Feel free to include my content in your page via my
RSS feed
Follow @irongeek_adc
Help Irongeek.com pay for
bandwidth and research equipment:
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment:
These are the videos of the presentations from GrrCON 2016.
Big thanks to EggDropX and Jaime for having me out, and my video crew
(Chris, Erick, & Cooper) for
recording. Act Three, The Evolution of Privacy Strolling Through Your Internet Museum
Weaponizing Nanotechnology and hacking humans; defining the boundaries
Becoming a Cyborg: The First Step Into Implantable Technology Lie To Me - LIE TO THEM
Abnormal Behavior Detection in Large Environments Ghosts in the IOT No Title Given No Title Given and bad mistakes I've made a few...
Predator to Prey: Tracking Criminals with Trojans and Data Mining for Fun and Profit Guarding Dinner
Back to the Future: Understanding our future but following the past Breaking Android Apps for Fun and Profit GrrCON Presents, Celebrity Bumfight Cybergeddon
Internet of Things (IoT) radio frequency (RF) Analysis With Software Defined Radio So You Want to Be a Pentester
What do you mean I'm pwn'd!
I turned on automatic updates! Surreal Paradigms: Automotive Culture Crash
Reversing and Exploiting Embedded Devices (Walking the software and hardware stack) Threat Detection & Response with Hipara Security 3.0: The future of information security, from beginning to End-point
Still Broken After All These Years Aka Utility Security For Smarties
Threat Detection Response with Hipara
Quick and Easy Windows Timelines with Pyhon, MySQL, and Shell Scripting
Cruise Ship Pentesting OR Hacking the High Seas
Using Virus Total Intelligence to track the latest Phishing Document campaigns Encryption, Mobility & Cloud Oh My! Magnetic Stripes 101 Machine Duping: Pwning Deep Learning Systems
Money, Fame, Power - Build your success as a security professional Tales from the Crypt...(analyst)
What's in your Top Ten? Intelligent Application Security Prioritization Phish your employees for fun!
Securing Trust
- Defending Against Next-generation Attacks
Five Nights At Freddys: What We Can Learn About Security From Possessed Bears Make STEHM Great Again How Do You Secure What You Don't Control Fighting the Enemy Within
Getting to the Root of Advanced Threats Before Impact Establishing Privileged Account Security Best Practices To
Reduce Cyber Security Threats Reality-Checking Your AppSec Program How to Implement Crypto Poorly Stop attacking your mother's car!
Contracting: Privacy Security and 3rd Party Alignment of business and IT Security Establishing a Quality Vulnerability Management Program without Wasting Time or Money
So You've Inherited a Security Department, Now What?
Piercing the Air Gap: Network Steganography for Everyone On being an Eeyore in Infosec Welcome to The World of Yesterday, Tomorrow! Download videos from:
Finux
solcrush3r (not recorded)
Chris Roberts
Michael Vieau
Buckaroo (not recorded)
Dave Kennedy
NinjaSl0th (not recorded)
atlas of d00m (not posting)
G33kSpeed
Jayson Street (Only first 30 min)
Ken Westin
J Wolfgang Goerlich
Kevin Johnson
Bill Sempf
Duncan Manuts & B3ltf4ce (not posted)
Kevin Bong
Absolute0x0
Scott Thomas & Jeff Baruth
D0xt0r Z3r0
Elvis Collado
J. Brett Cunningham
Vinny Troia (replaced with talk below)
Doug Nibbelink
J Brett Cunningham
Dr. Phil Polstra
Chad M. Dewey
Wyatt Roersma
Bill Harmer
Tyler Keeton
Clarence Chio
Nathan Dragun
Jeff Man
Tony Miller
Kristoffer Marshall
John Muirhead-Gould
Nick Jacob
David "HealWHans" Schwartzberg
Dimitri Vlachos
Matt Crowe
Josh Fazio
Gerret Lansing
Darren Meyer
Sean Cassidy
Charles Parker, II
Nathan Steed & Kenneth Coleman
Shane Harsch
Zee Abdelnabi (not posting)
Amanda Berlin
John Ventura
Stefan Edwards
Joel Cardella
https://archive.org/details/GrrCon2016
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast