SourceDublin 2015 Sept. 7, 2015 to Sept. 8, 2015, Dublin,Ireland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Aqua Vitae: The Water of Life | Martin Mckeay | Whiskey is just like security. This statement might be a slight bit of hyperbole, but ... | |
Lessons from the Dojo: The Karate of Software Security | Paco Hope | We can both learn and teach software security the way we learn and teach martial ... | |
Supplier Security Risk Assessment - A Practical Guide | Marian Ventuneac | The success of a business is often linked to identifying reliable and cost-effective services suppliers. ... | |
It isn't all foggy in the Cloud! Digital Forensic Investigations in the Cloud | Neha Thethi | There is a considerable amount of research being conducted in the area of cloud forensics. ... | |
OWASP Security Knowledge Framework | Glenn Ten Cate | The OWASP Security Knowledge Framework is intended to be a tool that is used as ... | |
Fun with Exploiting XML External Entity Expansion | Georg Chalupar | In some cases, XXE (XML External Entity) processing vulnerabilities allow to get directory listings and ... | |
Secure software, start appreciating your developers! | Martin Knobloch | Over the years, I have been visiting quite some security conferences and got more and ... | |
Chasing Uniqueness, Understanding Normal | Neil King | A presentation that looks at why understanding what is normal for your business helps you ... | |
3rd Party Applications – A Supply Chain Security Nightmare | Matt Bartoldus | This talk discusses why the need for both technical and process related assurance activities when ... | |
The Flaws in the Onion: What does Context-Aware Next-Next Generation Security Look Like? | Gary Newe | The perimeter has moved to the end device and our current way of protecting the ... | |
Fast & Secure Application Development - Is it possible to have both? | Fabio Cerullo | The success of a business is often linked to identifying reliable and cost-effective services suppliers. ... | |
No one is coming to save us. We are all the Cavalry | Claus Cramon Houmann | All systems fail; there is no system without flaw. Each connection and dependency exposes the ... | |
8 Pragmatic Steps to Supply Chain Risk Management | Richard Hollis | Did you know that over 75% of data breaches are associated with a trusted 3rd ... | |
Creating REAL Threat Intelligence ... with Evernote | Salvador Grec | In the presentation that threat intel vendors do not want you to see, threat data ... | |
Security research should help not hurt | Claus Haumann | The hack.lu motto of 2014 was: “Within a few months of its availability, new technology ... | |
Hacking the Machine: From the Outside In | Owen Pendlebury | This talk will discuss the common pitfalls/security misconfigurations made when deploying physical devices (laptops, tablets ... | |
Dance Band on the Titanic: The Data Loss Iceberg Principle | Richard Hollis | What if everything we’re doing to secure our data is for naught? Have you stopped ... | |
Fifty Shades of Malicious Macros | Gianni Gnesa | In recent years, malicious documents have been used extensively to break into companies and organizations ... | |
Security Analytics: Why Mathematics Alone is Not Enough | Matthew Hathaway | The security industry always has new buzzwords that are quickly adopted by vendors hoping to ... | |
Keeping secrets: protecting privacy in mental health | David O'callaghan | Your state of mind is private. You should be in control of what you reveal ... |