1. Planning Effective Red Team Exercises Sean T Malone

    Planning Effective Red Team Exercises Sean T Malone

  2. Data Access Rights Exploits Under New Privacy Laws Amber Welch

    Data Access Rights Exploits Under New Privacy Laws Amber Welch

  3. Building and Automating InfoSec Competitions spiceywasabi & bluescreenofwin

    Building and Automating InfoSec Competitions spiceywasabi & bluescreenofwin

  4. SMTP Security in a Changing World Katie Knowles

    SMTP Security in a Changing World Katie Knowles

    1
  5. SEC ALLEGATIONS ON ASSETS #crypto #bitcoin #shorts

    SEC ALLEGATIONS ON ASSETS #crypto #bitcoin #shorts

  6. Layer Two vs. Layer One: Avoiding Cryptocurrency Misconceptions

    Layer Two vs. Layer One: Avoiding Cryptocurrency Misconceptions

    1
  7. Digital Forensics is Not Just for Incident Response Anymore IrishMASMS

    Digital Forensics is Not Just for Incident Response Anymore IrishMASMS

    4
  8. The SEArt of War The CHIMAERA Threat Model Christina Lekat & Tigran Terpandjan

    The SEArt of War The CHIMAERA Threat Model Christina Lekat & Tigran Terpandjan

    2
  9. Enforcing Web security and privacy with zero knowledge protocols Ignat Korchagin

    Enforcing Web security and privacy with zero knowledge protocols Ignat Korchagin

    4