->
Oreilly - O'Reilly Security Conference - New York, NY 2016 - 9781491960035
Oreilly - O'Reilly Security Conference - New York, NY 2016
by O'Reilly Media, Inc. | Publisher: O'Reilly Media, Inc. | Release Date: November 2016 | ISBN: 9781491960035


A founding member of the Google security team; one of the seven key shareholders able to restore the Internet's Domain Name System; a former instructor at an information warfare school; the co-inventor of the Yubikey; a principal investigator in the Zotob criminal investigation. These are the bona fide security backgrounds of just four of the 82 world-class experts O'Reilly Media gathered together for "Security 2016 New York," O'Reilly's first-ever conference on the threats facing today's Internet. This video compilation provides you with a front row seat for each of the 51 sessions, 8 half-day tutorials, and 6 keynotes delivered at the conference. Looking for new ways to fend off a targeted attack, eject persistent intruders from your environment, or recover quickly and effectively from a breach? Need to integrate new technology into your environment securely and successfully? Need to figure out how to keep your access controls (to data, network, or cloud) effective at scale—without losing your mind? Get this video compilation (more than 60 hours of material) and you'll get answers to those questions and more.Enjoy complete access to each of the conference's 51 sessions, 8 half-day tutorials, and 6 keynotesHear 82 of the world's top experts provide pragmatic advice on defensive cybersecurity practicesGet tutorials on microservices security, writing secure Node code, threat modeling, and moreLearn from White Ops' Dan Kaminsky about Autoclave, defensive trickery, and better cryptographyWatch DARPA's Michael Walker describe the world's first autonomous computer security systemsHear from Yubico's Stina Ehrensvard on FIDO U2F and the future of strong online identitiesLearn about Fastly's Incident Command protocol and Etsy's real-time security alerting tool, 411See Matt Tesauro explain the OWASP AppSec Pipeline project that makes appsec affordable to allLearn about detecting security threats with Apache Hadoop and the new Apache SpotGet 17 sessions on security tools and processes and 9 on security and data science
  1. The O'Reilly Security Conference Keynotes
    • Once Upon a Future - Heather Adkins (Google) 00:20:55
    • A Vision for Future Cybersecurity - Rebecca Bace (CFITS, University of South Alabama) 00:27:56
    • Playing Through the Pain - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals - Richard Thieme (ThiemeWorks) 00:32:59
    • Security and Feudalism: Own or be pwned - Cory Doctorow (EFF) 00:32:54
    • Meet the World's First Autonomous Computer Security Systems - Michael Walker (DARPA) 00:21:33
  2. Security in context (security datasci)
    • Modern identity and access management for the Web - Jim Manico (Manicode Security) - Part 1 1:00:05
    • Modern identity and access management for the Web - Jim Manico (Manicode Security) - Part 2 00:52:45
    • Modern identity and access management for the Web - Jim Manico (Manicode Security) - Part 3 00:57:52
    • Security data science beyond operations - Jay Jacobs (BitSight Technologies) 00:35:23
    • Detecting anomalies efficiently at scale: A cybersecurity streaming data pipeline using Kafka and Akka clustering - Jeff Henrikson (Groovescale) 00:37:17
    • Security analytics: Machine learning applied in the SOC - Macy Cronkrite (Splunk) 00:35:56
    • The future of strong online identities: Simple, open, and mobile - Stina Ehrensvard (Yubico, Inc.) 00:32:57
    • Are we out of the woods? The current state of web malware - Kelly Harrington (Google) 00:39:35
    • Classifiers under attack - David Evans (University of Virginia) 00:36:22
    • Hello to the dark side: Understanding your adversaries without all those expensive threat intel tools - S. Grec (NovaInfosec Consulting) 00:49:55
  3. Tools & processes
    • The industrial age of website bots: How to detect and block automated attacks - Ido Safruti (PerimeterX) and Chris Federico (PerimeterX) - Part 1 00:46:49
    • The industrial age of website bots: How to detect and block automated attacks - Ido Safruti (PerimeterX) and Chris Federico (PerimeterX) - Part 2 00:35:18
    • Microservices and security - Sam Newman (Atomist) - Part 1 00:55:34
    • Microservices and security - Sam Newman (Atomist) - Part 2 00:54:40
    • Microservices and security - Sam Newman (Atomist) - Part 3 00:57:27
    • Writing secure Node code - Guy Podjarny (Snyk) and Danny Grander (Snyk) - Part 1 00:56:19
    • Writing secure Node code - Guy Podjarny (Snyk) and Danny Grander (Snyk) - Part 2 00:52:40
    • Writing secure Node code - Guy Podjarny (Snyk) and Danny Grander (Snyk) - Part 3 00:42:00
    • Applying Docker security - Ben Hall (Katacoda | Ocelot Uproar) - Part 1 1:02:18
    • Applying Docker security - Ben Hall (Katacoda | Ocelot Uproar) - Part 2 1:11:29
    • Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 1 00:52:23
    • Drilling into network data with Apache Drill - Charles Givre (Booz Allen Hamilton) - Part 2 00:59:20
    • Using Python to automate forensics - Philip Polstra (Bloomsburg University of Pennsylvania) - Part 1 1:00:25
    • Using Python to automate forensics - Philip Polstra (Bloomsburg University of Pennsylvania) - Part 2 00:46:18
    • Using Python to automate forensics - Philip Polstra (Bloomsburg University of Pennsylvania) - Part 3 00:42:37
    • Incident Command: The far side of the edge - Maarten Van Horenbeeck (Fastly), Lisa Phillips (Fastly), and Tom Daly (Fastly) 00:38:47
    • Benefits of isolation provided by containers - Jessica Frazelle (Google) 00:29:02
    • Operationalizing risk - Bruce Potter (KEYW Corporation) 00:41:39
    • Migrating to HTTPS - Eric Lawrence (Google) 00:39:58
    • Infrastructure is code: A DevOps approach to PCI compliance - John Bullard (Distil Networks) and Benji Taylor (Distil Networks) 00:37:04
    • You don’t need to be a unicorn to have great security: Appsec programs for the rest of us - Aaron Weaver (Cengage) and Matt Tesauro (Pearson plc) 00:41:25
    • Securing application deployments in a multitenant CI/CD environment - Binu Ramakrishnan (Yahoo) 00:35:04
  4. Bridging business & security
    • User experience and security: Enemies or allies? - Peter Hesse (10Pearls) 00:36:20
    • A social scientist’s perspective on how the intersection of humans and technology will shape the future workforce - Andrea Limbago (Endgame) 00:39:21
    • Protecting your organization against ransomware (while ensuring no one sends you a Christmas card) - Allan Liska (Recorded Future) and Timothy Gallo (Symantec) 00:46:08
    • Criminal cost modeling - Chris Baker (Dyn) 00:45:17
    • Automating security in the cloud: Modernizing technology governance - Timothy Sandage (Amazon Web Services) 00:47:40
    • Hacker quantified security - Alex Rice (HackerOne) 00:32:10
  5. Sponsored
    • Moving cybersecurity forward: Introducing Apache Spot - Rocky DeStefano (Cloudera) 00:39:19
    • Intrusion ≠ breach: Reducing risk via faster detection and response - Chris Martin (LogRhythm) 00:37:20
    • Why current security practices are ineffective against today's hackers - Paul Poh (SecurityScorecard) 00:38:01
    • The third wave of application security - Jacob Hansen (Cobalt) and Caroline Wong (Cobalt) 00:37:02
  6. The human element
    • Security FORCE: A model for highly reliable security behaviors and cultures - Lance Hayden (ePatientFinder) 00:38:24
    • Educating the steel pipeline - Jamesha Fisher (GitHub), Christina Morillo (wocintechChat.com), Quiessence Phillips (Barclays | JOURNi), Heather Adkins (Google), and Krystall Parrington (DePaul University) 00:44:10
    • The groupthink vulnerability: Impacts and countermeasures - Laura Mather (Unitive) 00:42:48
    • The future UX of security software - Audrey Crane (DesignMap) 00:35:19
    • Building a product security incident response team: Lessons learned from the hivemind - Kymberlee Price (Bugcrowd) 00:42:55
    • Security by consent - Brendan O'Connor (Malice Afterthought, Inc.) 00:40:32
    • Privacy and threat in practice: Lessons from at-risk user populations - Sara "Scout" Brody (Simply Secure) 00:40:41
    • Saving time: How a few committed people helped hold up the Internet. . .again - Susan Sons (Center for Applied Cybersecurity Research, Indiana University) 00:35:06
    • The economics of cybersecurity - Fernando Montenegro (vArmour) 00:38:50
    • A technical dive into defensive trickery - Dan Kaminsky (White Ops) 00:50:20
  7. Oreilly - O'Reilly Security Conference - New York, NY 2016

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part01.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part02.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part03.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part04.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part05.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part06.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part07.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part08.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part09.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part10.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part11.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part12.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part13.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part14.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part15.OR.rar

    9781491960035.OReilly.Security.Conference.New.York.NY.2016.part16.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss