Attackers Follow Security Principles Too
![](https://i.ytimg.com/vi/zyKYLcYaX1w/mqdefault.jpg)
1:03:58
Using Apeman to Discover Attack Paths in AWS
![](https://i.ytimg.com/vi/2o8iZXQSSMU/mqdefault.jpg)
1:08:40
Synced User Attack Path Analysis with BloodHound
![](https://i.ytimg.com/vi/5uNifnVlBy4/mqdefault.jpg)
31:15
Cybersecurity Architecture: Who Are You? Identity and Access Management
![](https://i.ytimg.com/vi/pybr_dFxNVY/mqdefault.jpg)
18:05
Big Data and Machine Learning
![](https://i.ytimg.com/vi/1XSBnIU_5ps/mqdefault.jpg)
13:18
Trump Joined by Suck-Up Elon Musk in Oval Office, Gets Tough on Straws & Doesn’t Endorse JD Vance
![](https://i.ytimg.com/vi/MFxhirfFSp4/mqdefault.jpg)
1:01:05
Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover
![](https://i.ytimg.com/vi/xm7doy4fef0/mqdefault.jpg)
31:05
Demo: Attack Path Management, the BloodHound Enterprise Way (June 25, 2024)
![](https://i.ytimg.com/vi/P_fHJIYENdI/mqdefault.jpg)
24:52