Rohyt Belani [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
PANEL 3: Corporate Espionage and Insider Threat – Monitoring Outlier Behavior that Indicates Malicious Intent CyberSummitUSAboston-2015 - boston,usa
PANEL 3: Corporate Espionage and Insider Threat – Monitoring Outlier Behavior that Indicates Malicious Intent CyberSummitUSA-2015 - New york,usa
Employees – Are They Weak Links or Security Assets? CISOPhiladelphia-2015 - Philadelphia,USA
Disrupt Incident Response with Human Intelligence Secure360-2015 - Saint Paul,USA
Disrupting Incident Response – Shrinking Attack Detection Time from Weeks to Seconds CISOGlobalSummit-2014 - New York,usa
Humans – The Weakest Link or Your Greatest Security Asset? CISOSeattle-2014 - Seattle,USA
Mitigating APT with Human Sensors Secure360-2014 - Saint Paul,USA
Humans – The Weakest Link or Your Greatest Security Asset? CISONewYork-2014 - New York,USA
SCADA Protection: Imminent Phishing Attacks and The U.S. Cyber Strategy BSidesSanFrancisco-2013 - SanFrancisco,USA
Spear Phishing: The truth behind Night Dragon, Aurora, and APT Central Ohio InfoSec Summit-2012 - Columbus, USA Security
Dissecting APT, Night Dragon, and Aurora Security B-Sides London-2012 - London, UK Security
Spear Phishing : A report from the trenches HackerHalted-2009 - Atlanta,USA
Bad Cocktail: Spear Phishing + Application Hacks OWASP FROC-2009 - Denver, USA Security
The Evolution Of Phishing To Organized Crime SecTor-2007 - Canada Security
Smoke 'em Out! BlackHatDC-2007 - Washington,USA
Smashing The Stack For Profit - Period HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless
Web Application Incident Response & Forensics: A Whole New Ball Game! BlackhatUSA-2006 - Las Vegas,USA