Talks
2018
- Pentesting DevOps: Containers and Orchestration
- Best Practices for Securing Secure Shells
- Latest Advances in DNS Privacy
- Pip-PyPi-Python Security
2017
- K8s: Pods to root in minutes
- Web Browsing like it’s 1984
- Attrocities of Gnome Keyring
- Practical Tor Attacks
- Tor Bridge Workshop
2016
- Docker Security
- The State of WiFi Security
2015
- 0x20 Hack *
- New Secure Messaging *
2014
- BSidesDetroit: Corporate Espionage
Older
- Pentesting Embedded Security
- Competitive Intelligence: Bridging the security and intelligence community
- Jukebox Jacking – Defcon 20 Skytalks
- 28c3 in 15 Minutes – 2011-1-6 – Rochester 2600
- Android Security – 2011-10-05 – Rochester Security Summit
- How Not To Throw A B-Sides – 2011-08-02 – Security B-Sides Las Vegas
- Imaged Based Automation – 2011-01-23 – Interlock Rochester Lightning Talks
- Advanced Tor Workshop – 2010-12-03 – Rochester 2600
- Stupid Firesheep – 2010-11-12 – Interlock Rochester Lightning Talks
- Lock Picking 201 – 2010-11-05 – Rochester 2600
- Lock Picking 101 – 2010-10-23 – Barcamp Rochester
- DLL Hijacking – 2010-10-01 – Rochester 2600
- Hackerspaces – 2010-03-31 – Barcamp Rochester