• Home
  • Solutions
  • Professional Services
  • Presale1 Blog
  • Certification Courses
  • Events
    • Future of Cybersecurity
    • Stop Drowning in Alerts
    • Cyber Events
    • Global Cyber Stars
  • Cyber Video Gallery
  • Mobile Telecom Warfare
  • Training
  • Parenting
  • Presale1 Advisory Board
  • Presale1 Elite Team Jobs
  • Partners
  • Contact Us
  • Win a free iPad!
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Click To Access Presale1 NEW Mini Site!

Signed in as:

filler@godaddy.com

  • Home
  • Solutions
  • Professional Services
  • Presale1 Blog
  • Certification Courses
  • Events
    • Future of Cybersecurity
    • Stop Drowning in Alerts
    • Cyber Events
    • Global Cyber Stars
  • Cyber Video Gallery
  • Mobile Telecom Warfare
  • Training
  • Parenting
  • Presale1 Advisory Board
  • Presale1 Elite Team Jobs
  • Partners
  • Contact Us
  • Win a free iPad!

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

Presale1 Cyber Video Gallery

Contact us to find out more

Presale1 Cyber Video Gallery

 The 9.9.24 BlackHat Hackers online event, sponsored by Presale1️⃣ and hosted by Google, was a massive success!

Over 3,000 participants from 120+ countries and 2,800+ leading companies registered this event!

We're thrilled to share the recording of the event, packed with insights from top industry experts

How phishing scammers manipulate your amygdala and oxytocin

How phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreet

Presale1 Cyberevent
The Future Of Cybersecurity

Presale1 cyber video gallery cyber security video

TED TALK Hackers: the internet's immune system | Keren Elazari 3.89 MILLION VIEWS

Remotely Control Any PCs with this FREE software!

 Loi Liang Yang

Keren Elazari, Cybersecurity Speaker, The Age of Cyber Warfare

 Keren Elazari’s Speaking & Research Topics:  The Future of Cyber Security: trends, predictions and strategies to build resilience  Hackers – the immune system of the internet  Exponential security, automated adversaries and rise of AI in Cyber Security  Hackers Inc.: Learning to think like hackers with innovation and creativity   Women in Tech, Female Hackers, Diversity in Tech/ Cyber security  Hack the human: biohacking & the bleeding edge of innovation CyberPunk and global Hacktivism 

Keren Elazari Keynote Speaker - The Hacker Mindset

Keren Elazari

Keren Elazari & David Spark: Israeli Cybersecurity Start Young. We complain in the US about the lack of cybersecurity talent, but that’s not in short supply in Tel Aviv as they are training and pumping out cybersecurity professionals at a very young age. Not only that

Keren Elazari & David Spark

Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? - Keren Elazari

Keren Elazari

DataStax Accelerate - Closing Keynote with Keren Elazari

Keren Elazari

WiFi Password Cracking in 6 Minutes and 4 Seconds

 Loi Liang Yang

Pro Hacker teaches you how to bypass this!

Loi Liang Yang

Best practices for mobile security

Zuk Avraham 

$70,000 Bug-Hackers Bypass Google Pixel Lock Screen Pattern & Password

PROTECT YOUR PASSWORD NOW!

 Loi Liang Yang

Capabilities of Hackers, Tools Hackers use, and 5 Things You Can Do To Protect Yourself

Ryan Montgomery

What Makes Israel So Good at Hacking?

#1 Ethical Hacker in The World Demonstrates All You Need To Know

#1 Ethical Hacker in The World Demonstrates All You Need To Know - Join Us Watching some Best-Of-Breed Short Videos from Ryan Montgomery

Mr. Ryan Montgomery 

World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote The World's Most Famous Hacker Kevin Mitnick & KnowBe4 CEO Stu Sjouwerman Deliver the Cyber Investing Summit 2017 Opening Keynote Presentation

Kevin Mitnick

Cybersecurity Expert Demonstrates How Hackers Easily Gain Access To Sensitive Information Cybersecurity expert Kevin Mitnick demonstrates how today’s “crackers”, “gearheads” and “cyberpunks” illegally access sensitive information from everyday people using modified gear and social engineering.

Kevin Mitnick

Here's how hackers can get around 2-factor authentication One of the best ways to safeguard your accounts is by using something called two-factor authentication. But even that is not perfect. Kevin Mitnick, hacker and author of the book "The Art of Invisibility," explains how someone might use social engineering to get your security code and gain access to your private information.

Kevin Mitnick

Kevin Mitnick: How to Troll the FBI | Big Think

Kevin Mitnick

How Easy It Is To Crack Your Password, With Kevin Mitnick

Kevin Mitnick

Breaking into a Bank - Kevin Mitnick demonstrates the Access Card Attack

Kevin Mitnick

Kevin Mitnick - A Hacker's Story A documentary on the life of Kevin Mitnick, the world's most famous hacker.

Kevin Mitnick

How hackers hack any website in 9 minutes?!

Loi Liang Yang

#1 Ethical Hacker in The World Explains The Dark Web

Ryan Montgomery

Ted Talk: French Cyber-Harassment champion | Ted Talk: French Cyber-Harassment champion | Marion Seclin | TEDx | TEDx

Marion Seclin

Ted Talk: "All Your Devices Can Be Hacked" - Dr. Avi Rubin

Dr. Avi Rubin

My Adventures as the World's Most Wanted Hacker | Kevin Mitnick | Talks at Google

 Kevin Mitnick visits Google's NYC office to discuss his book "Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" with Eran Feigenbaum, Google's Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series.  Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.  Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.   Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

 

C'est une pirate qui nous veut du bien ! Dans son "Focus", Xavier Terrade dresse le portrait de Keren Elazari, une chercheuse israélienne qui cultive la fibre de la cybersécurité depuis ses 14 ans. Pourquoi le dirigeant d'entreprise a tout intérêt à développer son intelligence émotionnelle ? Dorith Naon en dit plus dans son "Idée derrière la tech".

Keren Elazari

BlackHat Video: Intermediate Physical Security By Justin Wynn

Justin Wynn

CYBERWARCON 2021 - Unmasking UNC1151, the Ghost Behind Ghostwriter

 Presentation by Ben Read and Gabriella Roncone, Mandiant

Going All-in on a Career in Security - Mauro Israel - CSP 8

 Mauro Israel, CISO at ORPEA Group, discusses his colorful background and how he - like so many others in the security field - came to discover his true calling late in life but was able to apply his wide range of knowledge and experience to the role of CISO in the healthcare field. 

virus.pdf

Loi Liang Yang 

NMAP Tutorial for Beginners! Network Attacks

Loi Liang Yang 

Pro Hacker Demonstrates hacking other devices in Free Public Wi-Fis

Loi Liang Yang 

How hackers bypass login pages!

  Loi Liang Yang

Cross Site Scripting (XSS) tutorial for Beginners

  Loi Liang Yang

DEF CON 22 - Empowering Hackers to Create a Positive Impact

 Keren Elazari

Bug Bounty Law with Dr. Amit Elazari Bar On CypherCon

Dr. Amit Elazari

KEYNOTE 2 The State Of Mobile Security Zuk Avraham

Zuk Avraham Hack in the Box - 2021 - Amsterdam Hacking conference 

Presale1 Group Blog

Visit Presale1 Group Blog

Click To Join Presale1 On LinkedIn

We love our customers, so feel free to visit and contact us 24X7

Message us on WhatsApp please

Chaim Levanon Street 67, Tel Aviv-Yafo, Israel

info@presale1.com

Linkedin Presale1

Cybereason: This is XDR

SentinelOne Singularity XDR - Welcome to the Age of One

Nowhere to Hide: 2022 CrowdStrike Falcon OverWatch Threat Hunting Report

XM Cyber: Breach and Attack Simulation Demo Video

CYFOX autonomous XDR Solution Brute Force Attack Detection Product Demo Video

Powering the most secure and available digital experiences - A10 Networks

BeyondTrust: Privileged Access Management Platform (PAM)

3 Ways to Block DDoS Attacks

Netskope: Hybrid Work is here to stay

BeyondTrust: Privileged Remote Access - Overview

ZecOps Mobile EDR

ZecOps: Pre & Post Travel inspection

Harmony Purple all in one vulnerabilities management solution

Orchestra Harmony IoT

Harmony IoT for Healthcare

Panorays Product Video

Contact Us For More Info

Drop us a line! feel free to visit and contact us 24X7

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Better yet, see us in person!

Message us on WhatsApp please

Presale1

67 Chaim Levanon St. Tel Aviv Israel

info@presale1.com

Presale1 Cyber Video Gallery

Get 10% off your first purchase when you sign up for our newsletter!

Connect With Us

Copyright © 2008-2025 Presale1 - All Your Computer Security Needs In 1 - All Rights Reserved

  • Home
  • Solutions
  • Professional Services
  • Presale1 Blog
  • Certification Courses
  • Future of Cybersecurity
  • Cyber Video Gallery
  • Mobile Telecom Warfare
  • Training
  • Parenting
  • Presale1 Advisory Board
  • Presale1 Elite Team Jobs
  • Partners
  • Contact Us
  • Win a free iPad!
  • Privacy-Policy

Powered by

This website uses cookies

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data. 

Accept

The Future of Cybersecurity: A Collaborative Approach

Tue, Sep 9 , 2025  Online Event 1300 RSVP

Google Google Cloud Security Mandiant (part of Google Cloud) ISC2, Social-Engineer, LLC, ARTEMYS, XCITIUM, Presale1️⃣ BIOOOS, Captain Hyperscaler, Salutes Space, BluEnable, Splunk FireEye, Inc. and more

🟢Register NOW