51
5
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Prague 2024 schedule

BSides Prague Playlist

BSides Prague is an annual community-driven information security conference held in Prague, Czech Replublic. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It's a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.

52
2
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Rob Lee on detecting cyber risk in IoT and industrial control systems

How does cyber risk impact industrial control systems as well as all the other connected systems in an Internet of Things (IoT) world? And which organizations are likely to feel the impact? Dragos CEO Rob Lee outlines the threats, discusses how leaders can respond, and stresses the need for speed.

53
2
submitted 4 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Sofia 2024 Date: March 23 - 24, 2024

Location: Aula Maxima, University of National and World Economy, Sofia

BSides Sofia 2024 Schedule

BSides Sofia 2024 Talk videos

54
3
submitted 5 months ago* (last edited 5 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
55
2
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

The Cyber Defense Matrix (CDM)

Organisations need to prove their security credentials – both internally and to auditors, regulators, customers and other stakeholders. This web session explores the Cyber Defense Matrix – a freely-available map that can help your organisation document and track its compliance efforts and security programme.

56
1
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Keynote: From Brazil with Love: Latin American Malware Analysis from Tactical and Strategic Cyber Threat Intel Outlook. Speakers: Cybelle Oliveira & Carlos Adriano Souza

Los ciberdelincuentes y estafadores brasileños utilizan técnicas de ingeniería social y phishing con el objetivo de engañar a las víctimas y manipular la codicia de las personas, como en las estafas Pix. Abusan de la facilidad de los recibos bancarios para cometer fraudes, roban tarjetas de crédito, subvierten las protecciones bancarias, infectan dispositivos con troyanos bancarios. Estos ciberdelitos se han ido expandiendo paulatinamente a otros países de América Latina y ya han llegado a algunos países europeos.\n \n En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware. En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware.

.:Cybelle Oliveira:. Senior Cyber Security Analyst – Tempest Security Intelligence

Cybelle es una orgullosa madre de gatos y analista senior de ciberseguridad en Tempest Security Intelligence en Brasil. Es una especie de chica chismosa de Malwareland: investiga lo que sucede en las desgracias cibernéticas. Además de su trabajo remunerado, Cybelle ha estado involucrada en el activismo de privacidad y seguridad durante más de 10 años y ha presentado charlas en eventos en todo el mundo, como BSides LV, Girls Hack Village (DefCon), Internet Freedom Festival, Radical Networks, Mozilla Festival, Roadsec, Cryptorave, entre otros. Cybelle es parte de la comunidad de Mozilla y directora de la organización brasileña Casa Hacker.

.:Carlos Adriano Souza:. Cyber Security Specialist – Tempest Security Intelligence

Carlos es un aventurero. Cuando no está rastreando y descubriendo cascadas, trabaja como ingeniero inverso en Tempest Security Intelligence, Brasil. Ya ha trabajado como investigador federal y tiene experiencia en ciberseguridad militar. Le apasiona comprender las amenazas cibernéticas globales y comprender cómo funciona el software.

57
13
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Darknet Diaries EP 144: RACHEL

Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm.

Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/

Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/.

58
1
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

The Cybersecurity Vault - episode #30, with guest Lisa Forte. Effectively responding to cybersecurity crisis events is crucial, yet many organizations lack a mature capability.

I speak with Lisa Forte, a legend when it comes to helping organizations prepare for handling cybersecurity crisis events, who shares her rich insights and recommendations.

Visit Cybersecurity Insights at https://www.cybersecurityinsights.us

59
6
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

How to Read Leaked Datasets Like a Journalist

'Hacks, Leaks, and Revelations' is a how-to guide for everyone who's curious about secrets. We live in a golden age of data. Every day, hacktivists release terabytes of data on sites like DDoSecrets, but sorting through it all requires some technical knowledge. What if you don’t know XML from SQL let alone how to write a simple Python script?

Micah Lee is the director of information security for The Intercept and he’s on Cyber today to talk about his new book: Hacks, Leaks, and Revelations. The book is a manual for people who want to learn how to parse and organize hacked datasets. It also contains stories of how Lee and others handled famous cases such as Blueleaks, neo-Nazi Discord chat rooms, and the Parler leak. If you’re not interested in diving into corporate or government secrets, you might learn something about how to protect your own data.

60
2
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Network and Distributed System Security (NDSS) Symposium The NDSS Symposium is a leading security forum that fosters information exchange among researchers and practitioners of network and distributed system security.

NDSS 2024 Program

NDSS 2024 Video list

61
3
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

How real is the existential threat from AI? Terminator-style threats from AI do not currently exist, so why is money and political heft being thrown at a problem that isn't real?

The existential threat caused by Artificial Intelligence is a popular theme in science fiction. But more recently it’s started to be taken seriously by governments around the world and the companies developing the technology. Where did this idea come from, and why is so much money being spent on it, rather than on the regulation of AI and the real threat it poses to jobs and to copyright?

Presenter: Jack Stilgoe Producer: Philip Reevell Editor: Clare Fordham

62
1
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Open guest lecture on Product Security in Operation Technology with Abdul-Basit Syed, Konecranes

An open guest lecture on "Product security for Operation Technology (OT) and industrial equipment" with Abdul-Basit Syed, Head of Product and Application Security at Konecranes.

In today's interconnected world, the convergence of Operational Technology (OT) and industrial equipment development with digital systems has fundamentally changed product development processes. Along with improvements in efficiency, quality and pace of development, it has also introduced unprecedented cybersecurity risks. This talk will delve into the critical importance of product security in OT and industrial product lifecycle.

Key topics to be covered include the product security domain, unique challenges of securing OT systems, strategies for mitigating risks, regulatory compliance requirements, emerging technologies for enhancing product security, and best practices for improving resilience.

Title: Product security for operation technology (OT) and industrial equipment Speaker: Abdul-Basit Syed, Head of Product and Application Security at Konecranes Date: Tuesday, March 26, 2024

63
4
submitted 5 months ago* (last edited 5 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

Basingstoke’s premier (only) cyber security/hacker conference!

BSides Basingstoke 2023 playlist

BSides Basingstoke 2023 schedule

64
0
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

My AI Odyssey in Cybersecurity | Kashif Iqbal | TEDx

How easy is it for AI models to create phishing emails that people actually fall for? What impact and challenges does this cause for cybersecurity professionals?

In this talk, Kashif Iqbal from SEGA speaks about these challenges, and how we can ensure users can recognise when AI is being used. Kashif is a seasoned leader in the field of Technology and cybersecurity, boasting over two decades of experience across different sectors, including Gaming, Finance, Government and Healthcare. As the Director of Cyber Security and Technology for SEGA Europe, he has significantly contributed to developing comprehensive security programs, and different technology initiatives. His career highlights include leading cybersecurity efforts at public/ private sector, where he implemented robust security measures across various platforms. Kashif's commitment to knowledge sharing is evident through his founding of www.urduitacademy.com. His commitment to the tech community extends to serving on the University of West London's Industry Advisory Board and the HackerOne Technical advisory board. A recipient of multiple professional certifications ranging from CISSP/CRISC/ ISO27001/ CEH, Kashif is also a recognized speaker, having shared his insights at various prestigious institutions. This talk was given at a TEDx event using the TED conference format but independently organized by a local community.

65
6
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

PancakesCon is a one day community hacking / cybersecurity conference which occurs around the Spring Equinox every year. This conference is 100% virtual, not-for-profit and free to stream.

PancakesCon has a unique format. All PancakesCon talks must be 40-45 minutes long. They MUST consist of two parts: A brief talk about any cybersecurity topic targeted at junior professionals / students, and a brief talk about something which is not IT-related.

PancakesCon 4 Playlist

PancakesCon 4 Schedule from the website

66
3
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
67
5
submitted 5 months ago* (last edited 5 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
68
3
NDSS Symposium 2023 (infosec.pub)
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub
69
2
submitted 5 months ago* (last edited 5 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

EP164 Quantum Computing: Understanding the (very serious) Threat and Post-Quantum Cryptography

Anton Chuvakin & Timothy Peacock talk to guest Jennifer Fernick, Senor Staff Security Engineer and UTL, Google

70
5
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Phil Venables: AI in Cybersecurity - Threats, Toil, and Talent

With over 20 years of experience as a CISO, Phil Venables, Chief Information Security Officer at Google Cloud, talks about creating an AI framework, key use cases for AI in cyber, Google Cloud joining FS-ISAC's Critical Providers Program, how he approaches operational resilience, and gives advice on how CISOs can maintain work-life balance.

Notes from our Discussion with Phil

Google Cloud’s Security AI Framework AI has presented new risks and very specific types of threats. The objective is to create a foundational framework on a basic set of control principles that can be replicated in other processes. It’s important to extend detection and response capabilities to include AI systems. This is particularly important when deploying large language models (LLMs). AI is the best defense against AI. There’s a need to embed AI in tooling, so that everyone doesn’t need to be an AI expert.

Expectations from the Framework Google Cloud is looking to partner with organizations to develop the framework. This may not become “the” framework, as there are others like the NIST AI Risk Management Framework. The aim is to build on the framework to include other, more detailed recommendations and tooling. It should have a broader use, beyond Google and the customer’s use of Google’s AI.

Key Use Cases of AI in Cybersecurity There are 3 areas – Threats, Toil and Talent.

Threats: Google is using LLMs, AI and GenAI to analyze, monitor and manage threats, like analyzing new malware discovered via Google’s VirusTotal service and using Sec-PaLM 2 LLM to decode and provide threat advice. LLMs need to be trained using a large corpus of security and threat data.

Toil: Security operational jobs have a lot of overhead and ineffective tools. Google Cloud is focusing on using Sec-PaLM 2 to help organizations automate security operations.

Talent: AI will be the great democratizer of talent. Giving people AI assistance to develop, expand and extend their skills can increase security talent.

AI Risks for Financial Services Organizations AI as a democratizer of talent and a tool for enhancing people’s skills can also extend the capabilities of threat actors. Organizations will need to bolster their current defenses. For example, deepfakes across voice video and images are being used to confound authentication systems and organizations are strengthening their traditional authentication systems, like using hardware tokens.

Impact of AI and Strategies to Secure the Cloud Environment AI is driving an accelerated cloud adoption. Even the largest companies will need to migrate to the cloud for the processing capability to deploy the new LLMs. There will not only be a drive to the cloud to get access to AI, but also the use of AI tools to securely manage cloud configurations.

Google Cloud Joins FS-ISAC's Critical Providers Program As a cloud provider, Google provides support for many critical infrastructures and the financial services sector is among the most critical infrastructures in the world. With more banks moving to the cloud, it makes sense for Google to stay in touch with the community and make sure we’re meeting customers where they are. By joining FS-ISAC, Google Cloud wanted to be part of an organization that is promulgating best practices and sharing information and intelligence.

71
5
submitted 5 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

ZScaler Zenith 2023 Playlist

ZScaler Zenith 2023 Schedule

Learn valuable insights from industry leader keynotes and go even deeper on implementing zero trust through focused technical breakout tracks.

72
5
submitted 6 months ago* (last edited 6 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

https://teiss.buzzsprout.com/180185/14651497-teisstalk-is-your-organisation-cyber-resilient

Selecting metrics that best convey the impacts and risks of your strategy to the board

How the changing threat landscape will affect your cyber resilience

The role cyber insurance plays as a component of your resilience strategy

This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/

Daniel G. Dresner, Professor of Cybersecurity, University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381

Mike Yeomans, Manager, Cyber Risk Quantification Service Delivery Lead, KPMG https://www.linkedin.com/in/mike-y-46129467/

Sam Woodcock, Senior Director - Cloud Strategy, 11:11 Systems https://www.linkedin.com/in/samuel-woodcock-9745b831/

73
6
submitted 6 months ago* (last edited 6 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub

BSides Calgary 2023 Speakers

BSides Calgary 2023 Presentations

BSides Calgary 2023 Playlist

Many of the recordings have bad sound quality, and the video recording is not too great either.

BSides Calgary is a not-for-profit foundation that aims to promote cybersecurity and the networking of cybersecurity professionals in Calgary and across Alberta. BSides Calgary is a high caliber gathering for information security professionals, hackers, coders, students and the greater tech community. Attendees of BSides Calgary conferences will share, discuss and learn about information security, privacy and technology.

74
3
submitted 6 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Security BSides Athens 2023 Speakers

Security BSides Athens 2023 Playlist

"Security BSides is a community-driven framework for building events by and for information security community members. These events are already happening in major cities all over the world! We are responsible for organizing an independent Security BSides-Approved event for Athens, Greece."

75
3
submitted 6 months ago by ashar@infosec.pub to c/security_cpe@infosec.pub

Dave Aitel - Information Security Is an Ecology of Horrors and You Are the Solution

Dave Aitel is a former NSA computer scientist, one of the early innovators with fuzzing, the Founder of Immunity, Inc, and currently a Partner at Cordyceps Systems, where he focuses on leading a team doing machine learning and data science in the information security space. He continues to have many unpopular opinions.

view more: ‹ prev next ›

Security CPE

295 readers
2 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 1 year ago
MODERATORS