NolaCon 2019 Videos

Link: http://www.irongeek.com/i.php?page=videos/nolacon2019/mainlistRecorded at NolaCon 2019. Thanks to @CurtisLaraque, @mikearbrouet, @openbayou, @takanola, @therealmacjeezy, Jason, Cole & @klulue for the video recording help, and @nola_con, @erikburgess_, @NolaConYvonne & Rob for having me down to record. One Random Insecure Wep Application Please (ORIWAP)Nancy Snoke
Understanding XSSChristina Mitchell
Social Engineering At Work – How to use positive influence to gain management buy-in for anythingApril C. Wright
DNS – Strategies for Reducing Data Leakage & Protecting Online PrivacyJim Nitterauer
Automating HashtopolisEvil Mog
“It’s Malware Time" – A Bar Crawl from Skunked Homebrew to Rotten ApplesErika Noerenberg
Breaking into Cyber: How the hell are you supposed to get started?Josh Millsap
After Mirai: Cyber Security Implications of IoT Botnet Proliferation Against Critical InfrastructurePaul W. Brager Jr M.Sci, CISSP, GICSP, CISM
Making an internal Let’s Encrypt relay serverJosh Harvey
Keynote – I PWN thee, I PWN thee not!Jayson E. Street
Breaking Into Your Building: A Hacker’s Guide to Unauthorized Physical AccessBrent White. Tim Roberts
Formula for a Bug Bounty ProgramChris Holt
Forensics Phish Tank: Breaking Down Analysis of Advanced Phishing EmailsJoe Gray & Sophia Fadli
Baking Your Anomalous CookiesJim Allee
Waiter, there’s a compiler in my shellcode!Josh Stone
Empathy for the (Devel)oper: Lessons Learned Building An Application Security ModuleYolonda Smith
MORE Tales From the Crypt…AnalystJeff Man
IR with Volatility FrameworkEvan Wagner
Let’s Talk About WAF (Bypass) BabyBrett Gravois
Behavioral Security and Offensive Psychology at ScaleJosh Schwartz. Samantha Davison
My making of a Metasploit ModuleAaron Ringo
Don’t Panic! A Beginner’s Guide To Hardware HackingPhoenix Snoke
The Jazz Improv of InfosecDamon J. Small
Elliptic Curve Cryptography: What it is and who needs itMichele Bousquet

Link: http://feedproxy.google.com/~r/IrongeeksSecuritySite/~3/QQD_AQdUUQY/i.php