02. x33fcon 2019 - Out of the Blue by Marc Smeets & Mark Bergman
04. x33fcon 2019 - Chaos in the Machine: APT28 Complex by Jason Kitchen & Alex Orleans
03. x33fcon 2019 - Offensive Testing of ICS Security by Joe Slowik
08. x33fcon 2019 - APT ATT&CK™ - Threat-based Purple Teaming by Jamie Williams & Daniel Weiss
10. x33fcon 2019 - Hunters ATT&CKing with the right data! by Roberto Rodriguez Jose Louis Rodriguez
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
02. mubix (aka Rob Fuller) interview
Meet Me in the Middle: Threat Indications and Warning in Principle & Practice - SANS CTI Summit 2019
02. Desperate Infection Chains - Multi-Step Initial Access Strategies by Mariusz Banach
A Poor Man's Pentest: Automating the Manual - BsidesDE 2019
01. OMG WTF CTF by keidii
BSidesPhilly cs04 Threat Hunting Defining the Process While Circumventing Corporate Obstacles Kevin
07. x33fcon 2018 - What The HELK? Enabling Graph Analytics for Threat Hunting by Cyb3rWard0g
12. EDR Evasion and OODA Loops by Jackson T.
Let’s Talk About ELK Baby, Let’s Talk About You and AD
The Hidden Office Test Key (Persistence)
Open Source Pentesting
Tracking attackers: Why attribution matters and how to do it.
Post-Exploit Threat Modeling with ATT&CK
Preparing Yourself and Your Company for a First Pen test