failure-awareness-the-greatest-cyber-insanity-joshua-naga-crumbaugh">Guaranteed Failure: Awareness The Greatest Cyber Insanity<br/>Joshua "Naga" Crumbaugh</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-ada16-threat-modeling-how-to-actually-do-it-and-make-it-useful-derek-milroy">Threat Modeling: How to actually do it and make it useful<br/>Derek Milroy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace00-structuring-your-incident-response-could-be-one-of-the-most-important-things-you-do-to-bolster-security-matt-reid">Structuring your incident response could be one of the most important things you do to bolster Security<br/>Matt Reid</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace01-how-this-20-year-old-changed-the-security-industry-james-oneill">How this 20 Year Old Changed the Security Industry<br/>James O'Neill</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace02-stop-boiling-the-ocean-how-to-succeed-with-small-gains-joel-cardella">Stop Boiling The Ocean! How To Succeed With Small Gains<br/>Joel Cardella</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace03-do-i-have-a-signature-to-detect-that-malware-ken-donze">Do I have a signature to detect that malware?<br/>Ken Donze</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace04-2018-siem-trends-what-is-my-mean-time-to-value-bill-lampe">2018 SIEM Trends: What is my Mean Time to Value?<br/>Bill Lampe</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace05-advanced-attackers-hiding-inside-encrypted-traffic-at-the-endpoint-jared-phipps">Advanced Attackers Hiding Inside Encrypted Traffic at the Endpoint<br/>Jared Phipps</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace06-more-tales-from-the-cryptanalyst-jeff-man">More Tales from the Crypt-Analyst<br/>Jeff Man</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace07-my-first-year-in-application-security-whitney-phillips">My First year in Application Security <br/>Whitney Phillips</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace09-career-risk-management-10-tips-to-keep-you-employed-chris-burrows">Career Risk Management: 10 tips to keep you employed<br/>Chris Burrows</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace10-red-vs-blue-the-untold-chapter-aaron-herndon-thomas-somerville">Red vs Blue: The Untold Chapter<br/>Aaron Herndon &amp; Thomas Somerville</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace11-saving-all-the-money-to-buy-all-the-booze-learning-to-hack-all-the-things-on-a-budget-michael-morgese">Saving All the Money to Buy All the Booze: Learning to Hack All the Things on a Budget<br/>Michael Morgese</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace12-analyzing-multi-dimensional-malware-dataset-ankur-tyagi">Analyzing Multi-Dimensional Malware Dataset<br/>Ankur Tyagi</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace13-physicals-badges-and-why-it-matters-alex-fernandez-gatti">Physicals, Badges, and why it matters<br/>Alex Fernandez-Gatti</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace15-inspec-compliance-as-code-kent-picat-gruber">InSpec: Compliance as Code<br/>Kent picat, Gruber</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2018/grrcon-2018-lovelace16-bounty-hunters-j-wolfgang-goerlich">Bounty Hunters<br/>J Wolfgang Goerlich</a><br/></p>]]></description>
    </item>
    <item>
      <title>Patreon, Bitchute, etc.</title>
      <pubDate>Thu, 9 Aug 2018 14:08:05 -0400</pubDate>
      <link>http://irongeek.com/#Patreon_Bitchute_etc</link>
      <category>link</category>
      <description><![CDATA[<a href="#Patreon_Bitchute_etc" name=Patreon_Bitchute_etc>Patreon, Bitchute, etc.</a><br/>Hi all, I've set up a <a href="https://www.patreon.com/irongeek">Patreon</a> for those that want to help me increase the number of cons I can record each year. As a reminder, the videos I record appear on <a href="https://www.youtube.com/user/irongeek">YouYube</a>, <a href='https://archive.org/search.php?query=creator:"Adrian+Crenshaw"'>Archive.org</a> and <a href="https://www.bitchute.com/channel/irongeek/">BitChute</a> for free, so don't complain about what I put on my site if you can't figure out how to get to the same content elsewhere. 😜]]></description>
    </item>
    <item>
      <title>OISF 2018 Videos </title>
      <pubDate>Sat, 14 Jul 2018 22:33:57 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/oisf2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/oisf2018/mainlist">OISF 2018 Videos </a><br/>These are the videos from the <a href="http://www.ohioinfosec.org">OISF Anniversary Event</a>.
<p></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2018/oisf-2018-00-introduction-dr-john-carls">Introduction<br/>Dr. John Carls</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2018/oisf-2018-01-catching-the-social-engineer-robert-stewart">Catching the Social Engineer<br/>Robert Stewart</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2018/oisf-2018-02-hacking-identity-a-pen-testers-guide-to-iam-jerod-brennen">Hacking Identity, A Pen Tester’s guide to IAM<br/>Jerod Brennen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2018/oisf-2018-03-active-defense-helping-the-threat-actors-hack-themselves-matt-scheurer">Active Defense: Helping the Threat Actors Hack Themselves<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/oisf2018/oisf-2018-05-planning-executing-a-red-team-engagement-tim-wright">Planning &amp; Executing A Red Team Engagement<br/>Tim Wright</a></p>]]></description>
    </item>
    <item>
      <title>BSides Cleveland 2018 Videos</title>
      <pubDate>Sat, 23 Jun 2018 19:35:30 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link :<a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/mainlist</a><br/>These are the videos from the <a href="http://bsidescle.com">BSides Cleveland</a> conference. Thanks to Rich, Nekko, <a href="https://twitter.com/justinschmitt">justinschmitt</a> &amp; <a role=presentation class="twitter-atreply pretty-link" href="https://twitter.com/securid">securid</a>&nbsp;as the video team. Thanks to <a href="https://twitter.com/twuntymcslore">twuntymcslore</a> &amp; <a href="https://twitter.com/RockieBrockway">RockieBrockway</a> for being con mom &amp; dad. 
<p><br/><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a00-hacking-your-happinesschris-gates">Hacking Your Happiness<br/>Chris Gates</a> 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a01-active-defense-helping-threat-actors-hack-themselves-matt-scheurer">Active Defense - Helping threat actors hack themselves!<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b00-reflective-pe-unloading-spencer-mcintyre">Reflective PE Unloading<br/>Spencer McIntyre</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c00-one-puzzle-piece-at-a-time-logging-quick-wins-celeste-hall">One Puzzle Piece at a Time: Logging Quick Wins<br/>Celeste Hall</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c01-go-hack-yourself-moving-beyond-assumption-based-security-christine-stevenson">GO HACK YOURSELF: MOVING BEYOND ASSUMPTION-BASED SECURITY<br/>Christine Stevenson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a02-using-technology-to-defend-digital-privacy-human-rights-tom-eston">Using Technology to Defend Digital Privacy &amp; Human Rights<br/>Tom Eston</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b01-code-execution-with-jdk-scripting-tools-nashorn-javascript-engine-brett-hawkins">Code Execution with JDK Scripting Tools &amp; Nashorn Javascript Engine<br/>Brett Hawkins</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c02-abandoned-spaces-reconstructing-apt-campaigns-from-lapsed-domains-daniel-nagy">Abandoned Spaces: Reconstructing APT Campaigns From Lapsed Domains<br/>Daniel Nagy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a03-whats-changed-in-the-new-owasp-top-10-bill-sempf">What's Changed In The New OWASP Top 10?<br/>Bill Sempf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b02-raindance-raining-recon-from-the-microsoft-cloud-michael-stringer">Raindance: Raining Recon from the Microsoft Cloud<br/>Michael Stringer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c03-tools-and-procedures-for-securing-net-applications-sam-nasr">Tools and Procedures for Securing .Net Applications<br/>Sam Nasr</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a04-hacking-identity-a-pen-testers-guide-to-iam-jerod-brennen">Hacking Identity: A Pen Tester's Guide to IAM<br/>Jerod Brennen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b03-phishing-forensics-is-it-just-suspicious-or-is-it-malicious-matt-scheurer">Phishing Forensics - Is it just suspicious or is it malicious?<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c04-securing-code-the-basics-michael-mendez">Securing Code - The Basics<br/>Michael Mendez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a05-the-marriage-of-threat-intelligence-and-incident-response-or-threat-hunting-for-the-rest-of-us-jamie-murdock">The Marriage of Threat Intelligence and Incident Response or... Threat Hunting for the Rest of Us<br/>Jamie Murdock</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b04-wacky-and-wild-security-getting-things-under-cis-controls-v7-jeremy-mio">Wacky and Wild Security - Getting things under CIS Controls V7<br/>Jeremy Mio</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c05-interdisciplinary-infosec-equifax-individuation-and-the-modern-state-thomas-pieragastini">Interdisciplinary Infosec: Equifax, Individuation, and the Modern State<br/>Thomas Pieragastini</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a06-mobile-application-privacy-and-analytics-kevin-cody">Mobile Application Privacy and Analytics<br/>Kevin Cody</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b05-evolving-the-teaching-of-pen-testing-in-higher-ed-robert-olson">Evolving the Teaching of Pen Testing in Higher Ed<br/>Robert Olson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/c06-go-back-to-the-basics-with-your-processes-improving-operations-without-technology-mark-abrams">Go back to the basics with your processes: Improving operations without technology.<br/>Mark Abrams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/b06-anatomy-of-an-attack-john-fatten">Anatomy of an Attack<br/>John Fatten</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescleveland2018/a07-hackers-hugs-drugs-mental-health-in-infosec-amanda-berlin">Hackers, Hugs, &amp; Drugs: Mental Health in Infosec<br/>Amanda Berlin</a></p>]]></description>
    </item>
    <item>
      <title>A Digital Handbook for the Recently Deceased</title>
      <pubDate>Thu, 14 Jun 2018 21:47:20 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=security/a-digital-handbook-for-the-recently-deceased</link>
      <category>article</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=security/a-digital-handbook-for-the-recently-deceased">http://www.irongeek.com/i.php?page=security/a-digital-handbook-for-the-recently-deceased</a><br/>Article on dealing with a deceased person's financial and Internet accounts, and making it easier for others to do so when you pass.]]></description>
    </item>
    <item>
      <title>ShowMeCon 2018 Videos</title>
      <pubDate>Fri, 8 Jun 2018 18:38:12 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/showmecon2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/mainlist">http://www.irongeek.com/i.php?page=videos/showmecon2018/mainlist</a><br/>These are the videos <a href="http://www.showmecon.com">ShowMeCon 2018</a>. Thanks to Renee &amp; Dave Chronister (<a href="https://twitter.com/bagomojo">@bagomojo</a>) and others for having me out to record and speak. Also thanks to my video crew <a href="https://twitter.com/r3tr0_cod3x">@r3tr0_cod3x</a>, James, Aaron, Jon and some other people I may have forgotten.
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/opening">Opening</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-main-track-00-the-insecure-software-development-lifecycle-how-to-find-fix-and-manage-deficiencies-within-an-existing-methodology-april-c-wright">The Insecure Software Development Lifecycle: How to find, fix, and manage deficiencies within an existing methodology.<br/>April C. Wright</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-main-track-01-the-sky-isnt-falling-but-the-earth-may-be-shifting-how-gdpr-could-change-the-face-of-infosec-cliff-smith">The Sky Isn't Falling, But the Earth May be Shifting: How GDPR Could Change the Face of InfoSec<br/>Cliff Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-main-track-02-gullivers-travels-security-exploits-and-vulnerabilities-around-the-globe-kevin-johnson">Gulliver's Travels: Security Exploits and Vulnerabilities Around the Globe<br/>Kevin Johnson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-00-from-ddos-to-mining-chinese-cybercriminals-set-their-sights-on-monero-david-liebenberg">From DDoS to Mining: Chinese Cybercriminals Set Their Sights on Monero<br/>David Liebenberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-00-anti-osint-af-how-to-become-untouchable-michael-james">ANTI-OSINT AF: How to become untouchable<br/>Michael James</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-00-whos-watching-the-watchers-nathan-sweaney">Who's Watching the Watchers?<br/>Nathan Sweaney</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-01-we-dont-have-to-worry-about-that-its-in-the-cloud-arnar-gunnarsson">We don't have to worry about that, It's in the cloud<br/>Arnar Gunnarsson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-01-ss7-for-infosec-paul-coggin">SS7 for INFOSEC<br/>Paul Coggin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-01-getting-newcomers-into-infosec-the-tribulations-of-the-auburn-university-hacking-club-matthew-rogers">Getting Newcomers into Infosec: The Tribulations of the Auburn University Hacking Club<br/>Matthew Rogers</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-02-exploring-information-security-qa-panel-timothy-de-block">Exploring Information Security Q&amp;A Panel<br/>Timothy De Block</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-02-securing-windows-with-group-policy-josh-rickard">Securing Windows with Group Policy<br/>Josh Rickard</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-02-atat-how-to-take-on-the-entire-rebellion-with-2-3-stormtroopers-ll3nigmall">ATAT: How to take on the entire rebellion with 2-3 stormtroopers<br/>ll3nigmall</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-03-how-hyperbolic-discounting-is-keeping-your-security-program-from-succeeding-jon-clark">How Hyperbolic Discounting is keeping your security program from succeeding<br/>Jon Clark</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-03-hijacking-the-boot-process-ransomware-style-raul-alvarez">Hijacking the Boot Process - Ransomware Style<br/>Raul Alvarez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-03-building-a-cyber-training-range-on-a-budget-robert-guiler">Building a Cyber Training Range on a Budget<br/>Robert Guiler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-04-lessons-learned-from-development-and-release-of-blacksmith-the-meltdown-defense-tool-for-linux-jared-phipps">Lessons Learned from Development and Release of Blacksmith (The Meltdown Defense Tool For Linux)<br/>Jared Phipps</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-04-how-to-train-your-kraken-creating-a-monster-out-of-necessity-sean-peterson">How to Train Your Kraken - Creating a Monster Out of Necessity<br/>Sean Peterson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-04-powershell-exploitation-powersploit-bloodhound-powershellmafia-obfuscation-powershell-empire-the-empire-has-fallen-you-can-detect-powershell-exploitation-michael-gough">PowerShell exploitation, PowerSploit, Bloodhound, PowerShellMafia, Obfuscation, PowerShell Empire, the Empire has fallen, you CAN detect PowerShell exploitation<br/>Michael Gough</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-1-05-offensive-cartography-trenton-ivey">Offensive Cartography<br/>Trenton Ivey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-2-05-the-wrong-kind-of-devops-talk-now-with-extra-badness-bobby-kuzma">The Wrong Kind of DevOps Talk - Now with Extra Badness!<br/>Bobby Kuzma</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-track-3-05-this-job-is-making-me-fat-thomas-smith">This Job is Making Me Fat!<br/>Thomas Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-main-track-04-youll-understand-when-you-are-older-amanda-berlin-david-cybuck">You'll understand when you are older<br/>Amanda Berlin &amp; David Cybuck</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/showmecon2018/showmecon-2018-main-track-05-bitcoin-the-generation-of-private-keys-based-on-public-keys-a-live-demonstration-richard-dennis">Bitcoin - The generation of private keys based on public keys, a live demonstration<br/>Richard Dennis</a></p>]]></description>
    </item>
    <item>
      <title>Circle City Con 2018 Videos</title>
      <pubDate>Sun, 3 Jun 2018 13:41:03 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/circlecitycon2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[<a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/mainlist">Circle City Con 2018 Videos</a><br/>These are the <a href="http://circlecitycon.com/">Circle City Con</a> videos. Thanks to the staff for inviting me down to record. Big thanks to <a href="https://twitter.com/irishjack">@irishjack</a>, <a href="https://twitter.com/0DDJ0BB">@0DDJ0BB</a>, <a href="https://twitter.com/Ajediday">@Ajediday</a>, Jim, <a href="https://twitter.com/securesomething">@securesomething</a>, <a href="https://twitter.com/anarchistdalek">@AnarchistDalek</a>, <a href="https://twitter.com/KitWessendorf">@KitWessendorf</a>, <a href="https://twitter.com/m3ch4n15m">@m3ch4n15m</a>, <a href="https://twitter.com/valacia">@Valacia</a>, <a href="https://twitter.com/songsthatsaved">@songsthatsaved</a>, <a href="https://twitter.com/mchandleraz">@mchandleraz</a>, <a href="https://twitter.com/christinemobes">@christinemobes</a> and other for helping set up AV and record. 
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/opening">Opening Ceremonies <br/>Circle City Con Staff</a> 
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-100-espionage-in-the-modern-age-of-information-warfare-scot-terban">Espionage In The Modern Age of Information Warfare<br/>Scot Terban</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-101-the-never-ending-hack-mental-health-in-infosec-community-danny-akacki">The Never Ending Hack: Mental Health in InfoSec Community<br/>Danny Akacki</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-102-the-network-night-watch-eric-rand-lesley-cahart">The Network Night Watch<br/>Eric Rand &amp; Lesley Cahart</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-103-held-for-ransom-with-a-toy-gun-brian-baskin">Held for Ransom with a Toy Gun<br/>Brian Baskin</a><br/></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-104-dear-blue-team-proactive-steps-to-supercharge-your-ir-joe-gray">Dear Blue Team: Proactive Steps to Supercharge your IR<br/>Joe Gray</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-300-ctf-tips-and-tricks-aaron-lintile">CTF Tips and Tricks<br/>Aaron Lintile</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-200-classic-cons-in-cryptocurrency-wolfgang-goerlich-zachary-sarakun">Classic Cons in Cryptocurrency<br/>Wolfgang Goerlich &amp; Zachary Sarakun</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-201-enterprise-vulnerability-management-assessing-implementing-and-maintaining-derek-milroy">Enterprise Vulnerability Management (Assessing, Implementing, and Maintaining)<br/>Derek Milroy</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-202-security-beyond-the-security-team-getting-everyone-involved-luka-trbojevic">Security Beyond the Security Team: Getting Everyone Involved<br/>Luka Trbojevic</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-302-the-consequences-of-lack-of-security-in-the-healthcare-and-how-to-handle-it-jelena-milosevic">The consequences of lack of security in the Healthcare and how to handle it<br/>Jelena Milosevic</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-107-stealing-cycles-mining-coin-an-introduction-to-malicious-cryptomining-edmund-brumaghin-nick-biasini">Stealing Cycles, Mining Coin: An introduction to Malicious Cryptomining<br/>Edmund Brumaghin &amp; Nick Biasini</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-203-applying-thermodynamic-principles-to-threat-intelligence-kyle-ehmke">Applying Thermodynamic Principles to Threat Intelligence<br/>Kyle Ehmke</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-204-saedy-subversion-and-espionage-directed-against-you-judy-towers">SAEDY: Subversion and Espionage Directed Against You<br/>Judy Towers</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-303-how-to-lie-with-statistics-information-security-edition-tony-martin-vegue">How to Lie with Statistics, Information Security Edition<br/>Tony Martin-Vegue</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-108-iot-4n6-the-growing-impact-of-the-internet-of-things-on-digital-forensics-jessica-hyde">IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics<br/>Jessica Hyde</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-304-a-very-particular-set-of-skills-geolocation-techniques-for-osint-and-investigation-chris-kindig">A Very Particular Set of Skills: Geolocation Techniques For OSINT and Investigation<br/>Chris Kindig</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-205-rise-of-the-machines-aamir-lakhani">Rise of the Machines<br/>Aamir Lakhani</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-109-backdooring-with-metadata-itzik-kotler">Backdooring with Metadata<br/>Itzik Kotler</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-206-automahack-automate-going-from-zero-to-domain-admin-with-2-tools-dan-mcinerney">Automahack - Automate going from zero to domain admin with 2 tools<br/>Dan McInerney</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-305-patching-its-complicated-cheryl-biswas">Patching - It's Complicated<br/>Cheryl Biswas</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-110-containers-exploits-surprises-and-security-elissa-shevinsky">Containers: Exploits, Surprises and Security<br/>Elissa Shevinsky</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-207-playing-russian-troll-whack-a-mole-courtney-falk">Playing Russian Troll Whack-a-Mole<br/>Courtney Falk</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-306-the-faas-and-the-curious-aws-lambda-threat-modeling-bryan-mcaninch">The FaaS and the Curious - AWS Lambda Threat Modeling<br/>Bryan McAninch</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-111-deploying-deceptive-systems-luring-attackers-from-the-shadows-kevin-gennuso">Deploying Deceptive Systems: Luring Attackers from the Shadows<br/>Kevin Gennuso</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-112-quick-retooling-in-net-for-red-teams-dimitry-snezhkov">Quick Retooling in .Net for Red Teams<br/>Dimitry Snezhkov</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-208-rethinking-cyber-security-given-the-spectre-of-a-meltdown-someone-hold-my-beer-jeff-man">(Re)Thinking Cyber Security Given the Spectre of a Meltdown: (Someone Hold My Beer)<br/>Jeff Man</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-307-carrot-vs-stick-motivation-metrics-and-awareness-magen-wu">Carrot vs. Stick: Motivation, Metrics, and Awareness<br/>Magen Wu</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-308-securing-without-slowing-devops-wolfgang-goerlich">Securing without Slowing: DevOps<br/>Wolfgang Goerlich</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-209-operator-the-well-rounded-hacker-matthew-curtin">Operator: The Well-Rounded Hacker<br/>Matthew Curtin</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/circle-city-con-50-113-abuse-case-testing-in-devops-stephen-deck">Abuse Case Testing in DevOps<br/>Stephen Deck</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/circlecitycon2018/global00-greatsct-gotta-catch-em-awl-chris-spehn">GreatSCT: Gotta Catch 'Em AWL<br/>Chris Spehn</a></p>]]></description>
    </item>
    <item>
      <title>NolaCon 2018 Videos</title>
      <pubDate>Sun, 20 May 2018 14:07:14 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/nolacon2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/mainlist">http://www.irongeek.com/i.php?page=videos/nolacon2018/mainlist</a><br/>Recorded at <a href="https://nolacon.com/">NolaCon</a> 2018. Thanks to <a href="https://twitter.com/CurtisLaraque">@CurtisLaraque</a>, <a href="https://twitter.com/mikearbrouet">@mikearbrouet</a>, <a href="https://twitter.com/openbayou">@openbayou</a>, Cole &amp; <a href="https://twitter.com/klulue">@klulue</a> for the video recording help, and <a href="https://twitter.com/nola_con">@nola_con</a>, <a href="https://twitter.com/erikburgess_">@erikburgess_</a>, <a href="https://twitter.com/NolaConYvonne">@NolaConYvonne</a> &amp; Rob for having me down to record. 
<p></p>
<p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-100-chasing-the-adder-a-tale-from-the-apt-world-stefano-maccaglia">Chasing the Adder... A Tale from the APT world<br/>Stefano Maccaglia</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-200-aww-ship-navigating-the-vulnerabilities-and-attack-surface-of-the-maritime-industry-john-sonnenschein">Aww Ship! Navigating the vulnerabilities and attack surface of the maritime industry<br/>John Sonnenschein</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-101-hacking-dumberly-just-like-the-bad-guys-tim-medin-derek-banks">Hacking Dumberly, Just Like the Bad Guys<br/>Tim Medin, Derek Banks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-102-automahack-python-toolchain-for-automated-domain-admin-dan-mcinerney">Automahack - Python toolchain for automated domain admin<br/>Dan McInerney</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-201-dear-blue-team-proactive-steps-to-supercharge-your-ir-joe-gray">Dear Blue Team: Proactive Steps to Supercharge your IR<br/>Joe Gray</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-103-youll-understand-when-youre-older-amanda-berlin">You'll Understand When You're Older<br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-104-skills-for-a-red-teamer-brent-white-tim-roberts">Skills For A Red-Teamer<br/>Brent White, Tim Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-202-hacking-smart-contracts-a-methodology-konstantinos-karagiannis">Hacking Smart Contracts--A Methodology<br/>Konstantinos Karagiannis</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-203-fighting-child-exploitation-with-oculum-andrew-hay-mikhail-sudakov">Fighting Child Exploitation with Oculum<br/>Andrew Hay, Mikhail Sudakov</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-105-how-to-tell-cajun-doctors-they-have-bad-cyber-hygiene-and-live-joshua-tannehill">How to tell cajun doctors they have bad cyber-hygiene and live<br/>Joshua Tannehill</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-106-what-infosec-in-oil-gas-can-teach-us-about-infosec-in-healthcare-damon-j-small">What Infosec in Oil &amp; Gas can Teach us About Infosec in Healthcare<br/>Damon J. Small</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-204-on-the-hunt-hacking-the-hunt-group-chris-silvers-taylor-banks">On the Hunt: Hacking the Hunt Group<br/>Chris Silvers, Taylor Banks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-107-your-mac-defenestrated-post-osxploitation-elevated-fuzzynop-noncetonic">Your Mac Defenestrated. Post OSXploitation Elevated.<br/>FuzzyNop &amp; Noncetonic</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-108-keynote-marcus-j-carey">Keynote: Follow The Yellow Brick Road<br/>Marcus J. Carey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-109-we-are-the-enemy-of-the-good-stephen-heath">We are the Enemy of the Good<br/>Stephen Heath</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-206-taking-out-the-power-grids-middleman-nathan-wallace-luke-hebert">Taking out the Power Grid's Middleman<br/>Nathan Wallace, Luke Hebert</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-110-privacy-for-safety-how-can-we-help-vulnerable-groups-with-privacy-stella">Privacy for Safety- How can we help vulnerable groups with privacy?<br/>Stella</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-207-cash-in-the-aisles-how-gift-cards-are-easily-exploited-will-caput">Cash in the aisles: How gift cards are easily exploited<br/>Will Caput</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-111-mind-games-exploring-mental-health-through-games-todd-carr">Mind Games: Exploring Mental Health through Games<br/>Todd Carr</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-208-jump-into-iot-hacking-with-damn-vulnerable-habit-helper-iot-device-nancy-snoke-phoenix-snoke">Jump into IOT Hacking with Damn Vulnerable Habit Helper IOT Device<br/>Nancy Snoke, Phoenix Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-209-the-future-of-digital-forensics-imani-palmer">The Future of Digital Forensics<br/>Imani Palmer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-114-changing-the-game-the-impact-of-trisis-triton-on-defending-icsscadaiiot-paul-w-brager-jr-msci-cissp-gicsp-cism">Changing the Game: The Impact of TRISIS (TRITON) on Defending ICS/SCADA/IIoT<br/>Paul W. Brager Jr M.Sci, CISSP, GICSP, CISM</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-210-ducky-in-the-middle-injecting-keystrokes-into-plaintext-protocols-esteban-rodriguez">Ducky-in-the-middle: Injecting keystrokes into plaintext protocols<br/>Esteban Rodriguez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-115-gamifying-developer-education-with-ctfs-john-sonnenschein-max-feldman">Gamifying Developer Education with CTFs<br/>John Sonnenschein &amp; Max Feldman</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-211-active-directory-security-the-journey-sean-metcalf">Active Directory Security: The Journey<br/>Sean Metcalf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/nolacon2018/nolacon-2018-116-http2-and-you-brett-gravois">HTTP2 and You<br/>Brett Gravois</a></p>]]></description>
    </item>
    <item>
      <title>BSides Detroit 2018 Videos</title>
      <pubDate>Sat, 12 May 2018 21:33:26 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/mainlist</a><br/>These are the videos from the <a href="https://twitter.com/BSidesDetroit">BSides Detroit 2017 Conference</a>. &nbsp;Thanks to Ryan Harp (<a href="https://twitter.com/th3b00st">@th3b00st</a>), Dan Falk (<a href="https://twitter.com/dnfalk">@dnfalk</a>), Wolfgang Goerlich (<a href="https://twitter.com/jwgoerlich">@jwgoerlich</a>), Matt Johnson (<a href="https://twitter.com/mwjcomputing">@mwjcomputing</a>), Kyle Andrus (<a href="https://twitter.com/chaoticflaws">@chaoticflaws</a>), Kate Vajda (<a href="https://twitter.com/vajkat">@vajkat</a>) and Chris Maddalena (<a href="https://twitter.com/cmaddalena">@cmaddalena</a>) for having me out and Samuel Bradstreet (<a href="https://twitter.com/TeaPartyTechie">@TeaPartyTechie</a>), Leah Bradstreet,&nbsp; Xavier Johnson, Ali Faraj, Camilla Martins, Ben Valentine, James Green,&nbsp;David Sornig, Steven Balagna,&nbsp; Nick Papa, Lucas Gorczyca, J Parker Galbraith and others I may forget for helping to record. 
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/opening">Opening</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-100-yes-youre-an-impostor-now-get-back-to-work-johnny-xmas">Yes, You're an Impostor; now get back to work<br/>Johnny Xmas</a> 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-200-grc-what-would-you-say-you-do-here-brian-martiez">GRC – "What Would You Say You Do Here?" <br/>Brian Martinez</a> 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-102-protecting-phalanges-from-processor-pressure-points-matthew-clapham">Protecting Phalanges from Processor Pressure Points<br/>Matthew Clapham</a></p>
<p>A Reporter's Look at OSINT<br/>Hilary Louise<br/>(Sorry, mic was off, but <a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig13-a-reporters-look-at-open-source-intelligence-hilary-louise">here is a longer version from GrrCon</a>)</p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-201-nowhere-to-hide-lucas-gorczyca">Nowhere to hide<br/>Lucas Gorczyca</a></p>
<p></p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-103-know-the-enemy-how-to-make-threat-intelligence-work-nir-yosha">Know the Enemy - How to make threat intelligence work!<br/>Nir Yosha</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-104-hack-like-a-gohper-kent-gruber">Hack like a Gohper<br/>Kent Gruber</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-202-tacopirates-art-of-woo-ben-carroll">@taco_pirate's Art of Woo<br/>Ben Carroll</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-203-saving-all-the-money-to-buy-all-the-booze-learning-to-hack-all-the-things-on-a-budget-michael-morgese">Saving All the Money to Buy All the Booze: Learning to Hack All the Things on a Budget<br/>Michael Morgese</a></p>
<p></p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-105-practical-incident-response-in-heterogenous-environment-kevin-murphy-stefano-maccaglia">Practical Incident Response in Heterogenous Environment<br/>Kevin Murphy &amp; Stefano Maccaglia</a></p>
<p></p>
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesdetroit2018/bsides-detroit-2018-204-security-kpis-measuring-improvement-in-your-security-program-steven-aiello">Security KPIs - Measuring Improvement in Your Security Program<br/>Steven Aiello</a></p>]]></description>
    </item>
    <item>
      <title>Converge 2018 Videos </title>
      <pubDate>Fri, 11 May 2018 17:38:18 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/converge2018/mainlist</link>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/converge2018/mainlist">http://www.irongeek.com/i.php?page=videos/converge2018/mainlist </a><br/>These are the videos from the <a href="http://www.convergeconference.org/">Converge Information Security Conference</a>. Thanks to Ryan Harp (<a href="https://twitter.com/th3b00st">@th3b00st</a>), Dan Falk (<a href="https://twitter.com/dnfalk">@dnfalk</a>), Wolfgang Goerlich (<a href="https://twitter.com/jwgoerlich">@jwgoerlich</a>), Matt Johnson (<a href="https://twitter.com/mwjcomputing">@mwjcomputing</a>), Kyle Andrus (<a href="https://twitter.com/chaoticflaws">@chaoticflaws</a>), Kate Vajda (<a href="https://twitter.com/vajkat">@vajkat</a>) and Chris Maddalena (<a href="https://twitter.com/cmaddalena">@cmaddalena</a>) for having me out and Samuel Bradstreet (<a href="https://twitter.com/TeaPartyTechie">@TeaPartyTechie</a>), Leah Bradstreet,&nbsp; Xavier Johnson, Camilla Martins, Ben Valentine, James Green,&nbsp;David Sornig, Steven Balagna,&nbsp; Nick Papa, J Parker Galbraith and others I may forget for helping to record.
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/opening">Opening</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-100-hackers-hugs-drugs-mental-health-in-infosec-amanda-berlin">Hackers, Hugs, &amp; Drugs: Mental Health in Infosec<br/>Amanda Berlin</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-101-winning-the-cybers-by-measuring-all-the-things-jim-beechey">Winning the cybers by measuring all the things<br/>Jim Beechey</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-200-social-engineering-for-the-blue-team-timothy-de-block">Social Engineering for the Blue Team<br/>Timothy De Block</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-201-the-emerging-product-security-leader-discipline-matthew-clapham">The Emerging Product Security Leader Discipline<br/>Matthew Clapham</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-202-server-message-block-worms-the-gift-that-keeps-on-giving-matthew-aubert">Server Message Block Worms: The gift that keeps on giving<br/>Matthew Aubert</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-103-dont-fear-the-cloud-secure-solutions-at-lower-cost-matt-newell">Don't Fear the Cloud: Secure Solutions at Lower Cost<br/>Matt Newell</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-104-devsecops-security-testing-with-cicd-automation-servers-ed-arnold">DevSecOps: Security Testing with CI/CD Automation Servers<br/>Ed Arnold</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-203-backdooring-with-metadata-itzik-kotler">Backdooring With Metadata<br/>Itzik Kotler</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-204-how-to-conduct-a-product-security-test-and-how-it-fits-into-the-larger-security-strategy-nick-defoe">How to Conduct a Product Security Test: And How it Fits Into the Larger Security Strategy<br/>Nick Defoe</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-105-securing-aspnet-core-web-apps-dustin-kingen">Securing ASP.NET Core Web Apps<br/>Dustin Kingen</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-106-all-the-bacon-how-lesley-knope-and-ron-swanson-encourage-community-growth-kevin-johnson">All the Bacon: How Lesley Knope and Ron Swanson encourage community growth<br/>Kevin Johnson</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-107-attck-like-an-adversary-for-defense-hardening-steve-motts-christian-kopacsi">ATT&amp;CK Like an Adversary for Defense Hardening<br/>Steve Motts &amp; Christian Kopacsi</a></p>
<p align="left">Unblockable Chains – Is Blockchain the ultimate malicious infrastructure?<br/>Omer Zohar<br/>(may post later)</p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-108-dadsec-102-richard-cassara">DADSEC 102<br/>Richard Cassara</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-206-the-things-you-should-be-doing-defensively-right-now-joel-cardella">The Things You Should Be Doing Defensively Right Now<br/>Joel Cardella</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-109-held-hostage-a-ransomware-primer-nick-hyatt">Held Hostage: A Ransomware Primer<br/>Nick Hyatt</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-207-prowling-better-penetration-testing-j-wolfgang-goerlich">Prowling: Better Penetration Testing<br/>J Wolfgang Goerlich</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-110-automating-web-app-security-in-aws-luther-hill">Automating Web App security in AWS<br/>Luther Hill</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-111-finding-the-money-to-run-an-effective-security-program-matt-topper">Finding the Money to Run an Effective Security Program<br/>Matt Topper</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-208-cryptocurrency-the-internetwide-bug-bounty-program-brian-laskowski">Cryptocurrency- The Internetwide Bug Bounty Program<br/>Brian Laskowski</a></p>
<p align="left"><a href="http://www.irongeek.com/i.php?page=videos/converge2018/converge-2018-209-hacking-identity-a-pen-testers-guide-to-iam-jerod-brennen">Hacking Identity: A Pen Tester,s Guide to IAM<br/>Jerod Brennen</a></p>]]></description>
    </item>
    <item>
      <title>BSidesCharm 2018 Videos</title>
      <pubDate>Sun, 29 Apr 2018 17:02:58 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescharm2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidescharm2018/mainlist</a><br/>These are the videos <a href="http://www.bsidescharm.com/">BSidesCharm (Baltimore) 2018</a>. Thanks for inviting me down to record. Thanks to my video team Shawn Thomas, Cory, Terry Holman, Thomas Moses, Jason Presmy and Martin Veloso. <br/>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-00-keynote-jessica-payne">Keynote<br/>Jessica Payne</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-01-to-ai-or-not-to-ai-what-the-us-military-needs-for-fighting-cyber-wars-ernest-wong">To AI or Not to AI? What the US Military Needs for Fighting Cyber Wars<br/>Ernest Wong</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-00-preparing-for-incident-handling-and-response-within-industrial-control-networks-mark-stacey">Preparing for Incident Handling and Response within Industrial Control Networks<br/>Mark Stacey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-02-failtime-failing-towards-success-sean-metcalf">FailTime:​ ​ Failing​ ​ towards​ ​ Success<br/>Sean Metcalf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-01-getting-saucy-with-apfs-the-state-of-apples-new-file-system-sarah-edwards">Getting Saucy with APFS! - The State of Apple’s New File System<br/>Sarah Edwards</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-03-basic-offensive-application-of-mof-files-in-wmi-scripting-devon-bordonaro">Basic Offensive Application of MOF Files in WMI Scripting<br/>Devon Bordonaro</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-02-an-open-source-malware-classifier-and-dataset-phil-roth">An Open Source Malware Classifier and Dataset<br/>Phil Roth</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-04-counting-down-to-skynet-nolan-hedglin">Counting Down to Skynet<br/>Nolan Hedglin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-05-how-we-reverse-engineered-osxpirrit-got-legal-threats-and-survived-amit-serper">How we reverse engineered OSX/Pirrit, got legal threats and survived<br/>Amit Serper</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-03-threat-activity-attribution-diferentiatinn-the-who-from-the-how-joe-slowik">Threat Activity Attribution: Diferentiatinn the Who from the How<br/>Joe Slowik</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-06-quantify-your-hunt-not-your-parents-red-teaming-devon-kerr">Quantify your hunt: not your parents’ red teaming<br/>Devon Kerr</a></p>
<p>Breaking and Entering: Lessons Learned from a Federal Penetration Tester<br/>Joseph Misher</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-07-internet-anarchy-the-global-march-toward-data-localization-andrea-little-limbago">Internet Anarchy &amp; The Global March toward Data Localization<br/>Andrea Little Limbago</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-05-powershell-deobfuscation-putting-the-toothpaste-back-in-the-tube-daniel-grant">Powershell Deobfuscation: Putting the toothpaste back in the tube<br/>Daniel Grant</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-08-effective-monitoring-for-operational-security-russell-mosley-ryan-st-germain">Effective Monitoring for Operational Security<br/>Russell Mosley Ryan St. Germain</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-06-plight-at-the-end-of-the-tunnel-anjum-ahuja">Plight at the end of the Tunnel<br/>Anjum Ahuja </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-09-rise-of-the-miners-josh-grunzweig">Rise of the Miners<br/>Josh Grunzweig</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-07-malware-analysis-and-automation-using-binary-ninja-erika-noerenberg">Malware Analysis and Automation using Binary Ninja<br/>Erika Noerenberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-10-between-a-soc-and-a-hard-place-shawn-thomas-andrew-marini-james-callahan-dustin-shirley">Between a SOC and a Hard Place<br/>Shawn Thomas Andrew Marini James Callahan Dustin Shirley </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-11-using-atomic-red-team-to-test-endpoint-solutions-adam-mathis">Using Atomic Red Team to Test Endpoint Solutions<br/>Adam Mathis</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-08-exercise-your-soc-how-to-run-an-effective-soc-response-simulation-brian-andrzejewski">Exercise Your SOC: How to run an effective SOC response simulation<br/>Brian Andrzejewski</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-12-adding-simulated-users-to-your-pentesting-lab-with-powershell-chris-myers-barrett-adams">Adding Simulated Users to Your Pentesting Lab with PowerShell<br/>Chris Myers Barrett Adams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-2-09-building-a-predictive-pipeline-to-rapidly-detect-phishing-domains-wes-connell">Building a Predictive Pipeline to Rapidly Detect Phishing Domains<br/>Wes Connell</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescharm2018/track-1-13-closing-ceremonies">Closing Ceremonies</a></p>]]></description>
    </item>
    <item>
      <title>BSides Nashville 2018 Videos</title>
      <pubDate>Sat, 14 Apr 2018 21:10:01 -0400</pubDate>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/mainlist</B></a><br/>These are the videos <a href="http://bsidesnash.org">BSides Nashville 2018</a>. Thanks to <a href="https://twitter.com/lil_lost">@lil_lost</a> for inviting me down to record and being my bodyguard while in Nashville. Big thanks to Gabe Basset, Geoff Collins, Cameron and others for helping set up AV and record. 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/intro">Intro</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-global-00-know-your-why-oladipupo-ladi-adefala">Know Your Why<br/>Oladipupo (Ladi) Adefala</a><br/>&nbsp;</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-blue-00-deploying-microsoft-advanced-threat-analytics-in-the-real-world-russell-butturini">Deploying Microsoft Advanced Threat Analytics in the Real World<br/>Russell Butturini</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-00-an-oral-history-of-bug-bounty-programs-dustin-childs">An Oral History of Bug Bounty Programs<br/>Dustin Childs</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-red-00-blue-cloud-of-death-red-teaming-azure-bryce-kunz">Blue Cloud of Death: Red Teaming Azure<br/>Bryce Kunz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-red-01-security-instrumentation-be-the-hero-getting-value-from-security-brian-contos">SECURITY INSTRUMENTATION: BE THE HERO GETTING VALUE FROM SECURITY<br/>Brian Contos</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-blue-01-changing-who-writes-the-queries-high-leverage-ir-with-visual-playbooks-visual-graph-analysis-leo-meyerovich">Changing Who Writes the Queries: High-Leverage IR with Visual Playbooks &amp; Visual Graph Analysis<br/>Leo Meyerovich</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-01-learning-to-hack-the-iot-with-the-damn-vulnerable-habit-helper-iot-device-nancy-snoke-phoenix-snoke">Learning to Hack the IOT with the Damn Vulnerable Habit Helper IOT Device<br/>Nancy Snoke, Phoenix Snoke</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-blue-02-hacking-the-users-developing-the-human-sensor-and-firewall-erich-kron">Hacking the Users: Developing the Human Sensor and Firewall<br/>Erich Kron</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-02-community-based-career-activities-or-how-having-fun-can-help-you-with-your-career-kathleen-smith-cindy-jones-doug-munro-magen-wu">Community Based Career Activities or How Having Fun Can Help You with Your Career<br/>Kathleen Smith, Cindy Jones,Doug Munro, Magen Wu</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-red-02-hillbilly-storytime-pentest-fails-adam-compton">Hillbilly Storytime - Pentest Fails<br/>Adam Compton</a><br/>&nbsp;</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-03-see-the-id-rules-before-us-fal-ial-aal-eh-aaaagh-how-how-how-how-bruce-wilson">See the ID Rules Before Us: FAL IAL AAL eh? Aaaagh!!! How, How, How, How?<br/>Bruce Wilson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-red-03-saedy-subversion-and-espionage-directed-against-you-judy-towers">SAEDY: Subversion and Espionage Directed Against You<br/>Judy Towers</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-blue-04-growing-up-to-be-a-infosec-policy-driven-organization-frank-rietta">Growing Up to be a Infosec Policy Driven Organization<br/>Frank Rietta</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-red-04-adding-simulated-users-to-your-pentesting-lab-with-powershell-chris-myers-barrett-adams">Adding Simulated Users to Your Pentesting Lab with PowerShell<br/>Chris Myers, Barrett Adams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-04-hacking-vdi-101-patrick-coble">Hacking VDI 101<br/>Patrick Coble</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-blue-05-evaluating-injection-attack-tools-through-quasi-natural-experimentation-john-okeefe-odom">Evaluating Injection Attack Tools Through Quasi-Natural Experimentation<br/>John O'Keefe-Odom</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnashville2018/bsides-nashville-2018-green-05-social-engineering-for-the-blue-team-timothy-de-block">Social Engineering for the Blue Team<br/>Timothy De Block</a></p>]]></description>
    </item>
    <item>
      <title>AIDE 2018 Videos</title>
      <pubDate>Fri, 6 Apr 2018 15:15:12 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/aide2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/aide2018/mainlist">http://www.irongeek.com/i.php?page=videos/aide2018/mainlist</a><br/>Recorded at <a href="http://www.appyide.org/">AIDE</a> 2018. Big thanks to Bill Gardner (<a href="https://twitter.com/#!/oncee">@oncee</a>) for having me out to record.
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-00-on-business-etiquette-and-professionalism-in-the-workplace-tess-schrodinger">On Business Etiquette and Professionalism in the Workplace<br/>Tess Schrodinger</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-01-infosec-by-the-numbers-bill-gardner">InfoSec by the Numbers<br/>Bill Gardner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-practical-osint-tools-of-the-trade-tom-moore">Practical OSINT - Tools of the trade<br/>Tom Moore</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-03-potentially-unnecessary-and-unwanted-programs-aka-pups-josh-brunty">Potentially unnecessary and unwanted programs (a.k.a. PUPs)<br/>Josh Brunty</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-04-how-to-test-a-security-awareness-program-matt-perry">How To Test A Security Awareness Program<br/>Matt Perry</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-06-disrupting-the-killchain-amanda-berlin">Disrupting the Killchain<br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-07-i-have-this-piece-of-paper-now-what-brandon-miller">I have this piece of paper, now what?<br/>Brandon Miller </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/aide2018/aide-2018-08-statistics-lieexcept-about-passwords-jeremy-druin">Statistics Lie...Except About Passwords<br/>Jeremy Druin </a></p>]]></description>
    </item>
    <item>
      <title>BSides Chattanooga 2018 Videos</title>
      <pubDate>Sat, 24 Mar 2018 15:44:30 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/mainlist</a><br/>These are the videos from the <a href="https://www.bsidescha.com/">BSides Chattanooga</a> conference. Thanks to Ron and Kevin for having me out, and John for helping record. 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/intro">Intro</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/100-red-vs-blue-and-why-we-are-doing-it-wrong-chris-roberts">Red vs Blue and why We are doing it wrong<br/>Chris Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/200-the-semi-comprehensive-guide-to-setting-up-a-home-lab-andrew-williams">The Semi-Comprehensive Guide to Setting Up a Home Lab<br/>Andrew Williams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/101-lessons-learned-from-a-owasp-top-10-datacall-brian-glas">Lessons learned from a OWASP Top 10 Datacall<br/>Brian Glas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/102-attacker-vs-defender-observations-on-the-human-side-of-security-todd-oboyle">Attacker vs. Defender: Observations on the Human Side of Security<br/>Todd O'Boyle</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/103-the-gilligan-phenomenon-fixing-the-holes-in-the-ransomware-and-phishing-boats-eric-kron">The Gilligan Phenomenon: Fixing The Holes In the Ransomware And Phishing Boats<br/>Eric Kron</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/203-machine-learning-and-cyber-security-how-smart-is-can-it-be-shayne-champion">Machine Learning and Cyber Security: How Smart is Can it Be?<br/>Shayne Champion</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsideschattanooga2018/closing">Closing</a></p>]]></description>
    </item>
    <item>
      <title>BSides Indy 2018 Videos</title>
      <pubDate>Sat, 10 Mar 2018 20:48:09 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesindy2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesindy2018/mainlist</a><br/>These are the videos from the <a href="https://bsidesindy.com/">BSides Indy</a> conference. Thanks to Frank, MzBat for having me up, and Nate for helping with AC. 
<CENTER></CENTER>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/intro">Intro</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-00-lessons-learned-a-15-year-retrospective-price-mcdonald">Lessons Learned - A 15 year Retrospective<br/>Price McDonald</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-01-phishing-forensics-is-it-just-suspicious-or-is-it-malicious-matt-scheurer">Phishing Forensics - Is it just suspicious or is it malicious?<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-02-presenting-pcketrquet-an-auditory-ids-killian-ditch">Presenting P@cketR@quet: An Auditory IDS<br/>Killian Ditch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-03-the-pillars-of-continuous-incident-response-brad-garnett">The Pillars of Continuous Incident Response<br/>Brad Garnett</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-04-zero-to-owned-in-1-hour-securing-privilege-in-cloud-and-devops-workflow-brandon-traffanstedt">Zero to Owned in 1 Hour: Securing Privilege in Cloud and DevOps Workflow<br/>Brandon Traffanstedt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-06-social-engineering-for-the-blue-team-timothy-de-block">Social Engineering for the Blue Team<br/>Timothy De Block</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-07-leveraging-devsecops-to-escape-the-hamster-wheel-of-never-ending-security-fail-chris-reed">Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail<br/>Chris Reed</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/bsidesindy-2018-08-creating-a-cyber-volunteer-department-ray-davidson">Creating a Cyber Volunteer Department<br/>Ray Davidson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesindy2018/closing-frank-diaz">Closing<br/>Frank Diaz</a></p>]]></description>
    </item>
    <item>
      <title>BSides Columbus 2018 Videos</title>
      <pubDate>Fri, 2 Mar 2018 23:57:19 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/mainlist</a><br/>These are the videos from the BSides Columbus Ohio conference. Thanks to Mitch &amp; Michael Spaulding for having me up and those who manned the video rigs. 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a00-keynote-dave-kennedy">Keynote<br/>Dave Kennedy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a01-automating-security-testing-with-the-owtf-jerod-brennen">Automating Security Testing with the OWTF<br/>Jerod Brennen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a02-looks-like-rain-again-secure-development-in-the-cloud-bill-sempf">Looks Like Rain Again: Secure Development in the Cloud<br/>Bill Sempf</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a04-how-stuxnet-ruined-my-life-for-6-months-but-i-got-to-fly-1st-class-a-lot-chris-raiter-jeremy-smith">How Stuxnet Ruined My Life For 6 Months (But I Got To Fly 1st Class A Lot)<br/>Chris Raiter, Jeremy Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a05-emotet-banking-malware-with-a-bite-bradley-duncan">Emotet - Banking Malware With A Bite<br/>Bradley Duncan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/a06-keynote-kevin-burkart">Keynote<br/>Kevin Burkart</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/e00-cryptology-its-a-scalpel-not-a-hammer-mikhail-sudakov">Cryptology: It’s a Scalpel, not a Hammer<br/>Mikhail Sudakov</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/e01-pass-the-apple-sauce-mac-os-x-security-automation-for-windows-focused-blue-teams-brian-satira">Pass the Apple Sauce: Mac OS X Security Automation for Windows-focused Blue Teams<br/>Brian Satira</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/e02-why-people-suck-at-delivery-how-to-get-your-security-projects-off-the-ground-and-into-production-nick-damato">Why People Suck at Delivery: How to get your security projects off the ground and into production!<br/>Nick d'Amato</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/e03-zero-to-owned-in-1-hour-securing-privilege-in-cloud-and-devops-workflow-brandon-traffanstedt">Zero to Owned in 1 Hour: Securing Privilege in Cloud and DevOps Workflow<br/>Brandon Traffanstedt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/e04-are-you-ready-for-my-call-security-researcher-insights-into-responsible-disclosure-jason-kent">Are you ready for my call? Security researcher insights into Responsible Disclosure.<br/>Jason Kent</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/w00-everything-you-always-wanted-to-ask-a-hiring-manager-but-were-afraid-to-ask-mike-spaulding">Everything you always wanted to ask a hiring manager, but were afraid to ask!<br/>Mike Spaulding</a><br/>&nbsp;</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/w02-deep-learning-for-enterprise-solving-business-problems-with-ai-christian-nicholson">Deep Learning for Enterprise: Solving Business Problems with AI<br/>Christian Nicholson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/w03-building-jarvis-stephen-hosom">Building Jarvis<br/>Stephen Hosom</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/w04-active-defense-helping-threat-actors-hack-themselves-matt-scheurer">Active Defense - Helping threat actors hack themselves!<br/>Matt Scheurer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/p00-shifting-application-security-left-craig-stuntz">Shifting Application Security Left<br/>Craig Stuntz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/p01-presenting-pcketrquet-an-auditory-ids-killian-ditch">Presenting P@cketR@quet: An Auditory IDS<br/>Killian Ditch</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/p02-security-and-networking-dual-purpose-tools-cody-smith">Security and Networking: Dual Purpose Tools<br/>Cody Smith</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/p04-cybereasons-jim-vanderyt-fileless-malware-breakout-session-jim-vanderyt">Cybereason's Jim VanDeRyt - Fileless Malware Breakout Session<br/>Jim VanDeRyt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidescolumbus2018/p05-the-quieter-you-become-the-more-youre-able-to-helk-nate-guagenti-roberto-rodriquez">The Quieter You Become, the More You’re Able to (H)ELK<br/>Nate Guagenti, Roberto Rodriquez</a></p>]]></description>
    </item>
    <item>
      <title>BSides NOVA 2018 Videos</title>
      <pubDate>Sat, 24 Feb 2018 23:03:35 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesnova2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link:<a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesnova2018/mainlist</a><br/>These are the videos from <a href="http://www.bsidesnova.org/">BSides NOVA 2018</a>. Thanks to those who manned the video rigs and helped set u 
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/100-am-keynote-matt-devost">AM Keynote<br/>Matt Devos</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/102-deep-dive-in-the-dark-web-osint-style-kirby-plessas">Deep Dive in the Dark Web (OSINT Style)<br/>Kirby Plessas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/103-pm-keynote-jack-daniel">PM Keynote<br/>Jack Daniel</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/104-adding-pentest-sauce-to-your-vulnerability-management-recipe-luke-hudson-andrew-mcnicol">Adding Pentest Sauce to your Vulnerability Management Recipe<br/>Luke Hudson, Andrew McNicol</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/105-the-value-of-design-in-cyber-threat-intelligence-devon-rollins">The Value of Design in Cyber Threat Intelligence<br/>Devon Rollins</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/106-dnc-hacked-data-in-the-hands-of-a-trained-intelligence-professional-wally-prather-dave-marcus">DNC Hacked Data in the Hands of a Trained Intelligence Professional<br/>Wally Prather, Dave Marcus</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/200-your-facts-are-not-safe-with-us-russian-information-operations-as-social-engineering-meagan-keim">Your Facts Are Not Safe With Us: Russian Information Operations as Social Engineering<br/>Meagan Keim</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/201-decepticon-deceptive-techniques-to-derail-osint-attempts-joe-gray">DECEPTICON: Deceptive Techniques to Derail OSINT attempts<br/>Joe Gray</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/202-i-thought-renewing-the-domain-name-was-your-job-allan-liska">I Thought Renewing the Domain Name Was Your Job?<br/>Allan Liska</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/203-automating-unstructured-data-classification-malek-ben-salem">Automating Unstructured Data Classification<br/>Malek Ben Salem</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/204-vulnerability-patched-in-democratic-donor-database-josh-lospinoso">Vulnerability Patched in Democratic Donor Database<br/>Josh Lospinoso</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/205-living-in-a-world-with-insecure-internet-of-things-iot-marc-schneider">Living in a world with insecure Internet of Things (IoT)<br/>Marc Schneider</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/206-vulnerability-accountability-levers-and-how-you-can-use-them-amlie-koran">Vulnerability Accountability Levers and How You Can Use Them<br/>Amelie Koran</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/207-cyber-mutual-assistance-a-new-model-for-preparing-and-responding-to-cyber-attack-david-batz">Cyber Mutual Assistance - A New Model for Preparing and Responding to Cyber Attack<br/>David Batz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/306-rethinking-threat-intelligence-tim-gallo">Rethinking Threat Intelligence<br/>Tim Gallo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/300-what-color-is-your-cyber-parachute-cliff-neve-candace-king-kazi-islam-trey-maxam-amlie-koran">What Color Is Your Cyber Parachute?<br/>Cliff Neve, Candace King, Kazi Islam, Trey Maxam, Amelie Koran</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/301-feds-meet-hackers-ariel-robinson-alyssa-feola-gray-loftin-beau-woods-amlie-e-koran">Feds Meet Hackers<br/>Ariel Robinson, Alyssa, Feola, Gray Loftin, Beau Woods, AmÃ©lie E. Koran</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/302-recruiting-in-cyber-dan-waddel-kathleen-smith-suzie-grieco-sabrina-iacarus-kirsten-renner-karen-stied">Recruiting in Cyber<br/>Dan Waddel, Kathleen Smith, Suzie Grieco, Sabrina Iacarus, Kirsten Renner, Karen Stied</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/303-how-to-get-started-in-cybersecurity-john-stoner">How to get started in Cybersecurity<br/>John Stoner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/304-improving-technical-interviewing-forgotten-sec">Improving Technical Interviewing<br/>Forgotten Sec</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesnova2018/305-ask-an-expert-cyber-career-guidance-and-advice-micah-hoffman-bob-gourley-john-terbush-chris-gates-kirby-plessas-lea-hurley-neal-mcloughlin-ovie-carroll-sarah-edwards-tigran-terpandjian-willie-lumpkin">Ask An Expert: Cyber Career Guidance and Advice<br/>Micah Hoffman, Bob Gourley, John TerBush, Chris Gates, Kirby Plessas, Lea Hurley, Neal Mcloughlin, Ovie Carroll, Sarah Edwards, Tigran Terpandjian, Willie Lumpkin</a></p>]]></description>
    </item>
    <item>
      <title>BSides Tampa 2018</title>
      <pubDate>Sat, 17 Feb 2018 19:18:21 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidestampa2018/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/mainlist">http://www.irongeek.com/i.php?page=videos/bsidestampa2018/mainlist</a><br/>These are the videos from the <a href="http://bsidestampa.net/">BSides Tampa</a> conference. Thanks to all of the BSides Crew for having me out to help record and render the videos. Special thanks to my video crew: Julian, Andrew Schiro, Austin Ford, John Mejia, Michael Iglesias, Micheal Milford, Mike Ziolkowski,&nbsp; Patty Morris, Robin Noyes<br/><br/>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom00-cyber-assurance-testing-for-success-col-john-burger">Cyber Assurance - Testing for Success<br/>Col. John Burger</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom01-you-can-runbut-you-cant-hide-bruce-anderson">You Can Run..but you cant hide!<br/>Bruce Anderson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom02-red-team-apocalypse-beau-bullock-and-derek-banks">Red Team Apocalypse<br/>Beau Bullock and Derek Banks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom03-advanced-persistent-security-ira-winkler">Advanced Persistent Security<br/>Ira Winkler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom04-adding-simulated-users-to-your-pentesting-lab-with-powershell-chris-myers-and-barrett-adams">Adding Simulated Users to Your Pentesting Lab with PowerShell<br/>Chris Myers and Barrett Adams</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom05-the-shoulders-of-infosec-jack-daniels">The Shoulders of InfoSec<br/>Jack Daniels</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom06-blockchain-the-new-digital-swiss-army-knife-g-mark-hardy">Blockchain: The New Digital Swiss Army Knife?<br/>G. Mark Hardy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom07-modern-day-vandals-and-thieves-wireless-edition-david-switzer-and-jonathan-echavarria">Modern Day Vandals and Thieves: Wireless Edition<br/>David Switzer and Jonathan Echavarria</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/courtroom08-fraud-should-you-worry-greg-hanis">Fraud; Should you worry?<br/>Greg Hanis</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-200-a-security-look-at-voice-based-assistants-david-vargas">A Security Look at Voice-Based Assistants<br/>David Vargas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-201-hackers-interrupted-alex-holden">Hackers Interrupted<br/>Alex Holden</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-202-insane-in-the-mainframe-taking-control-of-azure-security-jeremy-rassmusen">Insane in the Mainframe: Taking Control of Azure Security<br/>Jeremy Rassmusen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-203-mifare-lady-teaching-an-old-rfid-new-tricks-daniel-reilly">MiFare lady Teaching an old RFID new tricks<br/>Daniel Reilly</a></p>
<p>Medical Device Security: State of the Art in 2018<br/>Shawn Merdinger<br/>(not recorded)</p>
<p>Weaponizing IoT - NOT!<br/>Kat Fitzgerald<br/>(not recorded)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-206-blue-teams-tool-dump-stop-using-them-term-next-gen-this-isnt-xxcall-of-dutyxx-alex-kot">Blue Team's tool dump. Stop using them term NeXt-Gen this isn't XX_Call of Duty_XX.<br/>Alex Kot</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-300-exploiting-zillow-zestimate-for-reckless-profit-robert-rj-burney">Exploiting Zillow "Zestimate" for Reckless Profit<br/>Robert "RJ" Burney</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-301-self-healing-cyber-weapons-logan-hicks">Self Healing Cyber Weapons<br/>Logan Hicks</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-302-ransomware-a-declining-force-in-todays-threat-landscape-brad-duncan">Ransomware: A Declining Force in Today's Threat Landscape<br/>Brad Duncan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-303-modern-web-application-security-julien-vehent">Modern web application security<br/>Julien Vehent</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-304-advanced-social-engineering-and-osint-for-penetration-testing-joe-gray">Advanced Social Engineering and OSINT for Penetration Testing<br/>Joe Gray</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-305-critical-infrastructure-scada-security-101-for-cybersecurity-professionals-juan-lopez">Critical Infrastructure &amp; SCADA Security 101 for Cybersecurity Professionals<br/>Juan Lopez</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/track-306-exothermic-data-destruction-defeating-drive-recovery-forensics-nikita-mazurov-and-kenneth-brown">Exothermic Data Destruction: Defeating Drive Recovery Forensics<br/>Nikita Mazurov and Kenneth Brown</a></p><a href="http://www.irongeek.com/i.php?page=videos/bsidestampa2018/derricks-thank-yous">Derrick's Thank Yous</a>]]></description>
    </item>
    <item>
      <title>BSidesPhilly 2017 Videos </title>
      <pubDate>Fri, 8 Dec 2017 21:04:38 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/mainlist">http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/mainlist</a> <br/>These are the videos from <a href="http://www.bsidesphilly.org/">BSides Philadelphia</a> 2017. Thanks to Mark, Mike, Austin, John, David and others I'm forgetting for helping with the video. <br/>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg01-innovating-for-21st-century-warfare-ernest-cozy-panda-wong">Innovating for 21st Century Warfare<br/>Ernest "Cozy Panda" Wong</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg02-mfa-its-2017-and-youre-still-doing-wrong-presented-by-dan-astor-and-chris-salerno">MFA, It's 2017 and You're Still Doing Wrong<br/>Presented by Dan Astor and Chris Salerno. </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg03-out-with-the-old-in-with-the-gnu-lsly">Out With the Old, In With the GNU<br/>Lsly</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg04-iot-devices-are-one-of-the-biggest-challenges-charles-libertyunix-sgrillo">IoT devices are one of the biggest challenges<br/>Charles @libertyunix Sgrillo</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg05-evading-c2-detection-with-asymmetry-by-brandon-arvanaghi-and-andrew-johnston">Evading C2 Detection with Asymmetry<br/>By Brandon Arvanaghi and Andrew Johnston</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg06-abusing-normality-data-exfiltration-in-plain-site-aelon-porat">Abusing Normality: Data Exfiltration in Plain Site<br/>Aelon Porat</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg07-smarter-ways-to-gain-skills-or-as-the-dod-puts-it-dr-p-shane-gallagher-institute-for-defense-analyses-and-evan-dornbush-co-founder-point3-security-inc">Smarter ways to gain skills, or as the DoD puts it<br/>Dr. P. Shane Gallagher, Institute for Defense Analyses, and Evan Dornbush, co-founder, Point3 Security, Inc.</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg08-game-of-the-se-improv-comedy-as-a-tool-in-social-engineering-danny-akacki-security-monkey">Game of the SE: Improv comedy as a tool in Social Engineering<br/>Danny Akacki - Security Monkey</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cg09-file-polyglottery-or-this-proof-of-concept-is-also-a-picture-of-cats-evan-sultanik">File Polyglottery; or, This Proof of Concept is Also a Picture of Cats<br/>Evan Sultanik</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs01-your-facts-are-not-safe-with-us-russian-information-operations-as-social-engineering-meagan-dunham-keim">Your Facts Are Not Safe With Us: Russian Information Operations As Social Engineering<br/>Meagan Dunham Keim</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs02-supercharge-your-soc-with-sysmon-chris-lee-matthew-giannetto">Supercharge Your SOC with Sysmon<br/>Chris Lee &amp; Matthew Giannetto</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs04-threat-hunting-defining-the-process-while-circumventing-corporate-obstacles-kevin-foster-matt-schneck-ryan-andress">Threat Hunting: Defining the Process While Circumventing Corporate Obstacles<br/>Kevin Foster, Matt Schneck, Ryan Andress</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs05-put-up-a-cryptowall-and-locky-the-key-stopping-the-explosion-of-ransomware-erich-kron-cissp-issap">Put up a CryptoWall and Locky the Key - Stopping the Explosion of Ransomware<br/>Erich Kron, CISSP-ISSAP</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs06-web-hacking-101-hands-on-with-burp-suite-david-rhoades-of-mavensecuritycom">Web Hacking 101 Hands-on with Burp Suite<br/>David Rhoades of MavenSecurity.com</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/bsidesphilly2017/bsidesphilly-cs08-hacker-mindset-david-brown-cissp-cism-iam">Hacker Mindset <br/>David Brown: CISSP, CISM, IAM</a></p>]]></description>
    </item>
    <item>
      <title>SecureWV/Hack3rcon2017 </title>
      <pubDate>Sun, 19 Nov 2017 21:01:49 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/mainlist">http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/mainlist</a> <br/>These are the videos of the presentations from <a href="http://securewv.com/">Secure West Virginia 2017</a>. Thanks to Justine, Tim, Morgan, Kevin, Todd &amp; Roy for helping record. 
<p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker00-intro-benny-karnes">Intro<br/>Benny Karnes</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker01-fighting-advanced-persistent-threats-with-advanced-persistent-security-ira-winkler">Fighting Advanced Persistent Threats with Advanced Persistent Security<br/>Ira Winkler</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker02-coming-up-with-the-next-wave-of-cyber-innovations-start-by-thinking-1ns1d3-th3-b0x-ernest-wong">Coming Up with the Next Wave of Cyber Innovations-Start by Thinking 1ns1d3 th3 B0x<br/>Ernest Wong</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker06-i-survived-ransomeware-twice-matt-perry">I survived Ransomeware.... Twice<br/>Matt Perry</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker07-value-of-threat-intelligence-stealthcare">Value of threat intelligence<br/>Stealthcare</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/teacher01-sdr-rf-hacking-primer-andrew-bindner">SDR &amp; RF Hacking Primer<br/>Andrew Bindner</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/forensics00-digital-forensic-analysis-planning-and-execution-john-sammons">Digital Forensic Analysis: Planning and Execution<br/>John Sammons</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/forensics01-intro-to-wireshark-josh-brunty">Intro to WireShark<br/>Josh Brunty</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker08-secrets-of-superspies-ira-winkler">Secrets of Superspies<br/>Ira Winkler</a><br/></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker09-total-recall-using-implicit-memory-as-a-cryptographic-primitive-tess-schrodinger">Total Recall: Using Implicit Memory as a Cryptographic Primitive<br/>Tess Schrodinger</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker10-iot-panel-rcbi">IoT Panel<br/>RCBI</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker11-hillbilly-storytime-pentest-fails-adam-compton">Hillbilly Storytime - Pentest Fails<br/>Adam Compton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker12--hackers-hugs-and-drugs-amada-berlin">Hackers, Hugs and Drugs<br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker13-fldigi-e-mail-over-packet-radio-aaron-west-and-rob-west">FLDigi - E-mail over Packet Radio<br/>Aaron West and Rob West</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker14-from-junk-to-jewels-destruction-is-the-key-to-building-branden-miller-audrey-miller">From junk to jewels: Destruction is the key to building<br/>Branden Miller &amp; Audrey Miller</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker15-scap-a-primer-and-customization-scott-keener">SCAP: A Primer and Customization<br/>Scott Keener</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/teacher02-security-through-ansible-automation-adam-vincent">Security Through Ansible Automation<br/>Adam Vincent</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/forensics02-vehicle-forensics-an-emerging-source-of-evidence-john-sammons">Vehicle Forensics: An Emerging Source of Evidence<br/>John Sammons</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/forensics03-network-forensics-using-kali-linux-andor-sans-sift-josh-brunty">Network Forensics using Kali Linux and/or SANS Sift<br/>Josh Brunty</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker16-911-ddos-daniel-efaw">911 DDOS<br/>Dianiel Efaw</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker17-pis-pis-and-wifi-steve-truax">Pi's, Pi's and wifi<br/>Steve Truax</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/forensics04-technical-testimony-doing-the-heavy-lifting-for-the-jury-john-sammons">Technical Testimony: Doing the Heavy Lifting for the Jury<br/>John Sammons</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/speaker18-emergent-gameplay-ron-moyer">Emergent Gameplay<br/>Ron Moyer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/securewv-hack3rcon2017/closing">Closing</a></p>]]></description>
    </item>
    <item>
      <title>GrrCON 2017 Videos</title>
      <pubDate>Sat, 28 Oct 2017 08:25:42 -0500</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/grrcon2017/mainlist </link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mainlist">http://www.irongeek.com/i.php?page=videos/grrcon2017/mainlist</a><br/>These are the videos of the presentations from <a href="http://www.GrrCON.com">GrrCON 2017</a>. Big thanks to EggDropX and Jaime for having me out, and my video crew&nbsp; (<a href="https://twitter.com/paint27">paint27</a>, Erick, &amp; <a href="https://twitter.com/brettahansen">brettahansen</a>) for recording.
<p></p>
<p><B><FONT size=5>Ghast</FONT></B></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast01-strategies-on-securing-you-banks-enterprises-from-someone-who-robs-banks-enterprises-for-a-living-jayson-e-street">STRATEGIES ON SECURING YOU BANKS &amp; ENTERPRISES. (FROM SOMEONE WHO ROBS BANKS &amp; ENTERPRISES FOR A LIVING!)<br/>Jayson E Street</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast03-population-control-through-the-advances-in-technology-chris-roberts">Population Control Through The Advances In Technology…<br/>Chris Roberts</a><br/>(sorry for the music in back ground)</p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast04-you-got-your-sql-attacks-in-my-honeypot-andrew-brandt">You Got Your SQL Attacks In My Honeypot<br/>Andrew Brandt</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast06-3rd-party-data-burns-aaron-finux-finnon">3rd Party Data Burns<br/>Arron "Finux" Finnon</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast07-morphing-to-legitimate-behavior-attack-patterns-dave-kennedy">Morphing to Legitimate Behavior Attack Patterns<br/>Dave Kennedy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast08-stealing-domain-admin-or-how-i-learned-to-stop-worrying-and-love-the-cssf-jerod-brennen">Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF<br/>Jerod Brennen</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast09-oops-was-that-your-pacemaker-charles-parker-ii">Oops! Was that your pacemaker?<br/>Charles Parker, II</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast11-10-cent-beer-night-the-world-we-now-live-in-johnny-xmas">10 Cent Beer Night: The World we now Live In<br/>Johnny Xmas</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast12-realizing-software-security-maturity-the-growing-pains-gains-mark-stanislav-kelby-ludwig">Realizing Software Security Maturity: The Growing Pains &amp; Gains<br/>Mark Stanislav &amp; Kelby Ludwig</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast13-cyber-cyber-cyber-using-the-killchain-to-accomplish-something-amanda-berlin">Cyber, Cyber, Cyber - Using the killchain to accomplish something <br/>Amanda Berlin</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast14-an-employee-their-laptop-and-a-hacker-walk-into-a-bar-shannon-fritz">An Employee, their Laptop and a Hacker walk into a Bar <br/>Shannon Fritz</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast15-eye-on-the-prize-a-proposal-for-legalizing-hacking-back-adam-hogan">Eye on the Prize - a Proposal for Legalizing Hacking Back <br/>Adam Hogan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/ghast16-ive-got-a-pocket-bone-to-pick-with-you-dr-phil-postra">I've got a (Pocket) Bone to pick with you<br/>Dr Phil Postra</a></p>
<p><B><FONT size=5>Gig</FONT></B></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig00-topic-depends-on-number-of-federal-agents-in-audience-atlas-of-doom">Topic depends on number of federal agents in audience<br/>Atlas of Doom</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig01-embedding-security-in-embedded-systems-dr-jared-demott">Embedding Security in Embedded Systems<br/>Dr. Jared DeMott</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig02-national-guard-for-cyber-how-about-a-volunteer-cyber-department-ray-davidson">National Guard for Cyber? How about a Volunteer Cyber Department?<br/>Ray Davidson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig03-red-team-yourself-thomas-richards">Red Team Yourself<br/>Thomas Richards</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig04-an-attack-pathway-into-your-organization-reducing-risk-without-reducing-operational-efficiency-david-adamczyk">An Attack Pathway Into Your Organization? Reducing risk without reducing operational efficiency<br/>David Adamczyk</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig05-pen-test-war-stories-why-my-job-is-so-easy-and-how-you-can-make-it-harder-aaron-herndon">Pen Test War Stories - Why my job is so easy, and how you can make it harder<br/>Aaron Herndon</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig06-skills-for-a-red-teamer-brent-white-tim-roberts">Skills For A Red-Teamer<br/>Brent White &amp; Tim Roberts</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig07-probespy-tracking-your-past-predicting-your-future-stumblebot-">ProbeSpy: Tracking your past, predicting your future<br/>stumblebot </a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig08-vap0r-and-the-blooming-onion-justin-whitehead-jim-allee">vAp0r and the Blooming Onion<br/>Justin Whitehead &amp; Jim Allee</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig09-a-grreat-new-way-of-thinking-about-innovating-for-cyber-defense-and-even-cyber-offense-ernest-cozy-panda-wong">A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense)<br/>Ernest "Cozy Panda" Wong</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig10-threat-intelligence-zero-to-basics-in-presentation-chris-j">Threat Intelligence: Zero to Basics in presentation<br/>Chris J</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig12-learning-from-infosec-fails-derek-milroy">Learning from InfoSec Fails<br/>Derek Milroy</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig13-a-reporters-look-at-open-source-intelligence-hilary-louise">A Reporter's Look at Open Source Intelligence<br/>Hilary Louise</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig14-hidden-treasure-detecting-intrusions-with-etw-zac-brown">Hidden Treasure: Detecting Intrusions with ETW<br/>Zac Brown</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/gig15-the-black-art-of-wireless-post-exploitation-gabriel-solstice-ryan">The Black Art of Wireless Post-Exploitation<br/>Gabriel "solstice" Ryan</a></p>
<p><B><FONT size=5>Mi Go</FONT></B></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go00-change-is-simply-an-act-of-survival-predicting-the-future-while-shackled-to-the-past-bil-harmer">Change is Simply an Act of Survival: Predicting the future while shackled to the past<br/>Bil Harmer</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go01-dissecting-destructive-malware-and-recovering-from-catastrophe-bryan-york">Dissecting Destructive Malware and Recovering from Catastrophe<br/>Bryan York</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go02-infosec-state-of-affairs-too-much-kim-kardashian-not-enough-malcolm-gladwel-jim-wojno-dan-kieta">Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel<br/>Jim Wojno &amp; Dan Kieta</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go03-how-do-you-poc-are-you-really-testing-a-product-ken-donze">How do you POC? Are you really testing a product<br/>Ken Donze</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go04-tales-from-the-trenches-practical-information-security-lessons-michael-belton">Tales From The Trenches: Practical Information Security Lessons<br/>Michael Belton</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go05-securing-the-internet-of-things-iot-through-security-research-and-vulnerability-analysis-deral-heiland">Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis<br/>Deral Heiland</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go06-the-future-of-cyber-security-anthony-sabaj">The Future of Cyber Security<br/>Anthony Sabaj</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go07-building-a-usable-mobile-data-protection-strategy-david-heal-schwartzberg">Building a Usable Mobile Data Protection Strategy<br/>David "Heal" Schwartzberg</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go08-software-defined-segmentation-matt-hendrickson">Software Defined Segmentation<br/>Matt Hendrickson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go10-the-shuttle-columbia-disaster-lessons-that-were-not-learned-joel-i-love-it-when-they-call-me-big-poppa-cardella">The Shuttle Columbia Disaster: Lessons That Were Not Learned<br/>Joel "I love it when they call me Big Poppa" Cardella</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go11-infrastructure-based-security-chris-barnes">Infrastructure Based Security<br/>Chris Barnes</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go12-defending-the-de-funded-keith-wilson">Defending The De-funded<br/>Keith Wilson</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go13-real-world-red-teaming-spartan">Real-World Red Teaming<br/>spartan</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go14-we-got-it-wrong-wolfgang-goerlich">We got it wrong<br/>Wolfgang Goerlich</a></p>
<p><a href="http://www.irongeek.com/i.php?page=videos/grrcon2017/mi-go15-critical-incident-surviving-my-first-layoff-by-applying-bcpdrp-principles-tom-mead">Critical Incident: Surviving my first layoff by applying BCP/DRP Principles<br/>Tom Mead</a></p>]]></description>
    </item>
    <item>
      <title>Derbycon 7 Videos</title>
      <pubDate>Mon, 25 Sep 2017 18:51:46 -0400</pubDate>
      <link>http://www.irongeek.com/i.php?page=videos/derbycon7/mainlist</link>
      <category>videos</category>
      <description><![CDATA[Link: <a href="http://www.irongeek.com/i.php?page=videos/derbycon7/mainlist">http://www.irongeek.com/i.php?page=videos/derbycon7/mainlist</a><br/>I still have a lot of work to do, but here are the <a href="http://www.derbycon.com">Derbycon 2017</a> videos. Working on fixing major audio sync issues as I can. Big thanks to my video jockeys Some Ninja Master, Glenn Barret, Dave Lauer, Jordan Meurer, Brandon Grindatti, Joey, nightcarnage, Evan Davison, Tim Sayre, Morgan, Ben Pendygraft, Steven (SciaticNerd), Cory Hurst, Sam Bradstreet, MadMex, Curtis Koenig, Jonathan Zentgraf, James Hurst, Paint27, Chris, Lenard.]]></description>
    </item>
  </channel>
</rss>