PaulDotCom mailing list archives

Louisville Infosec 2009 Videos


From: irongeek at irongeek.com (Adrian Crenshaw)
Date: Thu, 29 Oct 2009 11:03:39 -0400

Louisville Infosec 2009
Videos<http://www.irongeek.com/i.php?page=videos/louisville-infosec-2009-videos>
The videos are up, the title link takes you to the index but here are the
individual videos:

* Insider Attacks: The How?s, Why?s, and What to Do?s Dr. Eugene Schultz
Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/insider-attacks-the-hows-whys-and-what-to-do-dr-eugene-schultz>
*

The Internet is Evil* John Strand Louisville Infosec Conference Video*
<http://www.irongeek.com/i.php?page=videos/the-internet-is-evil-john-strand>

* The Seven Habits of a Successful Information Security Career Manager Lee
Kushner Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/the-seven-habits-of-a-successful-information-security-career-manager-lee-kushner>
*

 *Attacking SSL PKI* *Mike Zusman Louisville Infosec Conference
Video*<http://www.irongeek.com/i.php?page=videos/attacking-ssl-pki-mike-zusman>

* Blocking the Covert Channels Used for Malicious Data Theft Alex Lanstein
Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/blocking-the-covert-channels-used-for-malicious-data-theft-alex-lanstein>
*

 *Darknets: Fun and games with anonymizing private networks* *Adrian
Crenshaw Louisville Infosec Conference
Video*<http://www.irongeek.com/i.php?page=videos/darknets-fun-and-games-with-anonymizing-private-networks-adrian-crenshaw>

* Compliance Strategy and Planning ? Building an Effective Application
Security Program John Pavone Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/compliance-strategy-and-planning-building-an-effective-application-security-program-john-pavone>
*

* SAS 70 Compliance Auditing Rick Taylor Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/sas-70-compliance-auditing-rick-taylor>
*

 *Virtualizing the Security Architecture: Defending Virtual Servers and
Applications* *Jason
Wessel*<http://www.irongeek.com/i.php?page=videos/virtualizing-the-security-architecture-defending-virtual-servers-and-applications-jason-wessel>
* Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/virtualizing-the-security-architecture-defending-virtual-servers-and-applications-jason-wessel>
** *

* Bob?s Great Adventure: Attacking & Defending Web Applications Paul
Asadoorian Louisville Infosec Conference
Video<http://www.irongeek.com/i.php?page=videos/bob-great-adventure-attacking-defending-web-applications-paul-asadoorian>
** *

* Advanced Data Recovery Forensic Scott Moulton Louisville Infosec
Conference Video<http://www.irongeek.com/i.php?page=videos/advanced-data-recovery-forensic-scott-moulton>
** *

* Current Threats and Countermeasures Mark Maxey Louisville Infosec
Conference Video<http://www.irongeek.com/i.php?page=videos/current-threats-and-countermeasures-mark-maxey>
*

***Blending business and technical benefits together to achieve an effective
and streamlined compliance assessment. Jim Czerwonka and Jimmy Noll
Louisville Infosec Conference Video
<http://www.irongeek.com/i.php?page=videos/blending-business-and-technical-benefits-together-to-achieve-an-effective-and-streamlined-compliance-assessment-jim-czerwonka-and-jimmy-noll>
*

Thanks to Lee Pfeiffer and the student volunteers for handling the video the
day of the conference, and Brian Blankenship for editing the videos.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20091029/a46c7bd8/attachment.htm 


Current thread: