Risk

Title Speakers Conference Tags
Towards a Modern Approach to Risk Management Alex Hutton RVAsec-2013 - Richmond,USA Risk Defence
CyberV@R: A Model to Compute Dollar Value at Risk of Loss to Cyber Attack James Ulrich FloCon-2013 - Albuquerque, USA Risk Quantitative Methods
Do Personality Traits Increase The Likelihood That You Will Hack? Thomas Holt (professorfarnsworth) CarolinaCon-7 - Raleigh, USA Security Risk
Surviving A Teleporter Accident Jack Daniel Berlinsides-2010 - Berlin, Germany Security Risk
From Risk Awareness To Security Controls: Benefits Of Honeypots To Companies Sergio Nunes OWASP IBWAS-2010 - Portugal Risk Business
Hacking Sap Businessobjects Will Vandevanter , Joshua Abraham OWASP BASC-2010 - Boston, USA Security Application Security Exploitation Risk
Responsibility For The Harm And Risk Of Software Security Flaws Cassio Goldschmidt OWASP AppSec Brasil-2010 - Brazil Security Risk
Protecting Federal Government From Web 2.0 Application Security Risks Anonymous Speaker OWASP Appsec-2010 - Washington DC, USA Security Web Risk Web Security Social Media
Security Risk And The Software Supply Chain Karen Mercedes Goertzel OWASP Appsec-2010 - Washington DC, USA Security Others Risk
Phishing To Fraud: The Business Side Of Phishing Lee Heath Security B-Sides DFW-2010 - USA Security Social Engineering Risk
An Introduction To Information Security Risk Analysis Patrick Florer Security B-Sides DFW-2010 - USA Security Risk Analysis
Threats And Countermeasures - Human Factor And Physical Security Jim Broome House Con-2010 - USA Exploitation Social Engineering Risk
How I Met Your Girlfriend Samy Kamkar LASCON-2010 - Austin, USA Mobile Security Web Firewall Privacy Risk
Security Religions And Risk Windows Erik Pace Birkholz LASCON-2010 - Austin, USA Security Risk
Technology And Business Risk Management: How Application Security Fits In Peter Perfetti LASCON-2010 - Austin, USA Security Application Security Risk Business
Protecting Network Services Using Kernel Modules And Iptables Mark Schejtman BugCon-2010 - Mexico Security Infrastructure Risk Network Penetration
Breaking Virtualization By Any Means Jonathan ( Endrazine ) Brossard HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Fuzzing Risk Auditing
Micro Control Don Bailey HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Wireless Risk
Fig Leaf Security Haroon Meer ZaCon-2 - Johannesburg, South Africa Security Others Deep Knowledge Risk
You Spent All That Money And You Still Got Owned... Joseph Mccray BruCON-2010 - Brussels, Belgium Security Risk Reverse Engineering Network Penetration
The European Commissions Strategy For Dealing With The Cyber Threat Andrea Servida CyberSec -2010 - Brussels, Belgium Security Risk Intrusion Prevention Cyberwar
The Strategy And Action Plan For Information Assurance And Cyber Security In Sweden Per Oscarson CyberSec -2010 - Brussels, Belgium Security Web Intrusion Detection Risk Intrusion Prevention Cyberwar
Technology And Business Risk Management: How Application Security Fits In! Peter Perfetti OWASP Dublin-2010 - Ireland Security Application Security Risk
Panel:Dns Systemic Vulnerabilities And Risk Management: A Discussionwith The Experts Rod Beckstrom , Paul Mockapetris , Ken Silva , Mark Weatherford DEF CON-18 - Las Vegas, USA Security Risk
Ushering In The Post-Grc World: Applied Threat Modeling Alex Hutton , Allison Miller Blackhat USA-2010 - Las Vegas, USA Security Risk
The Ten Most Important Risks In Web Applications 2010 Cerullo OWASP Argentina-2010 - Argentina Web Risk
Deconstructing Coldfusion Chris Eng OWASP Appsec-2010 - Stocholm, Sweden Security Others Deep Knowledge Exploitation Risk
Kim Jong-Il And Me: How To Build A Cyber Army To Attack The U.S. Charlie Miller CCDCOE-2010 - Estonia Security Exploitation Risk Media Law Enforcement Application Security Cyberwar
“Abusing Network Protocols” Fotis Hantzis AthCon-2010 - Athens, Greece Security Others Risk Network Penetration
“Gone Rogue: An Analysis Of The Rogue Security Software Landscape” Corrado Leita AthCon-2010 - Athens, Greece Security Others Application Security Risk
Getting Pci Compliant: The Visa Story Bryce Thorrold ITWeb Security Summit-2010 - Johannesburg, South Africa Risk Business
Threat Modelling Workshop Dominic White ITWeb Security Summit-2010 - Johannesburg, South Africa Security Risk
Why In-The-Cloud Security Technologies Are The Answer Rik Ferguson ITWeb Security Summit-2010 - Johannesburg, South Africa Security Risk
Blackberry Mobile Spyware - The Monkey Steals The Berries (Part Deux) Tyler ( Txs ) Shields SOURCE Boston-2010 - Boston, USA Security Web Others Risk
Why Blackhats Always Win Val Chris SOURCE Boston-2010 - Boston, USA Security Risk Testing
How To Operationally Detect And Break Misuse Of Weak Stream Ciphers (And Even Block Ciphers Sometimes) - Application To The Office Encryption Cryptanalysis Eric Filiol Blackhat Europe-2010 - Barcelona, Spain Security Risk
Getting More Out Of App Vuln Scan Results Dan Dan cornell Security B-Sides Austin-2010 - Austin, USA Others Firewall Access Control Access Exploitation Risk
The Big Picture: Web Risks And Assessments Beyond Scanning Matthew Fisher OWASP Appsec-2009 - Washington DC, USA Web Risk
Building An In-House Application Security Assessment Team Keith Turpin OWASP Appsec-2009 - Washington DC, USA Risk
Promoting Application Security Within Federal Government Sarbari Gupta OWASP Appsec-2009 - Washington DC, USA Security Risk Compliance
Having Fun With Atms & Hsms Dimitrios Petropoulos HITBSecConf Malaysia-2009 - Kuala Lampur, Malaysia Security Risk Compliance
Transition To Ipv6 On The Internet: Threats And Mitigation Techniques Eric Vyncke BruCON-2009 - Brussels, Belgium IPv6 Risk
A New Web Attack Vector: Script Fragmentation Stephan Chenette BruCON-2009 - Brussels, Belgium Web Exploitation Risk
A Black Hat Vulnerability Risk Assessment David Mortman Blackhat USA-2009 - Las Vegas, USA Security Risk
400 Apps In 40 Days Sahba Kazerooni SOURCE Boston-2009 - Boston, USA Security Risk Analysis
Are Bad Times Good For Security Professionals? Mark Mcgovern , Peter Guerra , G. Mark Hardy , Bruce Potter ShmooCon-2009 - Washington DC, USA Security Wireless Web Panel Community Risk Business
Death Star Threat Modeling Kevin Williams The Last HOPE-2008 - USA Security Risk Development
Escaping High Security Handcuffs Ray Davidson The Last HOPE-2008 - USA Security Risk
Hacking The Price Of Food: An Urban Farming Renaissance Bicyclemark The Last HOPE-2008 - USA Security Community Risk Business
Current And Future Security Issues In Mobile Devices And Networks Frank Rieger SOURCE Boston-2008 - Boston, USA Security Risk Business
Content Awareness – A Cornerstone To Data Protection John Amaral SOURCE Boston-2008 - Boston, USA Security Access Risk Analysis Business
Detailed Thread Modeling Threat Modeling Is Quickly Becoming A Popular Technique Used To Assess The Security Posture Of An Application'S Architectural Components. But Is There A Way To Perform Such An Krishna Raja , Nish Bhalla SOURCE Boston-2008 - Boston, USA Security Risk Development
Detailed Thread Modeling Threat Modeling Krishna Raja , Nish Bhalla SOURCE Boston-2008 - Boston, USA Security Risk Development Botnets
Why Are Databases So Hard To Secure Sheeri Kritzer Cabral ShmooCon-2008 - Washington DC, USA Security Risk
Forced Internet Condom Aaron Fuentes ShmooCon-2008 - Washington DC, USA Security Risk
New Countermeasures To The Bump Key Attack Deviant Ollam ShmooCon-2008 - Washington DC, USA Security Others Risk
Enterprise Hacking: Who Needs Exploit Codes? Fetri Miftach HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Access Risk Analysis Business Development
Computer Security In A Large Enterprise Jerry Brady , Morgan Stanley 16th USENIX Security Symposium-2007 - Boston, USA Security Risk
Securing The Tor Network Mike Perry Blackhat USA-2007 - Las Vegas, USA Security Wireless Anonymity Privacy Risk
Keynote:The Psychology Of Security Bruce Schneier Blackhat USA-2007 - Las Vegas, USA Security Risk
Security Engineering In Windows Vista Ian Hellen HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Infrastructure Community Risk Analysis
X.805 Standard Ching Tim Meng HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Wireless Firewall Risk
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
Complete Hard Disk Encryption With Freebsd Marc Schiesser Chaos Communication Congress-22 - Berlin, Germany Security Access Risk
Inequality And Risk Paul Graham DEF CON-13 - Las Vegas, USA Security Risk
The Statue Of Liberty: Utilizing Active Honeypots For Hosting Potentially Malicious Events Philip Trainor Blackhat USA-2005 - Las Vegas, USA Security Access Risk
U.S National Security, Individual And Corporate Information Security, And Information Security Providers C. Forrest Morgan Blackhat USA-2005 - Las Vegas, USA Security Risk Legal
Risk Analysis/Mitigation/Management Stuart Thomas CarolinaCon-1 - Raleigh, USA Security Risk
Quantitative Risk Assessments - Possible Or Crack Dream? Bof Toby Kohlenberg ShmooCon-2005 - Washington DC, USA Security Risk
Metrics, Economics, And Shared Risk At The National Scale (Pdf) Dan Geer 13th USENIX Security Symposium-2004 - San Diego, USA Security Risk
Bluesnarfing—The Risk From Digital Pickpockets Adam ( Major Malfunction ) Laurie , Martin Herfurt DEF CON-12 - Las Vegas, USA Security Risk
Hardware Bus Security In Embedded Systems Dan Matthews The Fifth HOPE -2004 - USA Security Access Risk
Bluesnarfing - The Risk From Digital Pickpockets Martin Herfurt Blackhat USA-2004 - Las Vegas, USA Security Risk
Hacking With Executives David Mortman Blackhat USA-2004 - Las Vegas, USA Security Risk Business Testing
The Laws Of Vulnerabilities For Internal Networks Gerhard Eschelbeck Blackhat USA-2004 - Las Vegas, USA Security Risk
The Argument Against Security Through Obscurity For The Non-Digital World Greg Newby H2K2-2002 - USA Security Risk Analysis
Loaning Your Soul To The Devil: Influencing Policy Without Selling Out Matt Blaze 10th USENIX Security Symposium-2001 - Washington DC, USA Security Risk
Trusted Operating System Technology In Web-Based Computing. Paul Mcnabb Blackhat USA-1998 - Las Vegas, USA Security Risk