Month: July 2015

RV4sec Videos: Kizz Myanthia

Kizz Myanthia: Into The Worm Hole: Metasploit For Web PenTesting


RV4sec Videos: Allen Householder & Elissa “#LADYBOSS” Shevinsky

Allen Householder: Coordinated Vulnerability Disclosure is a concurrent process

Elissa “#LADYBOSS” Shevinsky: The Changing Legal Landscape for InfoSec: What You Need to Know


RV4sec Videos: Caleb “chill” Crable & Adam Crosby

Caleb “chill” Crable: The Art of Post-Infection Response and Mitigation

Adam Crosby: Embracing the Cloud


RV4sec Videos: Barry Kouns & Guy Broome

Barry Kouns: Incident Response Management – Not a Fire Drill

Guy Broome: Enterprise-grade Disk Encryption Management for Open Source Systems


RV4sec Videos: Michelle Schaffer/Tim Wilson & Bill Weinberg

Michelle Schaffer/Tim WilsonHasty Headlines in InfoSec: Don’t Be Fooled by Everything You Read!

Bill Weinberg: OSS Hygiene – Mitigating Security Risks from Development, Integration, Distribution and Deployment of Open Source Software


RV4sec Videos: Virginia Governor Terry McAuliffe

Virginia Governor Terry McAuliffe RV4sec Special Remarks


RV4sec Videos: Pete Herzog/Dave Lauer & Jason Smith

Pete Herzog/Dave: Hacking the Market. How financial market players manipulate prices and infrastructure.

Jason Smith: Applied Detection and Analysis Using Flow Data 


RV4sec Videos: Schuyler Towne & Mark Painter

Schuyler Towne: Selling Security in a Post Lock Society

 

Mark Painter: A year in the life of HP security research


RV4sec Videos: G. Mark Hardy (Keynote) & David Bianco

G. Mark Hardy: Keynote

David J. BiancoVisual Hunting with Linked Data Graphs


RV4sec Videos: Jennifer Steffens (Keynote) & Boris Sverdlik

Jennifer Steffens: RV4sec Keynote

Boris Sverdlik: You’re HIPAA certified and Bob just killed someone from the parking lot