Business

Title Speakers Conference Tags
If You Own A Multi Function Printer (Mfp), Then I Own You Deral Heiland CarolinaCon-7 - Raleigh, USA Security Business
Hacking The Business Capability Stack: Make Corporate Bureaucracy Work For You Javier Sanchez ShmooCon-2011 - Washington DC, USA Security Business
From Risk Awareness To Security Controls: Benefits Of Honeypots To Companies Sergio Nunes OWASP IBWAS-2010 - Portugal Risk Business
Business Logic Attacks – Bats And Blbs Amichai Shulman OWASP AppSec Brasil-2010 - Brazil Security Business
Hacking Sap Businessobjects Joshua Abraham OWASP Appsec-2010 - Washington DC, USA Security Business
Building Bridges: Forcing Hackers And Business To Hug It Out Chris Nickerson , Andrew Hay SOURCE Barcelona-2010 - Barcelona, Spain Security Others Business
10 Things Yore Doing Wrong With Siem Wim Remes SOURCE Barcelona-2010 - Barcelona, Spain Security Infrastructure Others Business
Mitigating Business Risks With Application Security Joe Jarzombek LASCON-2010 - Austin, USA Security Application Security Business
Technology And Business Risk Management: How Application Security Fits In Peter Perfetti LASCON-2010 - Austin, USA Security Application Security Risk Business
Cipherstorm In The World Armin Garcia BugCon-2010 - Mexico Business
Curing Of Sap Http And Web Services Frederik Weidemann OWASP Appsec-2010 - Germany Security Web Others Business Browser
Attacking Sap Users Using Sapsploit Extended Alexander mikhailovich Polyakov HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Business
Can You Trust Your Workers? Examining The Security Of Html5 Web Workers Paul Theriault HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Business
Solving Real-World Problems With An Enterprise Security Api (Esapi) Chris Schmidt OWASP Appsec-2010 - USA Security Others Business
Threat Modeling Best Practices Robert Zigweid OWASP Appsec-2010 - USA Security Analysis Business
Efficiency-Oriented Collaboration Yaniv Altshuler CollSec-2010 - Washington DC, USA Security Infrastructure Business
Can I Access Your Data? Privacy Management In Mhealth Aarathi Prasad , David Kotz HealthSec-2010 - Washington DC, USA Security Privacy Business
Dr. Jekyll Or Mr. Hyde: Information Security In The Ecosystem Of Healthcare Joseph Cooley , W. Smith HealthSec-2010 - Washington DC, USA Security Business
An Anonymous Health Care System Kristin Lauter , Melissa Chase HealthSec-2010 - Washington DC, USA Security Anonymity Business
Sap Backdoors: A Ghost At The Heart Of Your Business Mariano Croce Blackhat USA-2010 - Las Vegas, USA Security Business
Electricity For Free? The Dirty Underbelly Of Scada And Smart Meters Jonathan Pollet Blackhat USA-2010 - Las Vegas, USA Security Business Statistics
Finger Pointing For Fun, Profit And War? Tom Parker Blackhat USA-2010 - Las Vegas, USA Security Analysis Business Forensics
Security Is Not A Four Letter Word Michael L. Davis Blackhat USA-2010 - Las Vegas, USA Security Malware Business
Optimizing It Security Costs By Evolutionary Algorithms Toomas Kirt , Jüri Kivimaa CCDCOE-2010 - Estonia Security Others Business
Effectively Marketing Security As A Win For Both The Business And The Customer Ben Whaley , Jeff Smith OWASP FROC-2010 - Denver, USA Security Business
The Security Implications Of The Ppi Bill: An End User'S Perspective Ritasha Jethva ITWeb Security Summit-2010 - Johannesburg, South Africa Others Privacy Business
The Road Less Travelled: When Security Meets Business Pat Pather ITWeb Security Summit-2010 - Johannesburg, South Africa Security Business
Protecting Customers From Online Threats: The Paypal Perspective Allison Miller ITWeb Security Summit-2010 - Johannesburg, South Africa Security Social Engineering Business
Protecting Your Customers Assests: What Must You Do So That You Will Not Need The Npa Paul Louw ITWeb Security Summit-2010 - Johannesburg, South Africa Security Others Business
Getting Pci Compliant: The Visa Story Bryce Thorrold ITWeb Security Summit-2010 - Johannesburg, South Africa Risk Business
How To Future-Proof Your Compliance Program Kris Budnik ITWeb Security Summit-2010 - Johannesburg, South Africa Business
The Nice Thing About Standards Is That There Are So Many To Choose From Allen Baranov ITWeb Security Summit-2010 - Johannesburg, South Africa Security Business
Why Business Needs To Have Security And It Control Frameworks In Place David Volschenk , Justin Williams ITWeb Security Summit-2010 - Johannesburg, South Africa Security Business
Securely Moving Your Business Into The Cloud Alex Stamos SOURCE Boston-2010 - Boston, USA Security Business Cloud
The Realities Of Starting A Security Company - Part I: The Entrepreneurs Raffael Marty , Philippe Langlois , Eugene Kuznetsov , Rob Cheyne , Jonathan Cran SOURCE Boston-2010 - Boston, USA Security Panel Business
Sap Backdoors: A Ghost At The Heart Of Your Business Mariano Croce Blackhat Europe-2010 - Barcelona, Spain Security Business
Surviving Your Phone: Protecting Mobile Communications With Tor Marco Bonetti Blackhat Europe-2010 - Barcelona, Spain Security Privacy Business Development Browser
Killing The Elephant In The Room - Enterprise Vulnerability Management Tactics Matt J Ruxcon-2010 - Melbourne, Austrailia Security Business
Why Linux Is Bad For Business Wxs CarolinaCon6-2010 - Raleigh, USA Security Unix Business
Scalable Application Assessments In The Enterprise Tom Parker OWASP Appsec-2009 - Washington DC, USA Security Business Development
Employing Pci Compliance Programs As A Springboard For Enterprise Security And Business Enablement Ward Spangenburg SOURCE Boston-2009 - Boston, USA Security Business Compliance
Panel: Tug Of War Between Business And Security Rob Cheyne , Art Papas , Walter Kuketz , Adriel Desautels , Gene Meltser SOURCE Boston-2009 - Boston, USA Security Business
Information Security In Higher Education: Baby Steps Adam Dodge , Kees Leune SOURCE Boston-2009 - Boston, USA Security Others Access Business
Massachusetts Data Breach Laws, Regulations, And Responsibilities Benjamin Jackson SOURCE Boston-2009 - Boston, USA Security Business
Securosis Amit Yoran , Marcus Ranum , Ron Gula , Peter Kuper SOURCE Boston-2009 - Boston, USA Security Business
Splunk Robert Fox SOURCE Boston-2009 - Boston, USA Security Analysis Business Compliance
Are Bad Times Good For Security Professionals? Mark Mcgovern , Peter Guerra , G. Mark Hardy , Bruce Potter ShmooCon-2009 - Washington DC, USA Security Wireless Web Panel Community Risk Business
Stranger In A Strange Land: Reflections On A Linux Guy'S First Year At Microsoft Crispin Cowan ShmooCon-2009 - Washington DC, USA Security Community Business
Digital Security: A Risky Business Ian O. Angell DEF CON-16 - Las Vegas, USA Security Business
Keynote: Complexity In Computer Security: A Risky Business Ian O. Angell Blackhat USA-2008 - Las Vegas, USA Security Business
Hacking The Price Of Food: An Urban Farming Renaissance Bicyclemark The Last HOPE-2008 - USA Security Community Risk Business
How Do I Pwn Thee? Let Me Count The Ways Renderman The Last HOPE-2008 - USA Security Wireless Business
Tapping $$$ Enterprises Pierre Kroma TROOPERS-2008 - Munich, German Business
Keynote: Digital Security: A Risky Business Ian O. Angell Blackhat Europe-2008 - Amsterdam, The Netherlands Security Business
Disruptive Innovation And The Future Of Security Chris Hoff SOURCE Boston-2008 - Boston, USA Security Business
All The Data That'S Fit To Visualize: Raffael Marty SOURCE Boston-2008 - Boston, USA Security Business Compliance
Current And Future Security Issues In Mobile Devices And Networks Frank Rieger SOURCE Boston-2008 - Boston, USA Security Risk Business
Content Awareness – A Cornerstone To Data Protection John Amaral SOURCE Boston-2008 - Boston, USA Security Access Risk Analysis Business
How Do I Pwn Thee? Let Me Count The Ways Renderman ShmooCon-2008 - Washington DC, USA Security Business
Playstation Portable Cracking Tyranid Chaos Communication Congress-24 - Berlin, Germany Security Business
Hacking The Bluetooth Stack For Fun, Fame And Profit Dino Covotsos HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Wireless Access Business Testing
Enterprise Hacking: Who Needs Exploit Codes? Fetri Miftach HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Access Risk Analysis Business Development
Panel:Meet The Vcs Dov Yoran Blackhat USA-2007 - Las Vegas, USA Security Business
Building An Effective Application Security Practice On A Shoestring Budget John Viega Blackhat USA-2007 - Las Vegas, USA Security Business
Voip, Vonage, And Why I Hate Asterisk Eric Smith , Joel Bruno ShmooCon-2007 - Washington DC, USA Security Mail Business
Triple Play; Triple Threat? — Iptv Security Yen Ming Chen HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Business
Pentesting Java/J2Ee - Discovering Remote Holes Marc Schönefeld HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Analysis Business
Selfness-Copyfight: From Censorship To New Business Models Jorge Cortell , Alvaro Gonzalez HOPE Number 6-2006 - USA Security Business
Managing Your Company'S Intellectual Property: An Introduction To It Security Daniel Estrada HOPE Number 6-2006 - USA Security Business
Social Engineering Emmanuel Goldstein HOPE Number 6-2006 - USA Security Business
How To Automatically Sandbox Iis With Zero False Positive And Negative Tzi-cker Chiueh Blackhat Europe-2006 - Amsterdam, The Netherlands Security Infrastructure Monitoring Analysis Business
Corp Vs. Corp Fabio Ghioni , Roberto Preatoni Chaos Communication Congress-22 - Berlin, Germany Security Business
Social Engineering Fundamentals Dave McKayandAnthony Zboralski SyScan-2005 - Singapore Security Business
Attacking Internet Banking Applications Fabrice Marie SyScan-2005 - Singapore Security Privacy Business Development
Building Security Into The Software Life Cycle, A Business Case Marco M. Morana Blackhat USA-2005 - Las Vegas, USA Security Business
How To Unwrap Oracle Pl/Sql Pete Finnigan Blackhat USA-2005 - Las Vegas, USA Security Business
Avoiding The Mis-Management Of Patch Management Bof Tina Bird ShmooCon-2005 - Washington DC, USA Security Business
Physical Security Barry Grundy , Mark Seiden Chaos Communication Congress-21 - Berlin, Germany Security Access Business
Network Firelines Paul Watson SyScan-2004 - Singapore Security Business
Hacking The Grid Greg Newby , Porkchop The Fifth HOPE -2004 - USA Security Business
Hacking With Executives David Mortman Blackhat USA-2004 - Las Vegas, USA Security Risk Business Testing
Internet Security: An Optimist Gropes For Hope William R. Cheswick 12th USENIX Security Symposium-2003 - Washington DC, USA Security Malware Business
Black Hat Bloc Or How I Stopped Worrying About Corporations And Learned To Love The Hacker Class War Gweeds H2K2-2002 - USA Security Media Business
The Other Side Of Information Security Wilco Van Ginkel Blackhat Europe-2001 - Amsterdam, The Netherlands Security Keynote Business
The Business Side Of Starting Your Own Consulting Firm And How They Can Succeed Dennis Salguero DEF CON-09 - Las Vegas, USA Security Business
Napster: A New Beginning Or Beginning Of The End? Anonymous H2K-2000 - USA Security Business
Total Bs Security: Business-Based Systems Security. Jim Litchko Blackhat USA-1999 - Las Vegas, USA Security Business
Security As An Enabler For New Business Opportunities - The Business Value Of Security. Karan Khanna Blackhat USA-1998 - Las Vegas, USA Security Business
Mistakes And Blunders: A Hacker Looks At Cryptography. Bruce Schneier Blackhat USA-1998 - Las Vegas, USA Security Cryptography Business
Convergence -- Every Man (And Woman) A Spy. Richard Thieme Blackhat USA-1998 - Las Vegas, USA Security Business
Building The Business Case For Management For Increased Security. Priest Blackhat USA-1997 - Las Vegas, USA Security Business