Security CPE

357 readers
1 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 2 years ago
MODERATORS
26
 
 

Take an incredible journey through the planning and execution of a heist, and what that means to your brain and it's chemicals.

Darknet Diaries host Jack Rhysider blends the why with the what and how in this fun and fascinating Keynote presentation for SAINTCON 2024.

SAINTCON 2024 - Keynote - Jack Rhysider

27
4
BSidesLisbon 2024 (infosec.pub)
submitted 6 months ago* (last edited 6 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
28
 
 
29
4
BSides Ottawa 2024 (infosec.pub)
submitted 7 months ago* (last edited 7 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
30
 
 

Te invitamos a seguir la Conferencia de Ciberseguridad 8.8 BSIDES 2024 SUR, un evento pionero que une dos de las más grandes conferencias de ciberseguridad en Chile con el propósito de democratizar el conocimiento técnico y promover el acceso a la información.

BSIDES Cybersecurity Conference SUR 2024 Livestream

31
 
 

CYBERWARCON is a one-day conference in Arlington, VA focused on the specter of destruction, disruption, and malicious influence on our society through cyber capabilities. CYBERWARCON is not a hacker conference, or an ICS conference, or an international policy conference. The central purpose of this conference is to identify and explore threats. Participants and attendees come from a spectrum of backgrounds including the military and government, academia, the media, and the private sector.

CYBERWARCON 2024 Agenda

CYBERWARCON 2024 Playlist

32
 
 

BSidesPDX 2024 Schedule from the website

BSidesPDX 2024 Playlist

BSides Portland is a tax-exempt charitable 501(c)(3) organization founded with the mission to cultivate the Pacific Northwest information security and hacking community by creating local inclusive opportunities for learning, networking, collaboration, and teaching.

BSides PDX on Mastodon

33
 
 

Darknet Diaries: Ep 152: Stacc Attack

Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.

34
 
 

BSidesMunich is the premiere, independently organized computer security event in the Munich, Germany area, bringing together both local and internationally renowned experts.

As an offshoot of our Meetup group, MUC:SEC, this conference extends our goals of bringing local computer security professionals together, exchanging ideas and experience and most importantly, establishing trust relationship within our community. This event is free.

BSides Munich 2024 - 8-Bit Edition playlist

BSides Munich 2024 - 8-Bit Edition schedule

35
 
 

Hardwear.io NL 2024 playlist

Hardwear.io NL 2024 schedule

Learn from leading hardware security researchers & professionals and discuss the latest & most innovative research on attacking and defending hardware.

Connect with industry peers. Join us for a bigger, bolder, and better hardwear.io

36
 
 

Hardwear.io NL 2024 playlist

Hardwear.io NL 2024 schedule

Learn from leading hardware security researchers & professionals and discuss the latest & most innovative research on attacking and defending hardware.

Connect with industry peers. Join us for a bigger, bolder, and better hardwear.io

37
3
submitted 7 months ago* (last edited 7 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
38
 
 

DarkNet Diaries Ep 151: Chris Rock

Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.

39
 
 

SAINTCON 2024 Playlist

SAINTCON 2024 Schedule

Presentations given during SAINTCON 2024, an information security conference in Provo, UT

40
3
submitted 8 months ago* (last edited 8 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
 
 

Schedule from the website

BSides PDX, Portland - Livestreams

BSides Portland is a tax-exempt charitable 501(c)(3) organization founded with the mission to cultivate the Pacific Northwest information security and hacking community by creating local inclusive opportunities for learning, networking, collaboration, and teaching.

BSides PDX on Mastodon

41
 
 

Utah’s Premiere Cyber Security Conference

October 22-25, 2024

Utah Valley Convention Center — Provo, Utah

SAINTCON 2024 Schedule

SAINTCON 2024 Livestreams

42
43
44
4
submitted 8 months ago* (last edited 8 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
 
 

Schedule

Live Stream Track 1

The Track 2 audio is difficult to understand and the video shows the presentation very badly. Live Stream Track 2

Live Stream Track 3

45
46
 
 

For CPE purposes, this is a list of linked SANS webcasts from January 2022-2024 (up to October 10) primarily English language only. SANS Webcasts are useful if you are in a pinch time-wise in your current cycle as you can download the certificate and slides etc. without actually watching the webcast (SANS registration required). I am not advocating this as a general approach but it can be helpful if you are running on empty and need a last few CPEs.

I scraped these primarily by hand so please forgive aspects such as the lack of a space between titles and presenters. Hopefully not duplicative of other similar resources but sharing in any event. If anyone can direct me to similarly curated resources that I may have overlooked, please do.

https://docs.google.com/spreadsheets/d/1AdlvuxA6IMtFCJa5qAa-Krbl2P5sEeThwW3HO2S8EU8

47
 
 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

48
49
3
submitted 8 months ago* (last edited 8 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
50
 
 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

view more: ‹ prev next ›