Security CPE

295 readers
1 users here now

Video and audio media that count towards your CPE (Continuing Professional Education) requirements for GIAC, CISSP, CISM, CRISC, CCSP, CompTIA certs.

Mostly conference talks and podcasts.

FAQ

founded 1 year ago
MODERATORS
51
 
 

BSides Prague 2024 schedule

BSides Prague Playlist

BSides Prague is an annual community-driven information security conference held in Prague, Czech Replublic. The event provides a platform for cybersecurity professionals, enthusiasts, and researchers to share knowledge, exchange ideas, and discuss the latest trends in the field. It's a unique opportunity to connect with like-minded individuals, expand professional networks, and stay informed about the ever-evolving cybersecurity landscape.

52
 
 

Rob Lee on detecting cyber risk in IoT and industrial control systems

How does cyber risk impact industrial control systems as well as all the other connected systems in an Internet of Things (IoT) world? And which organizations are likely to feel the impact? Dragos CEO Rob Lee outlines the threats, discusses how leaders can respond, and stresses the need for speed.

53
 
 

BSides Sofia 2024 Date: March 23 - 24, 2024

Location: Aula Maxima, University of National and World Economy, Sofia

BSides Sofia 2024 Schedule

BSides Sofia 2024 Talk videos

54
55
 
 

The Cyber Defense Matrix (CDM)

Organisations need to prove their security credentials – both internally and to auditors, regulators, customers and other stakeholders. This web session explores the Cyber Defense Matrix – a freely-available map that can help your organisation document and track its compliance efforts and security programme.

56
 
 

Keynote: From Brazil with Love: Latin American Malware Analysis from Tactical and Strategic Cyber Threat Intel Outlook. Speakers: Cybelle Oliveira & Carlos Adriano Souza

Los ciberdelincuentes y estafadores brasileños utilizan técnicas de ingeniería social y phishing con el objetivo de engañar a las víctimas y manipular la codicia de las personas, como en las estafas Pix. Abusan de la facilidad de los recibos bancarios para cometer fraudes, roban tarjetas de crédito, subvierten las protecciones bancarias, infectan dispositivos con troyanos bancarios. Estos ciberdelitos se han ido expandiendo paulatinamente a otros países de América Latina y ya han llegado a algunos países europeos.\n \n En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware. En esta charla, detallaremos las excentricidades del panorama de amenazas brasileño, describiremos cómo opera el ciberdelito brasileño, la singularidad de los troyanos bancarios hechos en Brasil, sus características, creatividad, diferencias y similitudes entre las familias de malware.

.:Cybelle Oliveira:. Senior Cyber Security Analyst – Tempest Security Intelligence

Cybelle es una orgullosa madre de gatos y analista senior de ciberseguridad en Tempest Security Intelligence en Brasil. Es una especie de chica chismosa de Malwareland: investiga lo que sucede en las desgracias cibernéticas. Además de su trabajo remunerado, Cybelle ha estado involucrada en el activismo de privacidad y seguridad durante más de 10 años y ha presentado charlas en eventos en todo el mundo, como BSides LV, Girls Hack Village (DefCon), Internet Freedom Festival, Radical Networks, Mozilla Festival, Roadsec, Cryptorave, entre otros. Cybelle es parte de la comunidad de Mozilla y directora de la organización brasileña Casa Hacker.

.:Carlos Adriano Souza:. Cyber Security Specialist – Tempest Security Intelligence

Carlos es un aventurero. Cuando no está rastreando y descubriendo cascadas, trabaja como ingeniero inverso en Tempest Security Intelligence, Brasil. Ya ha trabajado como investigador federal y tiene experiencia en ciberseguridad militar. Le apasiona comprender las amenazas cibernéticas globales y comprender cómo funciona el software.

57
 
 

Darknet Diaries EP 144: RACHEL

Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm.

Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/

Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/.

58
 
 

The Cybersecurity Vault - episode #30, with guest Lisa Forte. Effectively responding to cybersecurity crisis events is crucial, yet many organizations lack a mature capability.

I speak with Lisa Forte, a legend when it comes to helping organizations prepare for handling cybersecurity crisis events, who shares her rich insights and recommendations.

Visit Cybersecurity Insights at https://www.cybersecurityinsights.us

59
 
 

How to Read Leaked Datasets Like a Journalist

'Hacks, Leaks, and Revelations' is a how-to guide for everyone who's curious about secrets. We live in a golden age of data. Every day, hacktivists release terabytes of data on sites like DDoSecrets, but sorting through it all requires some technical knowledge. What if you don’t know XML from SQL let alone how to write a simple Python script?

Micah Lee is the director of information security for The Intercept and he’s on Cyber today to talk about his new book: Hacks, Leaks, and Revelations. The book is a manual for people who want to learn how to parse and organize hacked datasets. It also contains stories of how Lee and others handled famous cases such as Blueleaks, neo-Nazi Discord chat rooms, and the Parler leak. If you’re not interested in diving into corporate or government secrets, you might learn something about how to protect your own data.

60
 
 

Network and Distributed System Security (NDSS) Symposium The NDSS Symposium is a leading security forum that fosters information exchange among researchers and practitioners of network and distributed system security.

NDSS 2024 Program

NDSS 2024 Video list

61
 
 

How real is the existential threat from AI? Terminator-style threats from AI do not currently exist, so why is money and political heft being thrown at a problem that isn't real?

The existential threat caused by Artificial Intelligence is a popular theme in science fiction. But more recently it’s started to be taken seriously by governments around the world and the companies developing the technology. Where did this idea come from, and why is so much money being spent on it, rather than on the regulation of AI and the real threat it poses to jobs and to copyright?

Presenter: Jack Stilgoe Producer: Philip Reevell Editor: Clare Fordham

62
 
 

Open guest lecture on Product Security in Operation Technology with Abdul-Basit Syed, Konecranes

An open guest lecture on "Product security for Operation Technology (OT) and industrial equipment" with Abdul-Basit Syed, Head of Product and Application Security at Konecranes.

In today's interconnected world, the convergence of Operational Technology (OT) and industrial equipment development with digital systems has fundamentally changed product development processes. Along with improvements in efficiency, quality and pace of development, it has also introduced unprecedented cybersecurity risks. This talk will delve into the critical importance of product security in OT and industrial product lifecycle.

Key topics to be covered include the product security domain, unique challenges of securing OT systems, strategies for mitigating risks, regulatory compliance requirements, emerging technologies for enhancing product security, and best practices for improving resilience.

Title: Product security for operation technology (OT) and industrial equipment Speaker: Abdul-Basit Syed, Head of Product and Application Security at Konecranes Date: Tuesday, March 26, 2024

63
1
submitted 5 months ago* (last edited 5 months ago) by ashar@infosec.pub to c/security_cpe@infosec.pub
 
 

Basingstoke’s premier (only) cyber security/hacker conference!

BSides Basingstoke 2023 playlist

BSides Basingstoke 2023 schedule

64
 
 

My AI Odyssey in Cybersecurity | Kashif Iqbal | TEDx

How easy is it for AI models to create phishing emails that people actually fall for? What impact and challenges does this cause for cybersecurity professionals?

In this talk, Kashif Iqbal from SEGA speaks about these challenges, and how we can ensure users can recognise when AI is being used. Kashif is a seasoned leader in the field of Technology and cybersecurity, boasting over two decades of experience across different sectors, including Gaming, Finance, Government and Healthcare. As the Director of Cyber Security and Technology for SEGA Europe, he has significantly contributed to developing comprehensive security programs, and different technology initiatives. His career highlights include leading cybersecurity efforts at public/ private sector, where he implemented robust security measures across various platforms. Kashif's commitment to knowledge sharing is evident through his founding of www.urduitacademy.com. His commitment to the tech community extends to serving on the University of West London's Industry Advisory Board and the HackerOne Technical advisory board. A recipient of multiple professional certifications ranging from CISSP/CRISC/ ISO27001/ CEH, Kashif is also a recognized speaker, having shared his insights at various prestigious institutions. This talk was given at a TEDx event using the TED conference format but independently organized by a local community.

65
 
 

PancakesCon is a one day community hacking / cybersecurity conference which occurs around the Spring Equinox every year. This conference is 100% virtual, not-for-profit and free to stream.

PancakesCon has a unique format. All PancakesCon talks must be 40-45 minutes long. They MUST consist of two parts: A brief talk about any cybersecurity topic targeted at junior professionals / students, and a brief talk about something which is not IT-related.

PancakesCon 4 Playlist

PancakesCon 4 Schedule from the website

66
67
68
 
 

WICCON 2023 playlist 14 videos

Schedule from website

WICCON RECOGNIZES AND SHOWCASES WOMEN’S SUCCESS IN THE CYBERSECURITY FIELD. WE WANT TO INSPIRE THE REST OF THE COMMUNITY TO PURSUE A CAREER IN SECURITY AND DEMONSTRATE HOW WOMEN CAN BE SUCCESSFUL SUBJECT MATTER EXPERTS. THE HARD STUFF DOESN’T SCARE US, AND WE’RE READY TO TALK ABOUT WHAT TRULY MATTERS IN THE FIELD.

69
 
 

Let's cross the CISSP off your Bucket List - BSidesPGH - 33 minutes

https://youtu.be/e06Oi_-6wIM

Talk description https://bsidespgh2022.sched.com/event/13eH9/lets-cross-the-cissp-off-your-bucket-list

"Would you like to see CISSP after your name? 100% of the people that actively followed the methods in the ISC2 study group passed their exam. Will you be next to follow in their footprints to be the leader of tomorrow? Let us show you a different way to pass your exams.

Obtaining a CISSP can be a daunting task. But it doesn't have to be? Our approach will help with any certification, not just the CISSP. This talk is focused on providing tips, tricks, and guidance on how you can easily learn the materials to pass the certification. The CISSP has been the gold standard for security certifications for a number of reasons. Now, there are literally thousands of high-paying job openings asking for this exam. "