Allison Miller [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Winning Defense sector-2017 - toronto,canada
Keynote cactuscon-2017 - arizonia,usa
Something Wicked: Defensible Social Architecture in the context of Big Data, Behavioral Econ, Bot Hives, and Bad Actors bsideslasvegas-2017 - las vegas,usa
Defending Debit: A Historical Study of the Indirect Effects of the Durbin Amendment on Investment in Debit Card Security WEIS-2014 - Pennsylvania,USA
Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking SourceBoston-2014 - boston,usa
Data Whales and Troll Tears: Beat the Odds in InfoSec Shmoocon-2014 - Washington,USA
Operating * By the Numbers baythreat-2013 - California,USA
Opening Keynote: "Operating * by the Numbers" SIRAcon-2013 - Seattle,Washington
Operating * By the Numbers. NordicSecCon-2013 - Reykjavik, Iceland
Games We Play: Payoffs & Chaos Monkeys SourceBoston-2013 - Boston,USA
Games We Play: Payoffs & Chaos Monkeys SOURCEDublin-2013 - Dublin,Ireland
Games We Play: Defenses and Disincentives BayThreat-2012 - Sunnyvale,USA Security
A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses BruCON-2012 - Ghent, Belgium Security
A Million Mousetraps: Using Big Data and Little Loops to Build Better Defenses Baythreat-2011 - San Francisco, USA Security
Applied Threat Modeling SOURCE Barcelona-2010 - Barcelona, Spain Security Others
Ushering In The Post-Grc World: Applied Threat Modeling Blackhat USA-2010 - Las Vegas, USA Security Risk
Protecting Customers From Online Threats: The Paypal Perspective ITWeb Security Summit-2010 - Johannesburg, South Africa Security Social Engineering Business
Protecting Customers From Online Threats SOURCE Boston-2010 - Boston, USA Security Web Privacy