37:56Show, Don’t Tell PoCs That Make Security Unignorable by Lou Vega BSides CHS 2025BSidesCHS144 views·6 months ago
36:48From Burden to Solution Reframing MFA by Sam Fleming BSides CHS 2025BSidesCHS25 views·6 months ago
21:16Self-healing K8s Lessons Learned in Automation of IR by Ross Clarke BSides CHS 2025BSidesCHS38 views·6 months ago
27:35AI Making Us Efficient, Lazy… or Just Efficiently Lazy by Dr Arsh BSides CHS 2025BSidesCHS108 views·6 months ago
36:27GenAI attacks – 2025 Year In Review by Tillson Galloway BSides CHS 2025BSidesCHS180 views·6 months ago
31:54Everyone is a Collector Keynote by Isis Rodriguez-Cortes BSides CHS 2025BSidesCHS109 views·6 months ago
27:48Apply Team Threat Hunting with AI and Automation by Kenneth Peeples BSides CHS 2024BSidesCHS489 views·1 year ago
17:06Robots aren’t taking over the world, hackers are! By Christina Lawson BSides CHS 2024BSidesCHS285 views·1 year ago
21:02Beans to Breaches Getting Started with Application Security Testing by Lou Vega BSides CHS 2024BSidesCHS63 views·1 year ago
26:24Game Hacking for Security Professionals By Max Harley & Nick Powers BSides CHS 2024BSidesCHS676 views·1 year ago
38:08Shattering Trust Live Deepfakes and the Fall of Legacy Verification by Paul Vann BSides CHS 2024BSidesCHS192 views·1 year ago
46:05The Hashcat Chronicles Cracking Passwords Like a Pro by Jon Milkins BSides CHS 2024BSidesCHS258 views·1 year ago
28:26Chasing WhispersA Pragmatic Review of Adversary Emulation Processes by Kyle Smith BSides CHS 2024BSidesCHS74 views·1 year ago
45:41Unveiling a Multi-Headed Chinese State-Sponsored Campaign by Mark Parsons BSides CHS 2024BSidesCHS450 views·1 year ago
46:03Creating a Secure Web Server from 2 Vulnerable Web Servers by Parker Garrison BSides CHS 2024BSidesCHS175 views·1 year ago
36:12The Dangers of Building a Recursive Internet Scanner by Joel Moore BSides CHS 2024BSidesCHS29.8K views·1 year ago
51:55AI + Actual Intelligence Keynote by Marcus J. Carey BSides CHS 2024BSidesCHS203 views·1 year ago
56:12BSidesCHS 2023 Keynote “What Game of Thrones Can Teach Us About Cyber Security” by Gerald AugerBSidesCHS110 views·2 years ago
43:16BSidesCHS 2022 Spilling the Beans How to Spot a Bad Pentest by Qasim Ijaz and Andrew ClintonBSidesCHS87 views·3 years ago
40:35BSidesCHS 2022 IR in containerized and ephemeral environments by David Mitchell and Adrian WoodBSidesCHS61 views·3 years ago
25:45BSidesCHS 2022 Building a sustainable detector development lifecycle by Paul IhmeBSidesCHS42 views·3 years ago
28:13BSidesCHS 2022 A Hitchhackers Guide to the IoT by Jerome de las AlasBSidesCHS146 views·3 years ago
51:41BSidesCHS 2019 Security at Speed Securing Code in your DevOps Pipeline by Daniel ByrnsideBSidesCHS84 views·6 years ago