SOURCE Barcelona 2010 Nov. 3, 2010 to Nov. 4, 2010, Barcelona, Spain

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Keynote Adam ( Major Malfunction ) Laurie Keynote
Revolution Or Evolution: Information Security 2020 William BEER This presentation will be based on a report commissioned by the UK Government's Technology Strategy ... Security Others
Applied Threat Modeling Allison Miller Threat modeling as a practice was developed to improve design and implementation of system risk ... Security Others
Security Sucks Chris Brown Security sucks. Ask the CISOs and security managers within government agencies and banks that have ... Security Others
Implementing A Csirt Brian Honan After spending 4 years trying to convince the Irish Government to establish a national Computer ... Security Others Community
Erp Security: Myths, Problems, Solutions Alexander mikhailovich Polyakov Business applications like ERP, CRM, SRM and others are one of the major topics within ... Security Others
Security In The Sdlc: It Doesn'T Have To Be Painful! Matt Bartoldus Why do organizations fail so miserably at Application Security? Even after investing millions into Information ... Security Others Deep Knowledge
Passwords In Corporate Networks Carric Dooley , Simon Roses Femerling Passwords are the oldest and most common security mechanism for computer systems and still many ... Security Others Firewall Exploitation
Jackpotting Automated Teller Machines Barnaby Jack I've always liked the scene in Terminator 2 where John Connor walks up to an ... Security Others Hardware Reverse Engineering Hardware General
Security In Agile Plc - Practical Navigational Aid For Speed Boats Vishal Asthana The conventional software development lifecycle is like a ship where development requirements once agreed upon ... Security Others
Building Bridges: Forcing Hackers And Business To Hug It Out Chris Nickerson , Andrew Hay Hackers and business decision makers rarely see eye-to-eye. There has historically been a great chasm ... Security Others Business
Balancing The Pwn Trade Deficit Val Smith China has become a major player in the security community in recent years.From numerous news ... Security Community Analysis
10 Things Yore Doing Wrong With Siem Wim Remes As a consumer of information security products you have probably acquired one SIEM product or ... Security Infrastructure Others Business
If Black Hats Always Win, Why Is Albert Gonzalez In Prison? Bruno Oliveira , Jibran Ilyas The severity and impact of the attacks have made many big companies to acquire the ... Security Others Community
Nonymity, Privacy, And Circumvention With Tor In The Real World Sebastian Hahn The Tor network is the largest and well known anonymity network ever deployed.How does it ... Security Anonymity Privacy
Cyber[Crime|War] - Connecting The Dots Iftach Ian Amit CyberWar has been a controversial topic in the past few years. Some say the the ... Security Cyberwar
Leveraging Social Networking While Mitigating Risk Nick Copeland Historically, risk management decisions may have supported preventing the use of social media historically, and ... Security Social Media
Carders.Cc, The Rise And Fall Of An Underground Forum Vicente Diaz , David Barroso Security Others Deep Knowledge