ACoD
File List
- ACoD 2019/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.mp4 41.4 MB
- ACoD 2018/Pete Lindstrom, Applying - Risk Reduced per Unit Cost - to IT Adversarial Risk Management, Phils.mp4 37.4 MB
- ACoD 2017/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.mp4 35.3 MB
- ACoD 2018/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.mp4 35.3 MB
- ACoD 2019/An Academic Exercise in Threat Intelligence - Jesse Bowling.mp4 33.8 MB
- ACoD 2018/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.mp4 33.3 MB
- ACoD 2017/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.mp4 33.3 MB
- ACoD 2019/Use a malware to catch a malware - Arun Lakhotia.mp4 31.1 MB
- ACoD 2017/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.mp4 30.1 MB
- ACoD 2018/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.mp4 30.1 MB
- ACoD 2018/Winn Schwartau, The Analogue Prism.mp4 29.8 MB
- ACoD 2017/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.mp4 29.6 MB
- ACoD 2018/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.mp4 29.6 MB
- ACoD 2019/Phoenix Continued - Greg Olmstead, Justin Borland.mp4 29.1 MB
- ACoD 2019/Pose a Threat - Rob Ragan and Oscar Salazar.mp4 28.6 MB
- ACoD 2018/Sounil Yu, The Cyber Defense Matrix - A Scientific Model for Cybersecurity.mp4 28.6 MB
- ACoD 2018/Art Manion, Desperately Seeking Severity.mp4 28.4 MB
- ACoD 2018/Rich MacVarish, Structured Analytic Techniques - Moving from Art to Science in Analysis.mp4 28.2 MB
- ACoD 2019/Using GreyNoise to Quantify Response Time - Andrew Morris.mp4 28.2 MB
- ACoD 2018/Jonathan Spring,Forensics, decisions, and making the abstract concrete.mp4 27.2 MB
- ACoD 2018/Trenton Ivey, The Medium Makes the Art - Vulnerabilities vs. Tactics.mp4 26.9 MB
- ACoD 2018/John Brown, Drop packets really fast with BGP, uRPF and Exa-BGP, Ops Track.mp4 26.3 MB
- ACoD 2017/John Brown, Drop packets really fast with BGP, uRPF and Exa-BGP, Ops Track.mp4 26.3 MB
- ACoD 2018/Gadi Evron, Co-evolutionary arms races with potentially highly adapted adversary.mp4 26.1 MB
- ACoD 2019/DNS IMAP Prepositioning Attacks - Bill Woodcock.mp4 25.5 MB
- ACoD 2018/Paul Simmonds, Fix digital identity, stop the bad guys.mp4 25.0 MB
- ACoD 2018/Jesse Trucks, Future-proof the InfoSec Arms Race.mp4 24.9 MB
- ACoD 2019/Effective Threat Hunting w Open Source Tools - Eric Capuano.mp4 24.4 MB
- ACoD 2017/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.mp4 24.1 MB
- ACoD 2018/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.mp4 24.1 MB
- ACoD 2018/Falcon Darkstar Momot, How can a protocol be concise.mp4 23.8 MB
- ACoD 2018/Max Kilger, Anticipating the Nature and LIkelihood of a Cyberterror Community.mp4 23.7 MB
- ACoD 2017/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.mp4 23.2 MB
- ACoD 2018/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.mp4 23.0 MB
- ACoD 2017/Aaron Shelmire, Decreasing Dwell Time, Ops Track.mp4 22.5 MB
- ACoD 2018/Aaron Shelmire, Decreasing Dwell Time, Ops Track.mp4 22.5 MB
- ACoD 2019/State of the Art of DNS Security - Bill Woodcock.mp4 19.9 MB
- ACoD 2018/Steve Crocker, The standards process.mp4 19.5 MB
- ACoD 2019/Welcome to ACoD 2019.mp4 19.0 MB
- ACoD 2019/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.mp4 19.0 MB
- ACoD 2019/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.mp4 17.8 MB
- ACoD 2019/Sprinting up the Pyramid of Pain - Eric Loui.mp4 17.8 MB
- ACoD 2018/Joel Wilbanks and Steve Orrin, Adding Discipline to Information.mp4 17.7 MB
- ACoD 2017/Ido Safruti, Abusing Google and Facebook login, Ops Track.mp4 17.3 MB
- ACoD 2018/Ido Safruti, Abusing Google and Facebook login, Ops Track.mp4 17.3 MB
- ACoD 2019/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.mp4 17.3 MB
- ACoD 2019/Continuous and Automated Defense - Sharma and Leres.mp4 17.1 MB
- ACoD 2019/The NEW Cloud Ecosystem - Jody Forness.mp4 17.0 MB
- ACoD 2019/Creating Authoritative Nameserver Reputation - John Bambenek.mp4 16.9 MB
- ACoD 2017/Sacha Faust, Scaling Red Team, Ops Track.mp4 16.7 MB
- ACoD 2018/Sacha Faust, Scaling Red Team, Ops Track.mp4 16.7 MB
- ACoD 2019/Correlating Observed Indicators with MISP - Alan Czarnecki.mp4 16.7 MB
- ACoD 2019/Nearly Real -Time Log Aggregation Using Lamda and Kinesis - Adam Murphy.mp4 16.0 MB
- ACoD 2018/Tom Ottoson, Finding the Grey Sheep before they go Baaaaad.mp4 15.9 MB
- ACoD 2019/Hash SSH Client Server Profiling - Ben Reardon.mp4 15.5 MB
- ACoD 2019/Monitoring our Minimum Viable Security Configuration - Guillaume Ross.mp4 14.9 MB
- ACoD 2019/The art of the windows kernel fuzz - Guangming Liu.mp4 14.1 MB
- ACoD 2019/Combined Tracks - Day 1 Recap - Sounil Yu, Ryan Moon.mp4 13.4 MB
- ACoD 2017/John Althouse, Detection Bro, Ops Track.mp4 13.3 MB
- ACoD 2018/John Althouse, Detection Bro, Ops Track.mp4 13.3 MB
- ACoD 2017/Carlos Sanchez, Apache Spot, Opa Track.mp4 13.3 MB
- ACoD 2018/Kelly Shortridge, Know Thyself - Optimizing Team Decision-Making.mp4 13.0 MB
- ACoD 2017/Sam Wilson, Logging the next trillion events, Ops Track.mp4 11.6 MB
- ACoD 2019/Operationalizing Cyber Threat Intelligence - Xena Olsen.mp4 11.2 MB
- ACoD 2017/Zac Brown, Hidden Treasure - Detecting Intrusions with ETW, Ops Track.mp4 11.0 MB
- ACoD 2018/Zac Brown, Hidden Treasure - Detecting Intrusions with ETW, Ops Track.mp4 11.0 MB
- ACoD 2019/Just Enough Asset Inventory -.mp4 9.9 MB
- ACoD 2017/Bryan Zimmer, Location Independent Security Approach (LISA), Ops Track.mp4 9.3 MB
- ACoD 2018/Joe Stewart feat. Inbar Raz, Researcher Conferences Suck.mp4 9.1 MB
- ACoD 2017/Joe Stewart feat. Inbar Raz, Researcher Conferences Suck.mp4 9.1 MB
- ACoD 2018/Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track.mp4 8.4 MB
- ACoD 2017/Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track.mp4 8.4 MB
- ACoD 2019/NIDS in a Portable Darta Center -.mp4 6.8 MB
- ACoD 2017/Ido Safruti, Abusing Google and Facebook login - On the risks in trusting, Ops Track.mp4 6.6 MB
- ACoD 2018/Conference Intro feat. Gadi Evron, Stop Putting Attackers on A Pedestal.mp4 5.0 MB
- ACoD 2017/Conference Intro feat. Gadi Evron, Stop Putting Attackers on A Pedestal.mp4 4.9 MB
- ACoD 2018/Welcome to ACoD.mp4 4.5 MB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.json 2.9 MB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.json 2.1 MB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.json 1.9 MB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.json 1.9 MB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.json 1.9 MB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.json 1.9 MB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.json 1.8 MB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.json 1.8 MB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.json 1.7 MB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.json 1.7 MB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.json 1.7 MB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.json 1.6 MB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.json 1.6 MB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.json 1.6 MB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.json 1.4 MB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.json 1.4 MB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.json 1.4 MB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.json 1.4 MB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.json 1.3 MB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.json 1.2 MB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.json 1.2 MB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.json 1.1 MB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.json 1.1 MB
- ACoD 2018/Slack Announcement.mp4 1.0 MB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.json 916.2 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.json 914.4 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.json 869.0 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.json 865.6 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.json 844.6 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.json 731.1 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.json 528.6 KB
- ACoD 2019/ACoD 2019 captions/An Academic Exercise in Threat Intelligence - Jesse Bowling.eng.srt 111.2 KB
- ACoD 2018/ACoD 2018 captions/Pete Lindstrom, Applying - Risk Reduced per Unit Cost - to IT Adversarial Risk Management, Phils.eng.srt 101.9 KB
- ACoD 2018/ACoD 2018 captions/Sounil Yu, The Cyber Defense Matrix - A Scientific Model for Cybersecurity.eng.srt 97.8 KB
- ACoD 2019/ACoD 2019 captions/Pose a Threat - Rob Ragan and Oscar Salazar.eng.srt 97.3 KB
- ACoD 2018/ACoD 2018 captions/Gadi Evron, Co-evolutionary arms races with potentially highly adapted adversary.eng.srt 92.8 KB
- ACoD 2019/ACoD 2019 captions/Phoenix Continued - Greg Olmstead, Justin Borland.eng.srt 89.8 KB
- ACoD 2018/ACoD 2018 captions/Art Manion, Desperately Seeking Severity.eng.srt 88.5 KB
- ACoD 2019/ACoD 2019 captions/DNS IMAP Prepositioning Attacks - Bill Woodcock.eng.srt 85.2 KB
- ACoD 2018/ACoD 2018 captions/Falcon Darkstar Momot, How can a protocol be concise.eng.srt 83.1 KB
- ACoD 2018/ACoD 2018 captions/Trenton Ivey, The Medium Makes the Art - Vulnerabilities vs. Tactics.eng.srt 82.0 KB
- ACoD 2018/ACoD 2018 captions/Jesse Trucks, Future-proof the InfoSec Arms Race.eng.srt 81.4 KB
- ACoD 2018/ACoD 2018 captions/Winn Schwartau, The Analogue Prism.eng.srt 81.3 KB
- ACoD 2018/ACoD 2018 captions/Rich MacVarish, Structured Analytic Techniques - Moving from Art to Science in Analysis.eng.srt 73.9 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.srt 73.2 KB
- ACoD 2018/ACoD 2018 captions/Kelly Shortridge, Know Thyself - Optimizing Team Decision-Making.eng.srt 72.8 KB
- ACoD 2018/ACoD 2018 captions/Max Kilger, Anticipating the Nature and LIkelihood of a Cyberterror Community.eng.srt 71.6 KB
- ACoD 2018/ACoD 2018 captions/Paul Simmonds, Fix digital identity, stop the bad guys.eng.srt 69.4 KB
- ACoD 2019/ACoD 2019 captions/Monitoring our Minimum Viable Security Configuration - Guillaume Ross.eng.srt 68.4 KB
- ACoD 2018/ACoD 2018 captions/Jonathan Spring,Forensics, decisions, and making the abstract concrete.eng.srt 66.4 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.vtt 65.9 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.txt 65.9 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.lrc 65.3 KB
- ACoD 2019/ACoD 2019 captions/State of the Art of DNS Security - Bill Woodcock.eng.srt 63.5 KB
- ACoD 2018/ACoD 2018 captions/John Brown, Drop packets really fast with BGP, uRPF and Exa-BGP, Ops Track.eng.srt 62.6 KB
- ACoD 2019/ACoD 2019 captions/Creating Authoritative Nameserver Reputation - John Bambenek.eng.srt 60.3 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.tsv 58.2 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.srt 56.8 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.srt 56.5 KB
- ACoD 2017/ACoD 2017 captions/Aaron Shelmire, Decreasing Dwell Time, Ops Track.eng.srt 55.6 KB
- ACoD 2018/ACoD 2018 captions/Aaron Shelmire, Decreasing Dwell Time, Ops Track.eng.srt 55.6 KB
- ACoD 2019/ACoD 2019 captions/Nearly Real -Time Log Aggregation Using Lamda and Kinesis - Adam Murphy.eng.srt 55.4 KB
- ACoD 2018/ACoD 2018 captions/Joel Wilbanks and Steve Orrin, Adding Discipline to Information.eng.srt 55.0 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.srt 52.2 KB
- ACoD 2018/ACoD 2018 captions/Steve Crocker, The standards process.eng.srt 52.1 KB
- ACoD 2019/ACoD 2019 captions/Correlating Observed Indicators with MISP - Alan Czarnecki.eng.srt 51.9 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.srt 51.8 KB
- ACoD 2017/ACoD 2017 captions/Bryan Zimmer, Location Independent Security Approach (LISA), Ops Track.eng.srt 51.4 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.srt 50.9 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.vtt 50.7 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.txt 50.7 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.vtt 50.6 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.txt 50.6 KB
- ACoD 2017/ACoD 2017 captions/Sam Wilson, Logging the next trillion events, Ops Track.eng.srt 50.2 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.lrc 50.2 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.lrc 50.0 KB
- ACoD 2017/ACoD 2017 captions/John Brown, Drop packets really fast with BGP, uRPF and Exa-BGP, Ops Track.eng.srt 49.0 KB
- ACoD 2017/ACoD 2017 captions/Ido Safruti, Abusing Google and Facebook login, Ops Track.eng.srt 48.1 KB
- ACoD 2018/ACoD 2018 captions/Ido Safruti, Abusing Google and Facebook login, Ops Track.eng.srt 48.1 KB
- ACoD 2019/ACoD 2019 captions/Practical Guide to Securing Kubernetes - Dan Hubbard and James Condon.eng.text 47.9 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.vtt 47.7 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.txt 47.7 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.vtt 47.4 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.txt 47.4 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.lrc 47.2 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.lrc 46.9 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.srt 46.5 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.srt 46.5 KB
- ACoD 2019/ACoD 2019 captions/Combined Tracks - Day 1 Recap - Sounil Yu, Ryan Moon.eng.srt 46.5 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.vtt 46.0 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.txt 46.0 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.srt 45.7 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.lrc 45.5 KB
- ACoD 2017/ACoD 2017 captions/Zac Brown, Hidden Treasure - Detecting Intrusions with ETW, Ops Track.eng.srt 45.4 KB
- ACoD 2018/ACoD 2018 captions/Zac Brown, Hidden Treasure - Detecting Intrusions with ETW, Ops Track.eng.srt 45.4 KB
- ACoD 2018/ACoD 2018 captions/Tom Ottoson, Finding the Grey Sheep before they go Baaaaad.eng.srt 44.8 KB
- ACoD 2017/ACoD 2017 captions/Carlos Sanchez, Apache Spot, Opa Track.eng.srt 44.4 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.srt 44.0 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.tsv 44.0 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.tsv 43.9 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.srt 43.8 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.srt 42.8 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.srt 42.8 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.tsv 42.6 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.vtt 42.4 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.vtt 42.4 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.txt 42.4 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.txt 42.4 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.tsv 42.3 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.lrc 42.0 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.lrc 42.0 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.srt 41.4 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.srt 40.7 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.srt 40.7 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.tsv 40.5 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.vtt 40.3 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.txt 40.3 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.vtt 39.8 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.lrc 39.8 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.txt 39.8 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.vtt 39.7 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.txt 39.7 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.lrc 39.4 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.lrc 39.3 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.srt 39.3 KB
- ACoD 2018/ACoD 2018 captions/Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track.eng.srt 39.0 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.vtt 38.5 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.vtt 38.5 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.txt 38.5 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.txt 38.5 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.lrc 38.1 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.lrc 38.1 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.tsv 37.7 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.tsv 37.7 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.vtt 37.5 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.txt 37.5 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.lrc 37.1 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.vtt 36.6 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.vtt 36.6 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.txt 36.6 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.txt 36.6 KB
- ACoD 2017/ACoD 2017 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.text 36.3 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.lrc 36.3 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.lrc 36.3 KB
- ACoD 2018/ACoD 2018 captions/Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track.eng.text 36.1 KB
- ACoD 2018/ACoD 2018 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.text 35.7 KB
- ACoD 2017/ACoD 2017 captions/Rich Mogull, Building the Easy Button - Five-ish Ways to Radically Automate SecOps, Ops track.eng.text 35.5 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.vtt 35.3 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.txt 35.3 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.tsv 35.0 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.tsv 35.0 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.lrc 34.9 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.tsv 34.3 KB
- ACoD 2019/ACoD 2019 captions/Effective Threat Hunting w Open Source Tools - Eric Capuano.eng.text 33.7 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.tsv 33.6 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.tsv 33.6 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.tsv 33.0 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.tsv 32.0 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.tsv 32.0 KB
- ACoD 2017/ACoD 2017 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.text 31.8 KB
- ACoD 2018/ACoD 2018 captions/Alex Pinto, Beyond Matching - Applying Data Science Techniques to IOC-based Detection, Ops Track.eng.text 31.8 KB
- ACoD 2017/ACoD 2017 captions/Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track.eng.srt 31.3 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.srt 31.2 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.srt 31.1 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.srt 31.1 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.tsv 30.8 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.srt 30.7 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.srt 30.7 KB
- ACoD 2019/ACoD 2019 captions/Just Enough Asset Inventory -.eng.srt 30.4 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.srt 30.0 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.vtt 29.8 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.vtt 29.8 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.txt 29.8 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.txt 29.8 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.lrc 29.6 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.lrc 29.6 KB
- ACoD 2017/ACoD 2017 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.text 29.4 KB
- ACoD 2018/ACoD 2018 captions/Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track.eng.text 29.3 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.vtt 28.5 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.txt 28.4 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.lrc 28.2 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.tsv 28.1 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.tsv 28.1 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.vtt 27.8 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.vtt 27.8 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.txt 27.8 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.txt 27.8 KB
- ACoD 2017/ACoD 2017 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.text 27.6 KB
- ACoD 2018/ACoD 2018 captions/Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track.eng.text 27.6 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.lrc 27.5 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.lrc 27.5 KB
- ACoD 2019/ACoD 2019 captions/Using GreyNoise to Quantify Response Time - Andrew Morris.eng.text 27.5 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.srt 27.4 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.vtt 27.2 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.txt 27.2 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.lrc 27.0 KB
- ACoD 2019/ACoD 2019 captions/Use a malware to catch a malware - Arun Lakhotia.eng.text 26.8 KB
- ACoD 2017/ACoD 2017 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.text 26.4 KB
- ACoD 2018/ACoD 2018 captions/Sacha Faust, Scaling Red Team, Ops Track.eng.text 26.4 KB
- ACoD 2017/ACoD 2017 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.text 26.2 KB
- ACoD 2018/ACoD 2018 captions/Alban Diquet, TrustKit - A defensive library to protect communication on mobile apps, Ops Track.eng.text 26.2 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.srt 25.4 KB
- ACoD 2019/ACoD 2019 captions/Forecasting, Browsers, and In The Wild Exploitation - Ryan McGeehan.eng.text 25.2 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.tsv 25.1 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.srt 24.6 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.tsv 24.4 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.tsv 24.4 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.vtt 24.4 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.txt 24.3 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.lrc 24.1 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.srt 24.0 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.tsv 23.9 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.vtt 23.2 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.txt 23.2 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.lrc 22.9 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.srt 22.9 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.vtt 22.5 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.txt 22.5 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.lrc 22.2 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.vtt 21.5 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.txt 21.5 KB
- ACoD 2019/ACoD 2019 captions/Continuous and Automated Defense - Sharma and Leres.eng.text 21.3 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.lrc 21.2 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.vtt 21.1 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.txt 21.1 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.srt 21.1 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.lrc 21.0 KB
- ACoD 2019/ACoD 2019 captions/NIDS in a Portable Darta Center -.eng.srt 20.7 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.tsv 20.7 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.tsv 20.5 KB
- ACoD 2017/ACoD 2017 captions/Ido Safruti, Abusing Google and Facebook login - On the risks in trusting, Ops Track.eng.srt 20.4 KB
- ACoD 2017/ACoD 2017 captions/John Althouse, Detection Bro, Ops Track.eng.text 20.4 KB
- ACoD 2018/ACoD 2018 captions/John Althouse, Detection Bro, Ops Track.eng.text 20.4 KB
- ACoD 2019/ACoD 2019 captions/The NEW Cloud Ecosystem - Jody Forness.eng.text 20.2 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.tsv 19.8 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.tsv 19.1 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.vtt 18.9 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.txt 18.9 KB
- ACoD 2018/ACoD 2018 captions/Joe Stewart feat. Inbar Raz, Researcher Conferences Suck.eng.srt 18.8 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.lrc 18.7 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.tsv 18.4 KB
- ACoD 2019/ACoD 2019 captions/Philosophy Track - Deploying the NIS Directive - Janusz Urbanowicz.eng.text 17.3 KB
- ACoD 2019/ACoD 2019 captions/Sprinting up the Pyramid of Pain - Eric Loui.eng.text 16.8 KB
- ACoD 2019/ACoD 2019 captions/Welcome to ACoD 2019.eng.text 16.7 KB
- ACoD 2019/ACoD 2019 captions/Profiling - VIP Accounts - Access Patterns - Rod Soto, Joseph Zadeh, Xioadan Li.eng.text 16.6 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.tsv 16.2 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.srt 15.3 KB
- ACoD 2019/ACoD 2019 captions/Hash SSH Client Server Profiling - Ben Reardon.eng.text 15.1 KB
- ACoD 2017/ACoD 2017 captions/Joe Stewart feat. Inbar Raz, Researcher Conferences Suck.eng.srt 14.4 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.vtt 13.7 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.txt 13.7 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.lrc 13.5 KB
- ACoD 2019/ACoD 2019 captions/Operationalizing Cyber Threat Intelligence - Xena Olsen.eng.text 13.2 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.tsv 11.7 KB
- ACoD 2018/ACoD 2018 captions/Welcome to ACoD.eng.srt 11.4 KB
- ACoD 2019/ACoD 2019 captions/The art of the windows kernel fuzz - Guangming Liu.eng.text 9.5 KB
- ACoD 2017/ACoD 2017 captions/Conference Intro feat. Gadi Evron, Stop Putting Attackers on A Pedestal.eng.srt 9.1 KB
- ACoD 2018/ACoD 2018 captions/Conference Intro feat. Gadi Evron, Stop Putting Attackers on A Pedestal.eng.srt 9.1 KB
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.json 8.8 KB
- ACoD thank you.txt 802 bytes
- HEADER.md 370 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.srt 290 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.vtt 264 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.txt 254 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.lrc 250 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.tsv 201 bytes
- ACoD 2018/ACoD 2018 captions/Slack Announcement.eng.text 146 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.