Presentations
2017 | |||
Date | Speaker | Topic | Video |
November 10, 2017 | Brian Engle | Sweat Equity in CyberSecurity & Good Works for God’s Kingdom | |
May 05, 2017 | John DeGruyter | Windows Kernel Bug Under the Hood (Hands On Training/Talk) | |
April 07, 2017 | David Longenecker | 4000 years of social engineering |
2014 | |||
Date | Speaker | Topic | Video |
December 12, 2014 | Mano ‘dash4rk’ Paul | MiTM – a Security and a Scriptural perspective (Kali Linux Series) | ![]() |
October 10, 2014 | Michael Howard | Science, Bravery, Christianity and Crypto | |
September 12, 2014 | Ed Skoudis | The Ultimate Hack | ![]() |
August 15, 2014 | David Longenecker | Phishers of Men | ![]() |
July 11, 2014 | Marcus Carey | Reformed Security | |
June 06, 2014 | Dr. Jared DeMott | Security + Software + Soul at Cross Roads | ![]() |
May 02, 2014 | James Wickett & Richard Stephens | Hack Snaps – Turbo Talks | ![]() |
Apr 04, 2014 | Mano ‘dash4rk’ Paul | XSS – a Security and a Scriptural perspective (Kali Linux Series) | ![]() |
Mar 21, 2014 | Mary Ann Davidson | How Joshua DoSed Jericho: Cybersecurity Secrets from the Bible | ![]() |
Feb 07, 2014 | Kevin Johnson | Sailing the Edge with Fishers of Men: Understanding the Ethics of Penetration Testing as a Believer | ![]() |
Jan 10, 2014 | Jayson E. Street | Perceptions and Perspectives of Hackers and Christians | ![]() |
2013 | |||
Date | Speaker | Topic | Video |
Nov 01, 2013 | Mano ‘dash4rk’ Paul | Backdoor threats against your software and your soul (Kali Linux Series) | ![]() |
Oct 11, 2013 | Mano ‘dash4rk’ Paul | Seek and Ye shall find – Passwords and Providence (Kali Linux Series) | ![]() |
Sep 06, 2013 | Larry Moore | Security Awareness Training, Spiritual Awareness Training: A comparison | ![]() |
Aug 23, 2013 | Vern Williams | Communications, Normal times and in Crisis, with other Humans and with our Lord. | ![]() |
Jul 12, 2013 | Mano ‘dash4rk’ Paul | r3c0n to r00t – Security h@Xs and Soul h@Xs (Kali Linux Series) | |
Jun 07, 2013 | Dave ‘ReL1K’ Kennedy | Secrets to Penetrating Security Defenses; All things are possible through Christ | |
May 03, 2013 | Justin Brown | End-User Security Education: Why Security Awareness Still Matters and other Parallels | |
Apr 05, 2013 | Rex Nelson | Vulnerability Research – Where are you Vulnerable? | |
Mar 15, 2013 | Keith Lowery | Avoiding Superstitious Architectures – Truth as a Foundation for Information Security | |
Feb 01, 2013 | Vern Williams | Who Are You Anyway? Identity, a Security and Life Question We All Need to Ask | |
Jan 11, 2013 | Clare Nelson | Beware Wolves in Sheep’s Clothing: Information Security Reports, Separating Fact from FUD |
2012 | |||
Date | Speaker | Topic | |
Nov 02, 2012 | Brian Engle | Complacent Compliance | |
Oct 12, 2012 | Mano ‘dash4rk’ Paul | SQL Injection and Soul Injection attacks | |
Sep 14, 2012 | Marcus Carey & Justin Brown | The Metasploit Way | |
Aug 03, 2012 | Jay McLaughlin | Uncovering the faces of Fraud | |
Jul 06, 2012 | Phil Beyer | Myth of a Security program; the reality of eternal life | |
Jun 01, 2012 | Marcus Carey | Advanced Persistent Threat (APT) lessons from C.S. Lewis | |
May 04, 2012 | Auston Holt | Security-Sanctification | |
Apr 13, 2012 | Michael Howard | Banned APIs and the Sin within | |
Mar 16, 2012 | James Wickett | Adversity: Good for software, good for soul | |
Feb 10, 2012 | Mano ‘dash4rk’ Paul | Threat modeling in the Garden of Eden |