Threat CON 2018 - How To Effectively Manage Your Org's Cloud Security Posture
Threat CON 2018 - License managers: The Phantom Menace
Threat CON 2018 - The OWASP Top Ten Proactive Controls 2018 by Jim Manico
Threat CON 2018 - Building and Developing Communities (keynote) by Matt Suiche
Threat CON 2018 - Exploiting Cloud Synchronisation to Mass Hack IoTs
Hackers will pose a greater threat in 2018
Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018
Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018
Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
Nepal's First Hacker' Convention - THREAT CON 2018
Threat Hunting: From Platitudes to Practical Application at DefCamp 2018
GrrCon 2018 Ada16 Threat Modeling How to actually do it and make it useful Derek Milroy
Area41 2018: Paolo Di Prodi: The Future Of Threat Intelligence Platforms
Circle City Con 50 203 Applying Thermodynamic Principles to Threat Intelligence Kyle Ehmke
Advanced Models of Cyber Threat Intelligence and Situational Awareness - CyCon 2018
Threat Hunting From Platitudes to Practical Application DefCamp 2018
Renesas Security Threat Modeling @ CES 2018
Threat Model-as-Code - Abhay Bhargav - AppSecUSA 2018
BSides DC 2018 - Endpoint to Internet: Security Control Validation Using Threat Behavior Emulation
03. x33fcon 2018 - Threat-based Purple Teaming with ATT&CK by Chris and Cody from MITRE