Source Zero Con Video Hub

Source Zero Con is a virtual event bringing the technical community together to educate future security leaders. This video repository features the latest presentations and interactive workshops led by Optiv’s Source Zero research and innovation team. Browse the archives for expert insights on emergent security concepts and capabilities from various practices, including Attack and Penetration, Application Security, Cyber Threat Intelligence, Digital Forensics and Incident Response.

Stay up to date on red and blue team tools and solutions.

 

AI for Red Teamers (What It Looks Like When the Matrix Actually Comes for You)

Speaker: Tim Elrod


 

Breaking Into the Cloud

Speaker: Aaron Martin & Savannah Lazzara


 

LOLBins – The Quieter Way

Speaker: Mattia Campagnano


 

Hacking a Bird

Speaker: Tim Fake


 

Deliberate Engagements – Using USAF Ops Battle Rhythm for Pen Testing

Speaker: John Quadrino


 

Pre-Windows 2000 Backdoors and Bypasses

Speaker: Garrett Foster


 

Do You Know What Your API is Doing?

Speaker: Bryce Harty


 

Automating Offensive Security Infrastructure

Speaker: Joe Berry


 

Current State of Linux Rootkits

Speaker: Phillip Haas


 

Gaining a Foothold: Penetration Testing as a Second Career

Speaker: William Giles

Cyber Resilience and Incident Response

View the Source Zero playlist on YouTube

This Talk is About Incident Response Processes

Speaker: Curtis Fechner


 

Cyber Insurance: Why It’s an Asset NOT a Liability in a Cyber Event

Speaker: Dara Gibson


 

How to Use AI for Decision Making for Vulnerability Remediation Planning

Speaker: David Halka


 

Optiv Vulnerability Management Maturity Model

Speaker: Luis Castillo


 

Don’t [You] Forget About [Me]…(or Forgotten Components of a Vulnerability Management Program

Speaker: Vince Pascale


 

Business Email Compromise (BEC) & Phishing Investigations in Office365

Speaker: Justin Safa


 

Ransomware: An Epidemic for the Digital Age

Speaker: Matthew Waddell


 

Cyber Insurance – Panacea or a House of Cards?

Speaker: Bill Young

Cyber Threat Intelligence

View the Source Zero playlist on YouTube

Vertical Risk Reports and You: Practical Applications of Cyber Threat Intelligence

Speaker: Emily Lee & Nick Hyatt


 

The “I” in CTI: “Intelligence” or Just “Information”. Re-applying Risk and Fundamentals Back into Intelligence

Speaker: Aamil Karimi


 

One Piece at a Time: A Guide to Building a CTI Program

Speaker: Nick Hyatt

The Nooks and Crannies of AppSec Programs

Speaker: John Tsangaris


 

Ghost in the Machine: Adversarial AI Attacks

Speaker: Nikhil Ollukaren


 

Securing Your AWS Cloud: Best Practices and Pentesting Techniques

Speaker: Prasad Nadkarni


 

Is Your SBOM a Dud or Da Bomb

Speaker: Doug Rogahn


 

Assessing iOS Application

Speaker: Vandan Pathak


 

Software Composition Analysis: Tools and Techniques

Speaker: Rushyendra Reddy Induri


 

Security Risks with Low-Code and No-Code Application Development Platforms

Speaker: Dan Sharp


 

Developers Gone Wild

Speaker: Tim Farley


 

(Security) Culture Eats Strategy for Breakfast
Speaker: Brendon Collins

Managing Perspectives for Assessment Reports with Few or Zero Findings

Speaker: Mayank Singh

Looking for Red and Blue Team Tools and Solutions?

 

Contact Us

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?