1、#SECTORCA SecTorCABreaching AWS AccountsBreaching AWS AccountsThroughThroughShadow ResourcesShadow ResourcesYakir KadkodaOfek Itach#SECTORCA SecTorCAAWS Account IDEach AWS account has a unique accoun。
2、1www.mitiga.ioGUARDIANSOFTHE LOAD BALANCING10/23/24Stav OchakovskiDoron Karmi2Research potential cyber attacks on cloud providers and SaaSPrefer animals over humansMastering Kubernetes for efficient 。
3、#SECTORCA SecTorCAHello From the Dumpster Fire:Real Examples of Artificially Generated Malware,Disinformation and Scam Campaigns#SECTORCA SecTorCABasic introductionWhat is a large language model(LLM)。
4、#SECTORCA SecTorCAUnmasking Cyber Threats:Command Line Data Meets Small Language Models#SECTORCA SecTorCAWho We AreLead Data Scientist,Security Analytics,OpenTextPrincipal Data Scientist,Security Ana。
5、It reads,it writes,it C2sCreative C2 channels.whoami Ignatius Michael Proactive security lead at DeepCovecybersecurity(by day)OWASP Toronto co-organizer Part-time lecturer at Seneca College Hobbyist 。
6、#SECTORCA SecTorCAIntegrating AI with Retro Hardware:A Commodore 64 LLM ModuleKonrad JdrzejczykMarek Zmysowski#SECTORCA SecTorCa#SECTORCA SecTorCa Background Commodore collector Why?There is EVERYTHI。
7、#SECTORCA SecTorCABeyond MetricsCultivating a culture of continuous improvement in detection&response#SECTORCA SecTorCA$whoami Evaluating metrics 2Fast2Measure:Rethinking metrics Building a cultu。
8、The GCP Jenga TowerHacking Millions of Google Servers With a Single Package(and More)Liv MatanSenior Security Researcher,Tenable terminatorLM 2CloudImposer34GCP Cloud Functions5 Liv Matan,Senior Secu。
9、#SECTORCA SecTorCAHow Manifest Files Are Lying to You,and Why eBPF Is Your Best Lie Detector?Aleksandr Krasnov#SECTORCA SecTorCAsectorcan:$whoami-Security Engineer-Independent Researcher-DevSecOps&am。
10、#SECTORCA SecTorCAMeasuring Burnout with Data in a High-Output TeamJoshua Carter#SECTORCA SecTorCAQuick Intro B.S.in Management Info Systems&Marketing(2017)IT Support(2017)SOC Analyst(2019)M.S.in。
11、Fortifying AuthenticationFortifying AuthenticationJulien RichardDirector Infosec-LastwallCISSP|OSCP|CRTP|CRISC|CISA|CSSLP|CCSP|Pentest+|CEH|GCP-CDLWhat the heck is Phishing Resistant MFA?KEY TAKEAWAY。
12、To Brake or to Break?The Game of Intrusion,Detection and Evasion on CANStefano ZaneroPolitecnico di Milano2Automotive Attacks3The automotive ecosystem4On-Board Networks5Controller Area Network1980s p。
13、#SECTORCA SecTorCASecure and Ethical Implementation of AIJunior Williams SSCP,GSEC,CCSK,GCIH,CISSP#SECTORCA SecTorCAJunior Williams is a seasoned cybersecurity professional with a rich background in 。
14、#SECTORCA SecTorCASecTor 2024:Cutting Through the Cyber Noise-Threats&Trends#SECTORCA SecTorCAYour PanelVicky LaurensKellman MeghuAfeerah WaqarBruce Cowper#SECTORCA SecTorCASecTor Review Board#SE。
15、Navigating the Evolving Landscape of Cyber Insurance SecTor 2024 Danny Pehar 2The global Cyber Insurance premium will eclipse the property insurance premium by 2040 Gallagher Re3#4 Cyber insecurity W。
16、#SECTORCA SecTorCAUnOAuthorizedEric WoodruffSenior Security Researcher,Semperis#SECTORCA SecTorCAEric WoodruffSenior Security Researcherericonidentityinfosec.exchange/in/ericonidentity#SECTORCA SecTo。
17、#SECTORCA SecTorCAAI Apocalypse Prevention 101:Meet AIBOM,Your New Best Friend#SECTORCA SecTorCAWho are we?AI Apocalypse Prevention 101:Meet AIBOM,Your New Best Friend#SECTORCA SecTorCAAgenda#SECTORC。
18、#SECTORCA SecTorCAHunting Certified ImpostersSpence Hutchinson,eSentire#SECTORCA SecTorCAWHOAMISpence HutchinsonStaff Researcher,Threat Intelligence eSentirehttps:/ SecTorCAIMPORTANT DISCLAIMERThis p。
19、1www.mitiga.ioNavigating Logs,Detecting Threats,and Enhancing CRM Security24/10/24Doron Karmi2Smishing2345Lets start with a gameLets start with a gameChanges Users email1Subscribe for period reports3。
20、#SECTORCA SecTorCARecon and OSINTRecon and OSINTThe Pentest Before the PentestRob VandenB#SECTORCA SecTorCAwhoami Rob VandenBrinkIT since 1981,Consulting since 1990sBlue Team:Virtualization,Networkin。
21、Simplified Malware EvasionEntropy&Other Techniques Will Summerhill who am i?will i am Will Summerhill Senior red team consultant Mandiant Canada(Google Cloud)Previously PwC,Security Compass.SOMET。
22、Solomon SonyaDr.Dongyan Xu0 xSolomonSonya0 xSolomonSonya30 xSolomonSonya4http:/logout.hu/dl/upc/2011-06/230806_gremlin_in_my_computer-lyvind_berget.jpg,Retrieved 17 Sep 130 xSolomonSonyaAny sufficien。
23、Microsoft at your BEC and(API)CallRichard Smith,Senior Consultant(Security Risk Advisors)October 20242WHOISIm Richard Smith,a Senior Consultant with Security Risk Advisors.4 years cybersecurity exper。
24、#SECTORCA SecTorCACODASMMoritz ThomasLowering Payload Entropy#SECTORCA SecTorCAHiding Payloads in Plain.text Moritz ThomasAgendawhoamiPrologue:Payloads&Shannon EntropyAct I:Hide&Seek in PECOF。
25、TPMs and the Linux KernelUnlocking a better path to hardware securityIgnat Korchaginignatknignatkn$whoami Linux team at Cloudflare Systems security and performance Low-level programmingignatknWhat is。
26、#SECTORCA SecTorCAFrom HAL to HALT:Thwarting From HAL to HALT:Thwarting Skynets Siblings in the Skynets Siblings in the GenAIGenAICoding EraCoding EraChris WysopalCo-founder&CTO,Veracode Unites S。
27、#SECTORCA SecTorCA15 Ways to Break 15 Ways to Break Your CopilotYour CopilotSpeaker(s):Michael Bargury mbrg0Co-founder and CTO,ZenitySource code,technical writeup and more labs.zenity.ioAvishai Efrat。
28、#SECTORCA SecTorCACareer CampaignsHow to Re-Spec Your Professional Class for an InfoSec Role#SECTORCA SecTorCAHi!Im Stryker.Email at StrykerNoStrikingpm.me LinkedIn Portfolio ostuff at StrykerNoS#SEC。
29、#SECTORCA SecTorCAPassword Managers:A Band-Aid to Cure a Headache?Olivier Bilodeau&Andreanne Bergeron|October 2024#SECTORCA SecTorCAAndranne BergeronCybersecurity Researcher Director,GoSecureAffi。
30、#SECTORCA SecTorCAPerforming DFIR and Threat Hunting with Yamato Security OSS Tools and Community-Driven KnowledgeAkira Nishikawa and Fukusuke Takahashi#SECTORCA SecTorCAThank You for Your Understand。
31、#SECTORCA SecTorCAA New People-Centric Approach to Determining an Organizations Exposure to a Third-Party Data Breach#SECTORCA SecTorCAChristine DewhurstPartner,NSC TechDr.ThomasLeeCEO,Vivo Security#。
32、#SECTORCA SecTorCAGuardians of the OAuth GalaxyDefending Your Organization from OAuth Application Attacks#SECTORCA SecTorCAMangatas TondangSecurity Researcher IIShrutiRanjitSenior Security Researcher。