Security BSides Courses
BSidesLV via YouTube Meltdown's Aftermath - Leveraging KVA Shadow To Bypass Security Protections
BSidesLV via YouTube Profiling User Risk - Borrowing from Business Intelligence to Understand the Security of Your Userbase
BSidesLV via YouTube The Case for Software Bill of Materials
BSidesLV via YouTube Broken Arrow - The Enemy is Inside the Perimeter
BSidesLV via YouTube Using Machines to Exploit Machines - Harnessing AI to Accelerate Exploitation
BSidesLV via YouTube Where in the World Are Carmen's Cyber Attacks - The Game Show That Wonders Why Things Aren't Worse
BSidesLV via YouTube Coordinated Disclosure of ICS Products - Who's Got Time for That?
BSidesLV via YouTube We the People - Providing for a 'Common Defence' with CVD
BSidesLV via YouTube Baited Canaries - Monitoring Attackers With Active Beacons
BSidesLV via YouTube