Christiaan008

Videos from Christiaan008

Page 1 of 2 • 43 total videos

ShmooCon 2014: Fire Talks (friday)
1:54:25

ShmooCon 2014: Fire Talks (friday)

Christiaan008
871 views
ShmooCon 2014: Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
19:36

ShmooCon 2014: Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares

Christiaan008
3.0K views
ShmooCon 2014: Dissipation of Hackers in the Enterprise
28:51

ShmooCon 2014: Dissipation of Hackers in the Enterprise

Christiaan008
729 views
ShmooCon 2014: Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
42:56

ShmooCon 2014: Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

Christiaan008
1.8K views
ShmooCon 2014: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
43:42

ShmooCon 2014: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

Christiaan008
3.3K views
ShmooCon 2014: Introducing DARPA's Cyber Grand Challenge
35:45

ShmooCon 2014: Introducing DARPA's Cyber Grand Challenge

Christiaan008
1.4K views
ShmooCon 2014: The NSA: Capabilities and Countermeasures
52:37

ShmooCon 2014: The NSA: Capabilities and Countermeasures

Christiaan008
25.3K views
ShmooCon 2014: Raising Costs for Your Attackers Instead of Your CFO
50:05

ShmooCon 2014: Raising Costs for Your Attackers Instead of Your CFO

Christiaan008
1.5K views
ShmooCon 2014: Timing-Based Attestation: Sexy Defense, or the Sexiest?
1:02:48

ShmooCon 2014: Timing-Based Attestation: Sexy Defense, or the Sexiest?

Christiaan008
1.2K views
ShmooCon 2014: Technology Law Issues for Security Professionals
49:52

ShmooCon 2014: Technology Law Issues for Security Professionals

Christiaan008
671 views
ShmooCon 2013: Ten Strategies of a World-Class Computer Security Incident Response Team
33:53

ShmooCon 2013: Ten Strategies of a World-Class Computer Security Incident Response Team

Christiaan008
12.7K views
ShmooCon 2013: Mainframed: The Secrets Inside That Black Box
23:47

ShmooCon 2013: Mainframed: The Secrets Inside That Black Box

Christiaan008
948 views
ShmooCon 2013: How To Own A Building: Exploiting the Physical World With Bacnet
20:29

ShmooCon 2013: How To Own A Building: Exploiting the Physical World With Bacnet

Christiaan008
5.7K views
ShmooCon 2013: 0wn the con
58:32

ShmooCon 2013: 0wn the con

Christiaan008
1.8K views
ShmooCon 2012: Inside the OODA Loop - Towards an Aggressive Defense (EN)
40:15

ShmooCon 2012: Inside the OODA Loop - Towards an Aggressive Defense (EN)

Christiaan008
190 views
DEFCON 19: Steganography and Cryptography 101 (w speaker)
19:40

DEFCON 19: Steganography and Cryptography 101 (w speaker)

Christiaan008
1.1K views
DEFCON 19: Steganography and Cryptography 101
19:40

DEFCON 19: Steganography and Cryptography 101

Christiaan008
6.1K views
DEFCON 19: Engaging with Cryptographic Oracles
48:30

DEFCON 19: Engaging with Cryptographic Oracles

Christiaan008
1.2K views
DeepSec 2010:  Mobile VoIP Steganography: From Framework to Implementation
49:31

DeepSec 2010: Mobile VoIP Steganography: From Framework to Implementation

Christiaan008
492 views
NOTACON 5: Zen and the Art of the Turing Machine
46:39

NOTACON 5: Zen and the Art of the Turing Machine

Christiaan008
110 views
ShmooCon 2011: Keynote:  Analytic Framework for Cyber Security
53:18

ShmooCon 2011: Keynote: Analytic Framework for Cyber Security

Christiaan008
5.4K views
ShmooCon 2011: Project Ubertooth: Building a Better Bluetooth Adapter
47:23

ShmooCon 2011: Project Ubertooth: Building a Better Bluetooth Adapter

Christiaan008
13.5K views
25c3: An introduction to new stream cipher designs
46:54

25c3: An introduction to new stream cipher designs

Christiaan008
3.1K views
DEFCON 18: Welcome and Making the DEF CON 18 Badge  1/5
14:58

DEFCON 18: Welcome and Making the DEF CON 18 Badge 1/5

Christiaan008
481 views