26
7
Darknet Diaries EP 146: ANOM (darknetdiaries.com)
submitted 2 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

In this episode, Joseph Cox ( https://infosec.exchange/deck/@josephcox)) tells us the story of ANOM. A secure phone made by criminals, for criminals.

This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

27
2
submitted 2 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

BSidesCharm is a regional Security BSides held in the Baltimore region of Maryland. It operates under the umbrella principles of Security BSides as a larger community project within information security. BSides aims to offer small, intimate events where all participants can engage each other to help develop connections, friendships, and network with different industry professionals.

BSidesCharm Playlist

BSidesCharm Schedule

28
2
submitted 2 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Symposium sur la sécurité des technologies de l'information et des communications

Programme du SSTIC 2024 : Agenda du 5 au 7 juin 2024

Streaming

29
8
Botconf 2024 (external-content.duckduckgo.com)
submitted 2 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Botconf typically gathers 400 people from all around the world and various backgrounds. They all share the same goal of fighting malware, but with complimentary approaches: law enforcement, academia, CSIRT, threat analysis teams, antivirus developers, etc.

Botconf 2024 Playlist

Botconf 2024 Schedule

30
3
submitted 2 months ago* (last edited 3 days ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, BSides Seattle continues to provide space for the open sharing of ideas, concepts and debates. A place where security geeks of all ages, all levels of learning, all walks of life can bring their true selves and learn amazing things

Bsides Seattle 2024 schedule

Bsides Seattle 2024 Playlist

31
1
submitted 2 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Insomni'hack is a Swiss security conference and hacking contest founded and organized by SCRT S.A.

Insomni'hack 2024 Schedule from the website

Insomni'hack Playlist

32
2
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Welcome to SCYTHE's fifth annual UniCon, a free virtual all-day purple teaming conference held on April 9, National Unicorn Day!

#UniCon24 Theme: Strengthening Cyber Resilience

UniCon 2024 Schedule

UniCon 2024 Playlist

Opening Keynote: -Dave Kennedy - Co-Founder & Chief Hacking Officer, TrustedSec

Keynote: -Jake Williams - Enterprise Risk Management Expert

Closing Keynote: -Bryson Bort - CEO & Founder, SCYTHE

Acclaimed speakers (alphabetical order) include: -Zack Allen, Director, Datadog -Lesley Carhart, Technical Director, Dragos, Inc. -Nicholas Carroll, Cyber Incident Response Manager, Raytheon -Jeremiah Dewey, SVP, Rapid7 -Thomas VanNorman, CISSP, GICSP, SVP, GRIMM Cyber -Tarah M. Wheeler, CEO, Red Queen Dynamics

33
5
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
34
5
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
35
2
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

L’organisateur de cette manifestation est l’OSSIR – Observatoire de la sécurité des Systèmes d’Information et des Réseaux – Association loi 1901 – Site Web : https://www.ossir.org

Schedule with links to video and slides

Video Playlist

36
3
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
37
1
Hardly Strictly Security (framerusercontent.com)
submitted 3 months ago* (last edited 3 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

Hardly Strictly Security is the only cybersecurity conference focused on leveraging the power of open source. This one day, single track virtual event will focus on the opportunities of incorporating an open source strategy within your security program. We'll cover topics from getting started to scaling, governance, and more…This conference is for security engineers, red teams, bug bounty hunters, and anyone who wants to celebrate and continue to leverage the power of open source to help make our world more secure.

Hardly Strictly Security Schedule (page is slow to open)

Hardly Strictly Security Playlist

38
4
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

The purpose of the conference is to collaborate with various vulnerability management and cybersecurity professionals to develop forward leaning ideas that can be taken back to individual programs for action to benefit the vulnerability management ecosystem. A key goal of the conference is to understand what important stakeholders and programs are doing within the vulnerability management ecosystem and best determine how to benefit the ecosystem broadly.

VulnCon is Co-Sponsored by FIRST and the CVE Program. This event will be open to both FIRST members and non-members around the world.

CVE/FIRST VulnCon 2024 Program Overview

CVE/FIRST VulnCon 2024 Playlist

39
6
BSides Lancashire 2024 - 19 talks (www.bsideslancashire.org)
submitted 3 months ago* (last edited 3 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
40
1
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
41
8
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

HackCon Online 2024 Playlist

HackCon Online 2024

HackCon har gått sammen med store deler av sikkerhetsmiljøet i Norge og lagd HackCon Online.

HackCon Online er gratis og arrangeres uken før selve HackCon og ble i 2024 arrangert 05.02 - 09.02.2024.

For mer informasjon se; https://www.hackcon.org/

42
4
submitted 3 months ago* (last edited 3 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

"Infrastructure – the Good, the Bad and the Ugly"

Computer technology, like the railroad, gives us infrastructure that empowers innovators. The Internet and cloud computing let startups like YouTube and Instagram soar to huge valuations almost overnight, with only a handful of staff. But 21st century tech differs from the 19th century variety in that criminals also build infrastructure, from botnets through malware-as-a-service. There's also dual-use infrastructure, from Tor to bitcoins, with entangled legitimate and criminal applications. So crime can scale too. And even "respectable" infrastructure has disruptive uses. Social media enabled both Barack Obama and Donald Trump to outflank the political establishment and win power; they have also been used to foment communal violence in Asia. How are we to make sense of all this? Is it simply a matter for antitrust lawyers and cybercrime fighters, or do computer scientists have some insights to offer?

For the past twenty years, we have been studying the economics of information security. If Alice guards a system while Bob pays the cost of failure, you can expect trouble. This subject started out with concerns about infrastructure, namely payment card fraud and the insecurity of Windows. It worked on topics from the patch cycle through the behavioural economics of privacy to cybercrime. We learned that many persistent problems are down to misaligned incentives.

We are now realising that when problems scale, infrastructure is usually involved; that we need computer-science insights into scaling as well as economists' insights into incentives; and that both of us have underestimated the role of institutions. We need to understand all this better to put controls at the right level in the stack and to develop better strategies to fight cybercrime. We may also find some new directions as the regulation of technology moves up the political agenda.

Bio: Ross Anderson has devoted his career to developing security engineering as a discipline. He was a pioneer of hardware tamper-resistance, API security, peer-to-peer systems, prepayment metering and powerline communications. His other research extends from cryptography through side channels and the safety and privacy of clinical systems to technology policy. He was one of the founders of the discipline of security economics, and is PI of the Cambridge Cybercrime Centre, which collects and analyses data about online crime and abuse. He is a Fellow of the Royal Society and the Royal Academy of Engineering, as well as a winner of the Lovelace Medal – the UK's top award in computing. He holds faculty positions at both Cambridge and Edinburgh universities.

43
9
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

How cyber-crime has become organised warfare - Four Corners - ABC News In-depth

Every seven minutes a cyber-attack is reported in Australia

Millions of Australians have had their data stolen in malicious attacks, costing some businesses tens of millions of dollars in ransom. The federal government is warning the country must brace for even more strikes as cyber gangs become more sophisticated and ruthless.

Four Corners investigates the cyber gangs behind these assaults, cracking open their inner operations and speaking to a hacker who says he targets Australians and shows no remorse.

The program travels all the way to Ukraine and discovers we share a common enemy in the battle for cyber security.

44
2
submitted 3 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
45
5
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Prague 2024 schedule

BSides Prague Playlist

BSides Prague is an annual community-driven information security conference held in Prague, Czech Replublic. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It's a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.

46
2
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Rob Lee on detecting cyber risk in IoT and industrial control systems

How does cyber risk impact industrial control systems as well as all the other connected systems in an Internet of Things (IoT) world? And which organizations are likely to feel the impact? Dragos CEO Rob Lee outlines the threats, discusses how leaders can respond, and stresses the need for speed.

47
2
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Sofia 2024 Date: March 23 - 24, 2024

Location: Aula Maxima, University of National and World Economy, Sofia

BSides Sofia 2024 Schedule

BSides Sofia 2024 Talk videos

48
3
submitted 4 months ago* (last edited 4 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
49
2
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

The Cyber Defense Matrix (CDM)

Organisations need to prove their security credentials – both internally and to auditors, regulators, customers and other stakeholders. This web session explores the Cyber Defense Matrix – a freely-available map that can help your organisation document and track its compliance efforts and security programme.

50
1
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Keynote: From Brazil with Love: Latin American Malware Analysis from Tactical and Strategic Cyber Threat Intel Outlook. Speakers: Cybelle Oliveira & Carlos Adriano Souza

Los ciberdelincuentes y estafadores brasileños utilizan técnicas de ingeniería social y phishing con el objetivo de engañar a las víctimas y manipular la codicia de las personas, como en las estafas Pix. Abusan de la facilidad de los recibos bancarios para cometer fraudes, roban tarjetas de crédito, subvierten las protecciones bancarias, infectan dispositivos con troyanos bancarios. Estos ciberdelitos se han ido expandiendo paulatinamente a otros países de América Latina y ya han llegado a algunos países europeos.\n \n En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware. En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware.

.:Cybelle Oliveira:. Senior Cyber Security Analyst – Tempest Security Intelligence

Cybelle es una orgullosa madre de gatos y analista senior de ciberseguridad en Tempest Security Intelligence en Brasil. Es una especie de chica chismosa de Malwareland: investiga lo que sucede en las desgracias cibernéticas. Además de su trabajo remunerado, Cybelle ha estado involucrada en el activismo de privacidad y seguridad durante más de 10 años y ha presentado charlas en eventos en todo el mundo, como BSides LV, Girls Hack Village (DefCon), Internet Freedom Festival, Radical Networks, Mozilla Festival, Roadsec, Cryptorave, entre otros. Cybelle es parte de la comunidad de Mozilla y directora de la organización brasileña Casa Hacker.

.:Carlos Adriano Souza:. Cyber Security Specialist – Tempest Security Intelligence

Carlos es un aventurero. Cuando no está rastreando y descubriendo cascadas, trabaja como ingeniero inverso en Tempest Security Intelligence, Brasil. Ya ha trabajado como investigador federal y tiene experiencia en ciberseguridad militar. Le apasiona comprender las amenazas cibernéticas globales y comprender cómo funciona el software.

view more: ‹ prev next ›

Security CPE

293 readers
2 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 1 year ago
MODERATORS