Greg Conti [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Playbooks for the Collective Defense of Nations, Cities, and Critical Infrastructure Sectors in Cyberspace SecureIowaConference-2019 - Ankeny, USA
What Would You Do With a Nation-State Cyber Army? enigma-2018 - santa clara,usa
Closing Plenary: Information Security Programs in Academia Shmoocon-2016 - washington,usa
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement Shmoocon-2016 - washington,usa
PEN TESTING A CITY BlackhatUS-2015 - Las vegas,usa
The Library of Sparta: Applying Military Doctrine to Cybersecurity RSAus-2015 - San Francisco,USA
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine Shmoocon-2015 - washington,usa
Panel 3: Research and Education Frontiers in Cybersecurity NYITCybersecurity-2014 - manhattan,usa
THE LIBRARY OF SPARTA BlackHatUS-2014 - las vegas,usa
Teaching Electronic Privacy and Civil Liberties to Government HOPE-2014 - New York,USA
Towards a Cyber Common Operating Picture CyCON-2013 - Tallinn, Estonia
A Framework for Control Measures to Limit Collateral Damage and Propagation of Malicious Software CyCON-2013 - Tallinn, Estonia
Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement DEF CON-20 - Las Vegas, USA
Countermeasures: Proactive Self Defense Against Ubiquitous Surveillance HOPE-9 - New York
Lessons of the Kobayashi Maru: Cheating is Fundamental ShmooCon-2012 - Washington DC, USA
The Art and Science of Security Research Defcon19-2011 - Las Vegas,USA
Our Instrumented Lives: Sensors, Sensors, Everywhere... DEF CON-18 - Las Vegas, USA Security
Voyage Of The Reverser: A Visual Study Of Binary Species Blackhat USA-2010 - Las Vegas, USA Security Others Forensics
Toward Instrumenting Network Warfare Competitions To Generate Labeled Datasets 2nd Workshop on Cyber Security Experimentation and Test -2009 - Montreal, Canada Security
Automated Mapping Of Large Binary Objects ShmooCon-2009 - Washington DC, USA Security
Could Googling Take Down A President, A Prime Minister, Or An Average Citizen? DEF CON-16 - Las Vegas, USA Security
Visual Forensic Analysis And Reverse Engineering Of Binary Data Blackhat USA-2008 - Las Vegas, USA Security Analysis
Evil Interfaces: Violating The User The Last HOPE-2008 - USA Security Web
Satellite Imagery Analysis DEF CON-15 - Las Vegas, USA Security Analysis
Googling: I'M Feeling (Un)Lucky DEF CON-14 - Las Vegas, USA Security
Malware Cinema: A Picture Is Worth A Thousand Packets Blackhat Europe-2006 - Amsterdam, The Netherlands Security Malware
Countering Denial Of Information Attacks DEF CON-13 - Las Vegas, USA Security
Beyond Ethereal: Crafting A Tivo For Security Datastreams Blackhat USA-2005 - Las Vegas, USA Security Analysis
Beyond Ethereal: Crafting A Tivo for Security Datastreams BlackHatUSA-2005 - Las Vegas,USA
Network Attack Visualization DEF CON-12 - Las Vegas, USA Security
Interface Design Of Hacking Tools DEF CON-11 - Las Vegas, USA Security