RVAsec: Jason Smith - Applied Detection and Analysis Using Flow Data
RVAsec 2017: Roman Bohuk and Jake Smith - Preparing the Next Generation of Security Specialists
OpenNSM (Applied Detection and Flow Analysis - Chris Sanders Jason Smith)
DEF CON 23 - Chris Sistrunk - NSM 101 for ICS - 101 Track
RVAsec 2012: Errata Hits Puberty: 13 Years of Chagrin (Jericho)
RVA5ec 2016: Ben Smith - Measuring Security: How Do I Know What a Valid Metric Looks Like?
RVAse 2017: Jeremy Dorrough - Zero Trust “Lite” Architecture to Securely Future-Proof Your Network
RVAsec: Schuyler Towne - Selling Security in a Post Lock Society
Senate passes Jason's Law
101 Monitoring Analysis 101 N00b to Ninja in 60 Minutes Grecs
RVAsec: Kizz Myanthia - Into The Worm Hole: Metasploit For Web PenTesting
RVAsec 2017: Mikko Hypponen - Keynote
DEF CON 22 - Jake Kouns and Carsten Eiram - Screw Becoming A Pentester
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You Video
What is CSP and Why Haven't You Applied it Yet - CSPSuperFriends
DEF CON 16 - Bruce Potter: Malware Detection through Network Flow Analysis
Security Outliers: Cultural Cues from High-Risk Professions
Michelangelo van Dam — 90K reasons why security is a must — php[world] 2014
BSidesIOWA 2015 Track1: Adversarial Testing through Unconventional Offensive Breach Techniques
Looking for the Weird: Detecting "Bad" Traffic and Abnormal Network Behavior