├── 44CSOTM.pptx ├── 44CU.pdf ├── All of the threats - Intelligence, modelling, simulation and hunting through an ATT&CKers lens v4.pdf ├── Applying a Threat Informed Defense - Achieving Business Resiliency.pdf ├── Auditd for the newly threatened.pdf ├── BGH44C.pdf ├── BTLCC.pdf ├── BreakingCrypto.odp ├── Flash-Security.pps ├── FlashSecurityCrossdomain.zip ├── GITR044C.pdf ├── HMBCATSHEMFC.pdf ├── Hello - I bring you announcements from other Autonomous Systems v1 (Public form).pdf ├── Heyoka-SOURCEBoston2009.pdf ├── How-to-Detect-XSS.odp ├── How-to-Detect-XSS.pdf ├── How-to-Detect-XSS.ppt ├── I2019DTSOTC.pdf ├── I2019ITRYTIOIIBRR.pdf ├── IML44C.pdf ├── INTCX-1001 Achieve Security Resilience through a Reimagined SOC v2_FINAL.pdf ├── Insecure-Web-20-Trends.pps ├── IntroducingFormatStrings.pdf ├── Knowing your adversary - Building novel detections with SOC analytics v2.pdf ├── Regulations inbound - NIS2, DORA et al What do they mean for the way we conduct business.pdf ├── Regulations inbound - Operational resilience What does it mean for the way we conduct business.pdf ├── Revelli-OwaspDay2-Rome.pdf ├── SEAMFDS.pdf ├── SSWTIOLYWSWYDL.pdf ├── STHST.pptx ├── SecuriTayCryptoDemo1.exe ├── SecuriTayCryptoDemo2.exe ├── TTRS19SYWTBASLFTFL.pdf ├── The UNIX malware landscape - Reviewing the goods at MALWAREbazaar v5.pdf ├── Threat Modelling - It's not just for developers (ATT&CKCon 3.0 form) v2.pdf ├── Windows_Authentication_CrestCon.pdf ├── bbpabc.odp ├── eu-18-Wadhwa-Brown-Where-2-worlds-collide-Bringing-Mimikatz-et-al-to-UNIX.pdf ├── formatstringrevisited.pdf └── us-18-GarciaAlguacil_MurilloMoya-Playback_A_TLS_1.3_Story__v6.pdf /44CSOTM.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/44CSOTM.pptx -------------------------------------------------------------------------------- /44CU.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/44CU.pdf -------------------------------------------------------------------------------- /All of the threats - Intelligence, modelling, simulation and hunting through an ATT&CKers lens v4.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/All of the threats - Intelligence, modelling, simulation and hunting through an ATT&CKers lens v4.pdf -------------------------------------------------------------------------------- /Applying a Threat Informed Defense - Achieving Business Resiliency.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Applying a Threat Informed Defense - Achieving Business Resiliency.pdf -------------------------------------------------------------------------------- /Auditd for the newly threatened.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Auditd for the newly threatened.pdf -------------------------------------------------------------------------------- /BGH44C.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/BGH44C.pdf -------------------------------------------------------------------------------- /BTLCC.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/BTLCC.pdf -------------------------------------------------------------------------------- /BreakingCrypto.odp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/BreakingCrypto.odp -------------------------------------------------------------------------------- /Flash-Security.pps: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Flash-Security.pps -------------------------------------------------------------------------------- /FlashSecurityCrossdomain.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/FlashSecurityCrossdomain.zip -------------------------------------------------------------------------------- /GITR044C.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/GITR044C.pdf -------------------------------------------------------------------------------- /HMBCATSHEMFC.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/HMBCATSHEMFC.pdf -------------------------------------------------------------------------------- /Hello - I bring you announcements from other Autonomous Systems v1 (Public form).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Hello - I bring you announcements from other Autonomous Systems v1 (Public form).pdf -------------------------------------------------------------------------------- /Heyoka-SOURCEBoston2009.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Heyoka-SOURCEBoston2009.pdf -------------------------------------------------------------------------------- /How-to-Detect-XSS.odp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/How-to-Detect-XSS.odp -------------------------------------------------------------------------------- /How-to-Detect-XSS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/How-to-Detect-XSS.pdf -------------------------------------------------------------------------------- /How-to-Detect-XSS.ppt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/How-to-Detect-XSS.ppt -------------------------------------------------------------------------------- /I2019DTSOTC.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/I2019DTSOTC.pdf -------------------------------------------------------------------------------- /I2019ITRYTIOIIBRR.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/I2019ITRYTIOIIBRR.pdf -------------------------------------------------------------------------------- /IML44C.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/IML44C.pdf -------------------------------------------------------------------------------- /INTCX-1001 Achieve Security Resilience through a Reimagined SOC v2_FINAL.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/INTCX-1001 Achieve Security Resilience through a Reimagined SOC v2_FINAL.pdf -------------------------------------------------------------------------------- /Insecure-Web-20-Trends.pps: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Insecure-Web-20-Trends.pps -------------------------------------------------------------------------------- /IntroducingFormatStrings.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/IntroducingFormatStrings.pdf -------------------------------------------------------------------------------- /Knowing your adversary - Building novel detections with SOC analytics v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Knowing your adversary - Building novel detections with SOC analytics v2.pdf -------------------------------------------------------------------------------- /Regulations inbound - NIS2, DORA et al What do they mean for the way we conduct business.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Regulations inbound - NIS2, DORA et al What do they mean for the way we conduct business.pdf -------------------------------------------------------------------------------- /Regulations inbound - Operational resilience What does it mean for the way we conduct business.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Regulations inbound - Operational resilience What does it mean for the way we conduct business.pdf -------------------------------------------------------------------------------- /Revelli-OwaspDay2-Rome.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Revelli-OwaspDay2-Rome.pdf -------------------------------------------------------------------------------- /SEAMFDS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/SEAMFDS.pdf -------------------------------------------------------------------------------- /SSWTIOLYWSWYDL.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/SSWTIOLYWSWYDL.pdf -------------------------------------------------------------------------------- /STHST.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/STHST.pptx -------------------------------------------------------------------------------- /SecuriTayCryptoDemo1.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/SecuriTayCryptoDemo1.exe -------------------------------------------------------------------------------- /SecuriTayCryptoDemo2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/SecuriTayCryptoDemo2.exe -------------------------------------------------------------------------------- /TTRS19SYWTBASLFTFL.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/TTRS19SYWTBASLFTFL.pdf -------------------------------------------------------------------------------- /The UNIX malware landscape - Reviewing the goods at MALWAREbazaar v5.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/The UNIX malware landscape - Reviewing the goods at MALWAREbazaar v5.pdf -------------------------------------------------------------------------------- /Threat Modelling - It's not just for developers (ATT&CKCon 3.0 form) v2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Threat Modelling - It's not just for developers (ATT&CKCon 3.0 form) v2.pdf -------------------------------------------------------------------------------- /Windows_Authentication_CrestCon.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/Windows_Authentication_CrestCon.pdf -------------------------------------------------------------------------------- /bbpabc.odp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/bbpabc.odp -------------------------------------------------------------------------------- /eu-18-Wadhwa-Brown-Where-2-worlds-collide-Bringing-Mimikatz-et-al-to-UNIX.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/eu-18-Wadhwa-Brown-Where-2-worlds-collide-Bringing-Mimikatz-et-al-to-UNIX.pdf -------------------------------------------------------------------------------- /formatstringrevisited.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/formatstringrevisited.pdf -------------------------------------------------------------------------------- /us-18-GarciaAlguacil_MurilloMoya-Playback_A_TLS_1.3_Story__v6.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CiscoCXSecurity/presentations/HEAD/us-18-GarciaAlguacil_MurilloMoya-Playback_A_TLS_1.3_Story__v6.pdf --------------------------------------------------------------------------------