Hacker Halted 2020

=======================================================

Day 1 (19/10)

The Launch of the Hacker Playground with Jay Bavisi, President and CEO, EC-Council

The Witchball and the Tribe - On stealing calm and weaponising fear in Social Engineering - Jenny Radcliffe

https://us02web.zoom.us/rec/play/KiNG7hk45Qp1y8UXjbAYbYczpP2-thUP11rR0sSXYZq8wJrZWY40q917dRTbEpBuwDexKl23SzBZwEuJ.0Im9pYG2v3xIGpD5

A Day in the Life of a Security Researcher w/ Marcelle Lee, Senior Security Researcher, Secureworks

https://us02web.zoom.us/rec/play/4W9R40cJ3uGCs9VDCZhvKNkNIEJym_k-SAP2woU_7n6_0nTO49_rUrMrp3qsshbqDjvFIypMNjuO2BqA.quY0twF4kLBzO_I9

Forensicating Ransomware When They Hit Your NAS - Antonio A. (Tony) Rucci

https://us02web.zoom.us/rec/play/ADi6HcWXK1WV7RnBuwPtFvt_0YNO4B8GsTIxOvCguoV6tgMY-isZu7dGMPwfkp4U7d2V0EQ4JKjxRose.e8rGLhXBMwRJLtqK

Communicating cybersecurity to the non-technical - Jake Williams

https://us02web.zoom.us/rec/play/OghjS5dujoMvgeqYU_ldpIH0OhQcwOwkVc9NnXsuMpIjEGqAZzUWZ5NkZoXA7m0fPz6RcY4nwC3J8-Zr.GNKcsZettSQiBkoS

Automating disk and memory evidence collection in AWS - Ryan Tick & Vaishnav Murthy

https://us02web.zoom.us/rec/play/BffnczoN8VYvw3k1dTkzzxXSxWw3HTawrxH7PQx_eYiw-Gi6A7-c4_P1-hKlnC6uk4OZSZtqASjm0qoG.orhsXiQ_9yA_Ji1p

Day 2 (19/10)

Reality Lost: Deepfakes Changing the Face of Attacks - Alyssa Miller

https://us02web.zoom.us/rec/play/ndMDcpOR_Bau5dgp96ZnieKbnF_0pSP9RO9E0X_OcuxDsexKuemBw9ngiBNsD2tt2_iZhdBe3U_oGeQM.U5UOVy-JIDpQ_OZj

Social Engineering Your Metrics: Using Data Science to Provide Value in Reporting - Joe Gray

https://us02web.zoom.us/rec/play/hqfRfEh910ianjsNPZOT-YLwKk4lOMQMsqEjEi0hzyDSWDXDPFED4NOB6eOKKWAYngq8jEsk04ZRt0TL.DP4r5KOfHIZyMExd

Trust, but Verify: Maintaining Democracy In Spite of Information countermeasures - Allie Mellen

https://us02web.zoom.us/rec/play/A6auNSAbGA2ScM0isKJByocf7YPJxfufk-V-WHQFZd2W5lkCW_9AXepKVgtVvoIie6hHkaimj_gkHVOM.oECd8c4vvpX02AVp

Reverse Engineering: From Hacking Solitaire to Wrestling Ransomware - Bryson Payne

https://us02web.zoom.us/rec/play/QG2N4m3bf6vad8lAPCpGin5cWWlVnB8bwKDa4JTiwC_AgqOHs7F6GkS83s8oosAQuxvRLOQOl16meXCt.jYHk-2AM6GEj0f-z

The Pentester Blueprint: A Guide to Becoming a Pentester - Phillip Wylie

https://us02web.zoom.us/rec/play/mGsVLCYZoIU-eRbs0nhI6t1rhR3qstb9AITFW48M_9nJlcUIWB8P9WdfDjo0Hl-WCHZxzO9C3ek4DyGa.ICHG7DcTeFcuPyZL

CyberQ - The Rules Have Changed with Steven Graham and Tim Rosenberg

https://us02web.zoom.us/rec/play/MhRT35qihSku1EagwvPB8F4Arh5t21TrSrJTVGFNzBDRpZllzDz-sLOLJu07AKowjwqcuO8iSRBPSeNK.6qvmL2VlUqnnmxJw

Day 3 (21/10)

The Hacker Hippocampus: Meet your brain on games - Chloe Messdaghi

https://us02web.zoom.us/rec/play/L2EHA_-9t7vHcVXbtnE6MuHKxFCBbgfKLbt7kAeMSOZUBO2Sk_cTvo2vIcHjPqZckypf5RV5pV2nNw34.Dshbe-LAtlvdHdHQ

Hack the Vote! w/Chris Roberts, Researcher/Hacker/vCISO, HillBilly Hit Squad

https://us02web.zoom.us/rec/play/lYyll4QDMGmNEkpz7mUk1PpvrKgW__hmfSbmYxvTWNlJcnxJgynsHQLkO_wb6lwDsBicCBqg3Sd83Hkj.78iUHDpKD-x9tu07

The Geopolitics of Cybersecurity - Annalisa Nash Fernandez

https://us02web.zoom.us/rec/play/kzN3hjpy3wNI8q0XIVLw_JxN7YiS2RUfhUXh_xmueb7F2EGRBzOszy_e3P04rV7ZrFKgY2zoq4en_a7D.whk_WeQ5N905Zma8

The Sibling Rivalry Between Application Security and Application Development w/Matt Stanchek, Fortify On Demand Architect, Micro Focus

https://us02web.zoom.us/rec/play/4lzpS6Won3zil_QdRpKu3X80M4Tpjh_62UohmrYafgeKmQStY09DP1wd7_cmiFUmoEYQk24VkiOgLeEX.jwgijvD3jbJ927dI

Advanced Defense & Tactics of Deception by Wayne Burke and Kevin Cardwell

https://us02web.zoom.us/rec/play/cfhgdPOde39CXOmbAd-wfuBycaZoclx-GWo3v4vCQ2upWysB-3EzAUOigrulhLp7CrVMbjyMtXM24Ik.YrZnlw6OTDpQ3Llg

Day 4 (22/10)

More Than Turbulence - Chris Kubecka

https://us02web.zoom.us/rec/play/hyYmVC6sMZMj-24CZPO5vlSbDcvSQFi6Td03ryFAtnijfqkoo94tP-r-AbCnJYMwpKqBKEQ3K-9rFrrC.PYqDcGXFeyIGik1_

The Three Biggest Threats in Cyber Security: From Infowar to IoT - Winn Schwartau

https://us02web.zoom.us/rec/play/44As9QPTZLLGSnjeI0Sf0W0XB0NG9tdm8iuNl2K-5FXZleKYhlncdNv6h_KouZdO_Z87POQyTRi1aLJS.AIbYw29k42Ol7nLG

Anatomical warfare - examining a culture of online exploitation - Katelyn Bowden

https://us02web.zoom.us/rec/play/a6O8YbWbFe1LYIjLJJYvtj0HwmJg9SfpsUWG2hXwgjzkQUYJtOBwza-7beA1g1SYYjpF5kLcVIzUnWA-.5tRqtFCPKWCKP82s

ACME: American Coyotaje in the Modern Era - Mauro Eldritch

https://us02web.zoom.us/rec/play/ZnCxdcMWzkc1xXD2NZNQT_DhhT9MHN1sp54jZ82wvXxY1CpdU66cYbLTvI55vKjJFYy4MXUrmvgcRbZt.jraUmyqQone6V2du

A Whole New Security World w/ Charles Henderson, Global Managing Partner and Head of X-Force Red

https://us02web.zoom.us/rec/play/-OyviWqZ3SF0PyuLrV0C5HxTlu321GMBHNEUh_ZpmR4NBSDZkzRS6Hkj1X_2-vNw3O9EuJj_HH_ifF0H.EXeS_nFbrSI9fD-O

Day 5 (23/10)

The Misconceptions Of Open Source Intelligence (OSINT) - Zoey Selman (aka V3rbaal), Security Risk Advisors, Blue Team Village, Innocent Live Foundation, Trace Labs.

https://us02web.zoom.us/rec/play/Kd9wpyPYmQQLiVlUfY7lW6hHlhLrxM7GbrRYwzajFqJj8UIqY8foYO_WN5QehONjvFizW6olzd3zBnA.iYfv1w8xQPkgus_i

Incident Response & Threat Hunting: How to Gain Hands-On Experience - Tyrone E. Wilson

https://us02web.zoom.us/rec/play/R_eELZplVEG1rFTpWTKjEDxx4iBIwp9IsXpZUUiOwladtN2eFCt5u2ePrIfkLggEIUBQl1F9mvLg8tmB.w2t9TgxK-c2hekUv

Making MITRE ATT&CK Actionable - Josh Rickard

https://us02web.zoom.us/rec/play/rAu6RQ7C_WTcKJyCsGql_eVer4lhPX6O1NzA9SENktLsAWwjUEPnvOJlwYtRTOdbTQFxPSd5sc_J2W3K.KBGlTksY-nj9MG2D

Say my Name, Ransom Game - Sean O'Connor

https://us02web.zoom.us/rec/play/LZ0OdUtmI22BvTxAlGKR-vUYHqT1oKoCMH7uo7qql7tuxkI0_cHwVtP1sO1mih7wDi-pM2dJ_JTsCror.SqmkRSoxcmUP75Qd

Mimicking Human Intuition: The Cyber AI Analyst w/ Brianna Leddy, Director of Analysis

https://us02web.zoom.us/rec/play/7O1auQkgdRN5vzWFFDSArUPXSsRlwoNNYb4oe5k8Q_VPbaRMzRPHaaHhcd6lUPqDRrStkvk08VCWxMlO.Jb6md3ovCWWwFURm