Emulating the Adversary in Post-Exploitation w/ Jake Williams - SANS HackFest & Ranges Summit 2020
Adversary Emulation on Windows at DefCamp 2021
Jake Williams, SANS - Paul's Security Weekly #543
WWHF 2020 (Virtual): Hunting Software Vulnerabilities Without Reversing - Jake Williams
Jake Williams - Wrong signal given on Cyber Security
Behind The Incident Episode 01 : Jake Williams aka MalwareJake
SANS Emergency Webcast: Follina MSDT (MS Word) 0-day - Analysis and Remediation w/ Jake Williams
Architecting for Ransomware Resilience | Jake Williams | WWHF San Diego 2022
Welcome to #LetsTalkSecurity s1e6 | Become the Hunter with Jake Williams
In the Trenches: Purple Team Do’s and Don’ts
Adversary simulation in modern environments
Destroying Fog of War: Realistic End-to-End Attacks and Detective Controls | Jeff McJunkin WWHF 2023
Adversary Detection Pipelines Finally Making Your Threat Intel Useful
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
115 Is that a psvsvc in your pocket Jake Williams
The Process of Detection Engineering1
I Can Still See You!
TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter
Keynote: Get Offensive with Management | Pen Test HackFest Summit 2021
Threat Emulation Plans for F5 Big-IP appliances vulnerability - CVE-2022-1388