09. x33fcon 2019 - Hunting beacons by Bartosz Jerzman
03. x33fcon 2019 - Offensive Testing of ICS Security by Joe Slowik
04. x33fcon 2019 - Chaos in the Machine: APT28 Complex by Jason Kitchen & Alex Orleans
11. x33fcon 2019 - SS7 for INFOSEC by Paul Coggin
08. x33fcon 2018 - Aligning Threat intelligence Attribution to Defender Needs by Joe Slowik
9. Joe Slowik - Cyber Consequences, Operational Dependencies, and Full-Scope Security
01. x33fcon 2019 - Keynote by Aaron Wade
x33fcon 2020 conference highlights
DEF CON Safe Mode - Jorge Orchilles - Emulating Garmin Hack - Red Team Village
Joe Slowik - Indicators vs. Anomalies vs. Behaviors: A Critical Examination for ICS Defense
01. OMG WTF CTF by keidii
Post-Exploit Threat Modeling with ATT&CK
The Imitation Game: Emulating Attackers - Wietze Beukema
Hunting C2 Beaconing at Scale in the Modern Age
Tracking attackers: Why attribution matters and how to do it.
12. EDR Evasion and OODA Loops by Jackson T.
MIEM Real CTF Teaser
MITRE ATT&CKcon – Day 1, 9:00 a.m. – 12:20 p.m.
07. x33fcon 2018 - What The HELK? Enabling Graph Analytics for Threat Hunting by Cyb3rWard0g
Leveraging Beacon Detection Techniques to Identify Anomalous Logons | 2020 THIR Summit