GrrCON 2019 Videos
These are the videos of the presentations from GrrCON 2019. Big thanks to P1nkN1ghtmare and EggDropX for having me out, and my video crew (paint27, LizardSlack, BrettAHansen, and ZTC1980) for recording.
Keynote
Amanda ‘Infosystir’ Berlin
Baselining Behavior Tradecraft through Simulations
Dave Kenendy
I PWN thee, I PWN thee not!
Jayson Street
Automating Phishing Analysis
Kyle Eaton
Black Hats & White Collars : Bitcoin, Dark Nets and Insider Trading
Ken Westin
How Nathan Crashed and Burned
Nathan Dragun
Reverse Engineering Malware for N00bs
GregB33f/James
Host-Hunting on a Budget
cyberGoatPsyOps
Keynote
Rachel “Soul Crusher86” G
Hacking the Boardroom: How to communicate effectively to get your budget
Ryan Wisniewski
The Science of Breaking and Entering
Alissa dnsprincess
PSD2, SCA, WTF?!
Kelley Robinson
Nerding out with machine data
Nick Maier
The Past, Present & Future of Cyber Threats
Chris Russell
Symbolically executing a fuzzy tyrant
Lojikil
A Theme of Fear: Hacking the Paradigm
Catherine Ullman
Q&A on our industry and other things that are top of mind
Chris Roberts
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez
Data Access Rights Exploits under New Privacy Laws
Amber Welch
Data Security: How to avoid an embarrassing breach
Matt “mattrix” Hoy
MSSPs are great…and other lies I tell myself
Scott Thomas
Devaluing Cloud Breaches while Gaining Safe Harbor
Eric Wolff
Good Cyber Hygiene and using analytics to drive the need for it on Print
David Rose
Varna: Custom, robust AWS monitoring for cents a day using EQL
Adam Ringwood
Malicious Cryptomining is Exploding: Are you at risk?
John Fatten
Dance, Fancybear, Dance: a study in macOS
Cat Self
The Spider Economy: Emotet, Dridex, and TrickBot, Oh My
Adam Hogan
Cloudy with a chance of SecOps
Ricardo Lafosse & Matthew Speakman
Destroy Everything
Tom Somerville
Surfing and Security – Ride the wave
Chris Burrows
The Importance of IT Asset Visibility
Brian Berk
From Idea to Badge: Getting Started & Finished with badge making
Dave Schwartzberg
What Are We Doing Here? Rethinking Security
Jeff Man
How Hackers Evade Your AI-enabled Endpoint Detection Tools
Dan Allen
Hillbilly Storytime – Pentest Fails
Adam Compton
Want to Play a Game..
John DeRyke
The Hacker Hippocampus: Meet your brain on games
Chloe Messdaghi
Departing Employees = Departing Data
Todd Thorsen
Beginner’s Guide to Mobile Applications Penetration Testing
Whitney Phillips
Million Dollar Malware: Using the Viper Framework to Investigate and Track Ryuk’s Success
Colin Cowie
The Importance of Relevant, Timely, and Qualitative Intelligence Analysis
Aamil AK
Deepfakes: If anything can be real then nothing is real
April C Wright
Network exploitation of IoT ecosystems
Fotios (ithilgore) Chantzis