Cybersecurity | Cloud | DevelopmentAdventures in Open Source Security Software – Jordan Wright September 27, 2022 video #101BSides San AntonioBSidesSATXconferenceGetting startedIn The Beginninginformation security
Cybersecurity | Cloud | DevelopmentSecurity and Compliance for Remote Federal Workers September 14, 2022 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentImpact of COVID-19 on Cybersecurity – SIEM Intelligence September 4, 2022 video Compliancecyber securitycyber security trainingCyber Threat HunterData SecurityDigital Forensicincident responseinformation securityinformation security trainingMITRE ATT&CKNetwork DefensepfsenseQRADARSecurity Operation CenterSIEM Intelligencesiem trainingsiemintelligencesnortSnort ProfessionalSOC Expertsoc trainingSplunkSplunk ESthreat intelligenceWeb Application Secure CoderYARA Rules
Cybersecurity | Cloud | DevelopmentInsider Threat Kill Chain: Detecting Human Indicators of Compromise September 3, 2022 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentCIS Controls: Use Cases and Cost-Justification September 2, 2022 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Felipe Pr0teus – Hunting for AWS Exposed Resources August 24, 2022 video AWS ResourcesCloud VillageCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONFelipe Pr0teushacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentCloud Misconfigurations: Simple Mistakes, Big Consequences | Ep10 August 5, 2022 video Enterprise Securityinformation securityInfosecIT SecurityNetwork SecuritySecurityTripwire
Cybersecurity | Cloud | DevelopmentToorCamp 2018 — THREAT MODELING – Justin G July 26, 2022 video BaconhackHack Under the Starshackerhackinginformation securityInfosecMakersecurity conferencesecurity researchToorCampToorCamp 2018ToorCon
Cybersecurity | Cloud | DevelopmentAyman Elsawah – Using Paretos Principle for Securing AWS with SCPs – DEF CON 27 Cloud Village July 25, 2022 video Cloud hackingCloud SecurityCONconference speakersDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentWebcast: The RMF – New Emphasis on the Risk Management Framework for Government Organizations July 4, 2022 video Enterprise Securitygovernment securityinformation securityInfosecIT SecurityNetwork SecurityRisk ManagementRMFSecurityTripwire