Index of /LASCON/LASCON 2016/


../
Architecting a Security Program for the Future ..> 28-Jul-2020 06:43           886524130
Architecting a Security Program for the Future ..> 28-Jul-2020 06:43              103504
Architecting a Security Program for the Future ..> 28-Jul-2020 06:43           152370825
Avoiding Application Security Program Pitfalls ..> 28-Jul-2020 06:43              112626
Avoiding Application Security Program Pitfalls ..> 28-Jul-2020 06:43           114383833
Be Ready for BeyondCorp  enterprise identity, p..> 28-Jul-2020 06:43               74033
Be Ready for BeyondCorp  enterprise identity, p..> 28-Jul-2020 06:43            59703448
Building Information Security Program from Scra..> 28-Jul-2020 06:43              130336
Building Information Security Program from Scra..> 28-Jul-2020 06:43            77422519
Could a few links of code [email protected]#k it all up!.en.tr..> 28-Jul-2020 06:43               51044
Could a few links of code [email protected]#k it all up!.mp4      28-Jul-2020 06:43            84979434
Cryptography 101  A History and the Basics of C..> 28-Jul-2020 06:43               91251
Cryptography 101  A History and the Basics of C..> 28-Jul-2020 06:43           129303822
Demystifying a Malware Attack - Christopher Eli..> 28-Jul-2020 06:43               94383
Demystifying a Malware Attack - Christopher Eli..> 28-Jul-2020 06:43            92399366
Doing Security in 100 milliseconds--The Speed o..> 28-Jul-2020 06:43           123296838
Don't Touch Me That Way - David Linder.en.trans..> 28-Jul-2020 06:43               66910
Don't Touch Me That Way - David Linder.mp4         28-Jul-2020 06:43            90726585
Easy Mobile Hacking  Native and Hybrid Pitfalls..> 28-Jul-2020 06:43               88561
Easy Mobile Hacking  Native and Hybrid Pitfalls..> 28-Jul-2020 06:43           150327943
Eradicating the Weakest Link in Global Corporat..> 28-Jul-2020 06:43            62518738
Go Purple! Adopt purple team strategy to augmen..> 28-Jul-2020 06:43           171488688
Hindsight isn't good enough  LANGSEC helps you ..> 28-Jul-2020 06:44           848815290
Hindsight isn't good enough  LANGSEC helps you ..> 28-Jul-2020 06:44           135266780
IOT and AppSec- Jason Kent.mp4                     28-Jul-2020 06:44           158611908
Invited Speaker  Dave Kennedy.en.transcribed.srt   28-Jul-2020 06:44              135927
Invited Speaker  Dave Kennedy.mp4                  28-Jul-2020 06:44           204701871
Invited Speaker  Ryan Huber.en.transcribed.srt     28-Jul-2020 06:44              122567
Invited Speaker  Ryan Huber.mp4                    28-Jul-2020 06:44            99194652
It's 10pm, Do You Know Where Your Access Keys A..> 28-Jul-2020 06:44               86801
It's 10pm, Do You Know Where Your Access Keys A..> 28-Jul-2020 06:44            77093878
Key Note  Shannon Lietz.9073b2d3-cda4-4604-8828..> 28-Jul-2020 06:44           842371127
Key Note  Shannon Lietz.en.transcribed.srt         28-Jul-2020 06:44              104502
Key Note  Shannon Lietz.mp4                        28-Jul-2020 06:44           166269783
LangSec for the Masses - Joe Rozner.en.transcri..> 28-Jul-2020 06:44               95595
LangSec for the Masses - Joe Rozner.mp4            28-Jul-2020 06:44            87293060
Lean Security  Ernest Mueller.en.transcribed.srt   28-Jul-2020 06:44               88629
Lean Security  Ernest Mueller.mp4                  28-Jul-2020 06:44            97181017
Leveling up your bug bounty program- Charles Va..> 28-Jul-2020 06:44               94065
Leveling up your bug bounty program- Charles Va..> 28-Jul-2020 06:44            47813597
Making Invisible Things Visible  Tracking Down ..> 28-Jul-2020 06:44               90261
Making Invisible Things Visible  Tracking Down ..> 28-Jul-2020 06:44           162030127
Making Vulnerability Management Suck Less with ..> 28-Jul-2020 06:44               90144
Making Vulnerability Management Suck Less with ..> 28-Jul-2020 06:44           132300963
Mind the CSP Gap  Challenges developing a meani..> 28-Jul-2020 06:44               79433
Mind the CSP Gap  Challenges developing a meani..> 28-Jul-2020 06:44           102454975
Monitoring Attack Surface and Integrating Secur..> 28-Jul-2020 06:44              113798
Monitoring Attack Surface and Integrating Secur..> 28-Jul-2020 06:44           133840586
Not all HTTPS sites are equally secure, make yo..> 28-Jul-2020 06:44               55862
Not all HTTPS sites are equally secure, make yo..> 28-Jul-2020 06:44            62640967
Practical Physical Security Advice for the Mode..> 28-Jul-2020 06:44               89890
Practical Physical Security Advice for the Mode..> 28-Jul-2020 06:44           115645474
Scanning IPv4 for Free Data and Free Shells - J..> 28-Jul-2020 06:44              109988
Scanning IPv4 for Free Data and Free Shells - J..> 28-Jul-2020 06:45           145709988
Securing the Spark Fire Hose - Jack Mannino, Ab..> 28-Jul-2020 06:45              103553
Securing the Spark Fire Hose - Jack Mannino, Ab..> 28-Jul-2020 06:45            79924867
Six myths of Information Security - Steve Horst..> 28-Jul-2020 06:45               98899
Six myths of Information Security - Steve Horst..> 28-Jul-2020 06:45           109215206
Sk8ing in Thin Ice  A crash course in Kubernete..> 28-Jul-2020 06:45               86557
Sk8ing in Thin Ice  A crash course in Kubernete..> 28-Jul-2020 06:45            78863800
Three profiles of OAuth2 for Identity and Acces..> 28-Jul-2020 06:45               83224
Three profiles of OAuth2 for Identity and Acces..> 28-Jul-2020 06:45           168687102
Trusted Execution  A Deterministic Approach to ..> 28-Jul-2020 06:45           127187330
What if IOT is Dumped in Your Lap  - Chris Walk..> 28-Jul-2020 06:45           193639068
Why the LinkedIn hack could be your biggest App..> 28-Jul-2020 06:45               96707
Why the LinkedIn hack could be your biggest App..> 28-Jul-2020 06:45           114800538