Cybersecurity | Cloud | DevelopmentDEF CON 25 – James Langevin, Will Hurd – DC to DEF CON Q&A November 11, 2024 video computer securityconference speakersDC to DEF CONDc-25DC25DEF CONDEF CON 25DEFCONhackhackershackingI am the CavalryJames Langevinq&asecurity conferenceWill Hurd
Cybersecurity | Cloud | DevelopmentDEF CON 29 – Sagi Sheinfeld, Eyal Karni, Yaron Zinar – Using M(achine)ITM to Attack Active Directory September 16, 2024 video Active DirectoryCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONEyal karnihacker conferencehackershackinghacking videosinformation securityinformation security conferenceMITMsagi sheinfeldsecurity conferencesecurity researchYaron Zinar
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Michael Raggo – Identifying Toxic Combinations of Permissions June 18, 2024 video Cloud VillageCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceMichael Raggosecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Igal Flegmann – I know who has access to my cloud, do you June 6, 2024 video Cloud VillageCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosIgal Flegmanninformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 29 Adversary Village – Sergey Chubarov – From OnPrem to the Cloud: Hybrid AD Attack Path April 29, 2024 video AdversaryAdversary Villageazure adCONconference speakersDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity researchSergey Chubarov
Cybersecurity | Cloud | DevelopmentDEF CON 31 – Private Keys in Public Places – Tom Pohl January 23, 2024 video CONconference speakersDEFDEF CONDEF CON 31DEFCONencryptionhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity researchTom Pohl
Cybersecurity | Cloud | DevelopmentGeorgios Kapoglis – Serverless Log Analysis On AWS – DEF CON 27 Blue Team Village January 9, 2024 video CONconference speakersDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferencesecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentAdrian Sanabria – Red Team Framework RTF – DEF CON 27 Red Team Offensive Village December 20, 2023 video CONconference speakersDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceoffensive securitypenetration testingred teamsecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentDEF CON 29 Cloud Village – Rodrigo Montoro – CSPM2CloudTrail Extending CSPM Tools December 7, 2023 video Cloud VillageCloudTrailCONconference speakersCSPMDC29DEFDEF CONDEF CON 2021DEF CON 29DEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceRodrigo MOntorosecurity conferencesecurity research
Cybersecurity | Cloud | DevelopmentMark B Cooper – PKI and SHAKEN STIR Will Fix Robocalls – DEF CON 27 Crypto and Privacy Village November 10, 2023 video CONconference speakerscryptographyDEFDEF CONDEFCONhacker conferencehackershackinghacking videosinformation securityinformation security conferenceprivacysecurity conferencesecurity research