- 122
- 17 581
Swiss Cyber Storm
Switzerland
Приєднався 8 лис 2018
How to Phish - How does the perfect embedded training look like by Prof. Dr. Bernhard Tellenbach
How to Phish - How does the perfect embedded training look like by Prof. Dr. Bernhard Tellenbach (2018)
visit www.swisscyberstorm.com & 2018.swisscyberstorm.com/ for more information
visit www.swisscyberstorm.com & 2018.swisscyberstorm.com/ for more information
Переглядів: 24
Відео
Swiss Hacking Challenge & SwissSkills: A chance for young talents (2024)
Переглядів 13414 днів тому
By Marc Bollhalder Organizer and Lead, Swiss Hacking Challenge and Manuel Bürge Organizer, Swiss Hacking Challenge visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information
Sponsor InfoGuard: Artificial Intelligence and Cybersecurity: A New Era of Defense (2024)
Переглядів 1914 днів тому
Artificial Intelligence and Cybersecurity: A New Era of Defense By Sandro Bachmann Senior Incident Responder, InfoGuard visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Sandro Bachmann ...
Human-Centred Security Meets AI: How to Navigate New Threats By Cornelia Puhze (2024)
Переглядів 1914 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Cornelia Puhze *Title:* Human-Centred Security Meets AI: How to Navigate New Threats *Category:* SCS2024 *Subcategory:* Regular *Link:* ...
Hacking And Defending APIs: Red And Blue Make Purple By Matt Tesauro (2024)
Переглядів 2114 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Matt Tesauro *Title:* Hacking And Defending APIs: Red And Blue Make Purple *Category:* SCS2024 *Subcategory:* Regular *Video:* [ua-cam.c...
(Un-)Natural Language Processing: Defensive AI in Practice By Emanuel Seemann (2024)
Переглядів 1114 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Emanuel Seemann *Title:* (Un-)Natural Language Processing: Defensive AI in Practice *Category:* SCS2024 *Subcategory:* Regular *Video:* ...
Law Beats Code: Enforcing a Legal Base for a Safe and Human-Centric AI By Monica Amgwerd (2024)
Переглядів 1514 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Monica Amgwerd *Title:* Law Beats Code: Enforcing a Legal Base for a Safe and Human-Centric AI *Category:* SCS2024 *Subcategory:* Regula...
Overcoming Resistance with PurposeDriven Security. A Lesson in Practical Socio-Dynamics: Ida Hameete
Переглядів 2014 днів тому
Overcoming Resistance with Purpose-Driven Security. A Lesson in Practical Socio-Dynamics By Ida Hameete visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Ida Hameete *Title:* Overcoming ...
Sponsor Swiss Post Cybersecurity: Breach & Attack Simulation - Continuous Security Validation (2024)
Переглядів 2214 днів тому
Breach & Attack Simulation - Continuous Security Validation (incl. live demo) By Raphael Ruf Cyber Security Consultant, Swiss Post Cybersecurity (formerly terreActive) visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comme...
When Chatbots Talk Too Much: The Risks and Rewards of AI Manipulation By Eva Wolfangel (2024)
Переглядів 1414 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Eva Wolfangel *Title:* When Chatbots Talk Too Much: The Risks and Rewards of AI Manipulation *Category:* SCS2024 *Subcategory:* Regular ...
Sponsor Microsoft: “How much does my CEO earn?” - Avoid Data Security Pitfalls in the Era of AI
Переглядів 4614 днів тому
Sponsor Microsoft: “How much does my CEO earn?” - Avoid Data Security Pitfalls in the Era of AI
How to Run Your Security Program with AI Before Someone Else Does By Daniel Miessler (2024)
Переглядів 10814 днів тому
How to Run Your Security Program with AI Before Someone Else Does By Daniel Miessler (2024)
Understanding Cyber-Physical Attacks Against Nuclear Reactors By Ruben Santamarta (2024)
Переглядів 12114 днів тому
Understanding Cyber-Physical Attacks Against Nuclear Reactors By Ruben Santamarta (2024)
Growing a Security Champion Program Into a Security Powerhouse By Bonnie Viteri (2024)
Переглядів 2014 днів тому
Growing a Security Champion Program Into a Security Powerhouse By Bonnie Viteri (2024)
An Insider Perspective on Cyber Insurance - Yes or No? By Maya Bundt & Fabian Willi (2024)
Переглядів 1914 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Maya Bundt und Fabian Willi *Title:* An Insider Perspective on Cyber Insurance - Yes or No? *Category:* SCS2024 *Subcategory:* Regular *...
From PentestGPT to Building an AI-Powered Robot Immune System By Víctor Mayoral Vilches (2024)
Переглядів 5714 днів тому
Cybersecurity AIs: From PentestGPT to Building an AI-Powered Robot Immune System By Víctor Mayoral Vilches visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Víctor Mayoral Vilches *Title...
The Fault in Our Metrics. Rethinking How We Measure Detection & Response By Allyn Stott (2024)
Переглядів 1714 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Allyn Stott *Title:* The Fault in Our Metrics. Rethinking How We Measure Detection & Response *Category:* SCS2024 *Subcategory:* Regular...
How to Talk AI to Your Lawyers By David Rosenthal (2024)
Переглядів 3614 днів тому
visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* David Rosenthal *Title:* How to Talk AI to Your Lawyers *Category:* SCS2024 *Subcategory:* Regular *Video:* ua-cam.com/video/0nF-ebEEM-Y...
Sponsor Oneconsult: Don’t Forget the Human (2024)
Переглядів 4114 днів тому
Don’t Forget the Human By Gregor Wegberg Head of Digital Forensics and Incident Response, Oneconsult visit 2024.swisscyberstorm.com/schedule/ & www.swisscyberstorm.com for more information _The following summary was machine generated from the UA-cam transcript and then reviewed by human eyes. If you spot any errors, please comment below._ Summary *Presenter:* Gregor Wegberg *Title:* Don’t Forge...
Sponsor Temet: AI Compliance Essentials: Standards and Emerging Regulations (2024)
Переглядів 2014 днів тому
Sponsor Temet: AI Compliance Essentials: Standards and Emerging Regulations (2024)
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem By Omer Akgul
Переглядів 113Рік тому
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem By Omer Akgul
Unveiling Malicious Behavior in Unknown Binaries By Tim Blazytko (2023)
Переглядів 550Рік тому
Unveiling Malicious Behavior in Unknown Binaries By Tim Blazytko (2023)
Making sense of data dumps and data leaks in times of war and peace By Stefan Soesanto (2023)
Переглядів 59Рік тому
Making sense of data dumps and data leaks in times of war and peace By Stefan Soesanto (2023)
Cyber Resilience on the Swiss Financial Center - the Swiss FS-CSC By Alexandra Arni (2023)
Переглядів 66Рік тому
Cyber Resilience on the Swiss Financial Center - the Swiss FS-CSC By Alexandra Arni (2023)
Converging Behaviors Across Threat Actors By Joe Slowik (2023)
Переглядів 140Рік тому
Converging Behaviors Across Threat Actors By Joe Slowik (2023)
Sponsor Compass: Navigating the Perils: The Precarious Depths of Device Code Phishing in Azure AD
Переглядів 145Рік тому
Sponsor Compass: Navigating the Perils: The Precarious Depths of Device Code Phishing in Azure AD
Sponsor Swisscom: How adaptive is the CAT? (2023)
Переглядів 56Рік тому
Sponsor Swisscom: How adaptive is the CAT? (2023)
How to Run a Great Security Champion Program By Raphael Schaffo (2023)
Переглядів 179Рік тому
How to Run a Great Security Champion Program By Raphael Schaffo (2023)
Sponsor SEC Consult: Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware
Переглядів 578Рік тому
Sponsor SEC Consult: Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware
Sponsor Infoguard: Tell me what you use and I will tell you who you are! (2023)
Переглядів 135Рік тому
Sponsor Infoguard: Tell me what you use and I will tell you who you are! (2023)
You got me at 12 clicks. We need a name for this. Bloatclick or something. Click frenzy? It drives me barmy. It's the same with everything cloud. There is no shortcut method. It's like enterprise expense managers. It shoudl be like Excel. I can populate a whole table, fill down rows, drag in data from elsewhere. Use my PARALLEL brain for PARALLEL tasks. But no, some programmer. Some bastard who NEVER has to use the software they make, except perhaps once to test that it works (WORKS mind, not makes users smile) gives me a world of click and wait and dwell and wait and click and upload and copy individual values into individual bozes and ... grrrr). And I'm not even a sysadmin - just a lowly user. Great talk.
it was an honour of being there to present.❤
now is V4
WOW 🔥🔥🔥🙌🏼🙌🏼🙌🏼! The secret to success > Promo`SM!
Great video. I learned a lot of interesting things for myself in my work. Very useful for beginner fuzzers. Thanks.
Always a pleasure to hear such a brilliant mind sharing his thoughts. Christian's introduction was admirable (as very often), and reminded me of how I came to look into Nadmin's work and follow his talks: many years ago, I saw one of his comments on someone else's work and I thought "Uh, who's the author of this comment?" Nadim is the kind of person I wish our elected leaders would take the time to invite, to discuss with and ask questions. He is a highly skilled engineer who can speak to non-engineers about all things modern cyber-threats and I think we definitely need these in our leading circles.
hey! how about we don't do these AI stuff to read our private data to "pRoTeCt tHe KiDs" and instead we teach parents and educators to teach the kids to not be stupid online AND have stricter age restrictions on the technology kids have access to????? wouldn't that be cool??
Great Talk
Wow, if a company has to hire someone to understand pentest reports / understand how to mitigate issues found in a pentest, then the pentesting company did something really wrong! The pentester should not only deliver a list of findings but also help the customer to understand the issues and mitigations.
Shhh, don't ruin my business case, Ville.
Very cool! congrats to all of you :-)
I need a hacker I want talk with hacker and train🙂
Hey there! Enjoyed the video. Have you thought about using SMZeus . c o m to help your videos rank better?!
Boring crap. Something that I can get by reading Securing DevOps book. Let me quote a book to people who can read, so I can show that I am different than everyone.How many real world bugs has this speaker ever found? People who speak at security conferences should have real world experience of exploitation before coming and speaking... that is hypocrisy of our culture today..