Events: BlueHat Security Briefings: Fall 2008 Sessions and Interviews

Options

Download
1st Format
DROP FORMAT
2nd Format
DROP FORMAT
3rd Format
DROP FORMAT
4th Format
DROP FORMAT
5th Format
DROP FORMAT
6th Format
DROP FORMAT
Drag and drop video formats you wish to download into placeholders above (if the "1st Format" is not available for download, the "2nd Format" will be used and so on):
  • High Quality WMV
  • WMV
  • High Quality MP4
  • MP4
  • Low Quality MP4
  • MP3

Where is the tags filter? Not tags were assigned to any of the sessions.

What Tags Who When
Concurrency Attacks on Web Applications Scott Stender, Alex Vidergar 10/16/2008
Fuzzed Enough? When it’s OK to Put the Shears Down Lars Opstad, Jason Shirk, Dave Weinstein 10/16/2008
General Sessions Keynote Jon DeVaan 10/16/2008
Interview with Bryan Sullivan & Danny Dhillon Danny Dhillon, Bryan Sullivan 10/16/2008
Interview with Bryan Sullivan & Matt Miller Matt Miller, Bryan Sullivan 10/16/2008
Interview with Bryan Sullivan & Vinnie Liu Bryan Sullivan, Vinnie Liu 10/16/2008
Interview with Bryan Sullivan and Adam Shostack Adam Shostack, Bryan Sullivan 10/16/2008
Interview with Bryan Sullivan with Dave Weinstein and Jason Shirk Jason Shirk, Bryan Sullivan, Dave Weinstein 10/16/2008
Interview with Bryan Sullivan with Scott Stender & Alex Vidergar Scott Stender, Bryan Sullivan, Alex Vidergar 10/16/2008
Interview with Katie Moussouris & Dan Kaminsky Dan Kaminsky, Katie Moussouris 10/16/2008
Interview with Katie Moussouris & Ian Hellen Ian Hellen, Katie Moussouris 10/16/2008
Interview with Katie Moussouris & Iftach Amit Iftach Amit, Katie Moussouris 10/16/2008
Interview with Katie Moussouris & Richard Johnson Richard Johnson, Katie Moussouris 10/16/2008
Interview with Katie Moussouris & Roelof Temmingh Roelof Temmingh 10/16/2008
Interview with Katie Moussouris with Gareth Heyes, Eduardo Vela Nava & David Lindsay Gareth Heyes, David Lindsay, Katie Moussouris, Eduardo Vela Nava 10/16/2008
Mitigations Unplugged Matt Miller 10/16/2008
Real World Code Review – Using the Right Tools in the Right Place at the Right Time Vinnie Liu 10/16/2008
SDL Sessions Keynote Scott Charney 10/16/2008
Threat Modeling at EMC & Counterpoint: Threat Modeling at Microsoft Danny Dhillon, Adam Shostack 10/16/2008