Thanks, Adrian and team at http://www.irongeek.com/
https://www.irongeek.com/i.php?page=videos/derbycon9/mainlist
- Keynote: Ed Skoudis
- Attribution and Deception for Threat Intelligence: John Strand
- BloodHound From Red to Blue: Mathieu Saulnier
Everything in the next block looks interesting
- "How do I detect technique X in Windows?" Applied Methodology to Definitively Answer this Question - Matt Graeber
- Scientific computing for information security - forging the missing link - Ryan Elkins
- Azure Sentinel - A first look at Microsoft's SIEM Solution - Carl Hertz