Content tagged as 'Talk'

Here is a list of all the content that has been tagged as talk.

Talk - Secrets of a High Performance Security Focussed Agile Team

At BSides Wellington: Kim discusses that Quality (security included) does not have to be neglected when you’re planning, building and running a high performance development team. He discusses how we fail and how to succeed.

Talk - Secrets of a High Performance Security Focussed Agile Team

At All Day DevOps: Kim discusses that Quality (security included) does not have to be neglected when you’re planning, building and running a high performance development team. He discusses how we fail and how to succeed.

Talk - The Art of Exploitation

At JS Remote Conf: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.

Talk - The Art of Exploitation

At NZ.JS: Kim examines and demonstrates a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today.

Talk - Agile Security for Web Developers

Join Kim at AgileNZ 2016 for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Talk - Agile Security for Web Developers

Join Kim at Agile Professionals Network for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Talk - Agile Security for Web Developers

Join Kim at CodeCamp Christchurch for an exploration into an insightful set of steps he has learned, from an architectural, engineering and penetration testing perspective.

Talk - Password Profiling, Brute Forcing

Kim talks with his fellow Toastmasters about profiling peoples passwords and then brute forcing web applications with the shortlist of guessed passwords..

Talk - Infectious Media with Rubber Ducky

Kim talks with his fellow Toastmasters about the risks and countermeasures of luring targets to execute infectious media on their devices.

Talk - The Exploited & the Exploiters

Taking the perspective of the penetration tester hired in by the target to find the defects in their security defences before the cyber criminals do.