Categories: Cybersecurity Academy InfoSec News

DEF CON 30 Archive page is Live!

Published by
RiSec.Mitch

Talks & Materials


Presentation Slides and Extras

Check out all the original and updated presentation slides, white papers, and accompanying files we received!
DEF CON 30 Presentations (RAR)

Presentation Audio and Video

All DEF CON 30 Video on our Youtube Channel

Villages – Speaker and Slides (video)

Highlights


DEF CON 30 Music

DEF CON 30 Original Soundtrack (flac) (opus)

DEF CON 30 Program

Conference Printed Program from DEF CON 30
Conference Pocket Guide from DEF CON 30

DEF CON 30 Photos and Video

Tons of Photos from our Photo Corps and several other sources:
DEF CON 30 Photos (RAR)
Videos by DEF CON Video team (RAR)

DEF CON 30 CTF

All Files, including Packet dumps and binaries from the Capture the Flag competiton at DEF CON 30:
DEF CON 30 CTF

DEF CON 30 Receipt

Need to expense that trip to DEF CON 30? Here is a handy receipt for just such endeavors!
DEF CON 30 Receipt – Cash
DEF CON 30 Receipt – Pre-reg

DEF CON 30 Website

DEF CON 30 Site

DEF CON 30 Archive Page

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmark Close
Social Comments Box
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 3 September 2022 12:47 PM

RiSec.Mitch

Just your average information security researcher from Delaware US.

Leave a Comment
Published by
RiSec.Mitch

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago