Title |
Conference |
Tags |
Threat Modeling 2019 |
SecureWorldSeattle-2019 - Seattle, USA |
|
Keynote: A seat at the table |
DevSecConBoston-2018 - Boston, USA |
|
Threat Modeling in 2018: Attacks, Impacts and Other Updates |
blackhatUSA2018-2018 - Las Vegas, USA |
|
That was close! Learning from our near-misses |
BSidesVancouver-2018 - Vancouver, Canada |
|
Threat Modeling Panel |
owaspapseccalifornia-2018 - california,usa |
|
“Security Leadership Lessons from the Dark Side” |
sourceseattle-2017 - seattle,usa |
|
Threat Modeling Lessons from Star Wars |
ASISinternational-2014 - atlanta,USA |
|
Keynote |
BruCon-2014 - brussels,belgium |
|
Bsides Breaking Ground: Opening Keynote |
passwordscon-2014 - las vegas,usa |
|
Identifying the 'Root' Causes of Propagation in Submitted Incident ReportsReturn to TOC |
FIRST-2014 - Boston,USA |
|
New Foundations for Threat Modeling |
RSACon-2014 - San Francisco, USA |
|
Should a National Cyber Safety Board Be Created to Help Report on Breaches? |
RSACon-2014 - San Francisco, USA |
|
Threat Modeling: A New Hope |
BSidesSF-2014 - San Francisco,USA |
|
Security Lessons From Star Wars |
SourceSeattle-2012 - Seattle, USA |
Security
|
CONTROL-ALT-HACK(TM): WHITE HAT HACKING FOR FUN AND PROFIT (A COMPUTER SECURITY CARD GAME) |
BlackHat USA-2012 - Las Vegas, USA |
Security Games
|
SMASHING THE FUTURE FOR FUN AND PROFIT |
BlackHat USA-2012 - Las Vegas, USA |
|
This Technological Terror |
AusCERT-2012 - Gold Coast, Austrailia |
Security
|
Elevation Of Privilege: The Easy Way To Threat Model |
Blackhat USA-2010 - Las Vegas, USA |
Security
|
The Crisis In Information Security |
SOURCE Boston-2009 - Boston, USA |
Security
|
Counterpoint: Threat Modeling @Microsoft
|
BlueHat-2008 - Redmond, USA |
Security
|
Sdl Threat Modeling
|
LayerOne-2008 - Anaheim, USA |
Security
|
Security Breaches Are Good For You |
ShmooCon-2007 - Washington DC, USA |
Security
Legal
|
The Future of Personal Information |
BlackHatUSA-2005 - Las Vegas,USA |
|
Anonymous blogging |
REcon-2005 - Montreal,Canada |
|
Evidence-Based Security Assessment Bof |
ShmooCon-2005 - Washington DC, USA |
Forensics
|
Will People Ever Pay For Privacy? |
Blackhat Europe-2003 - Amsterdam, The Netherlands |
Security
Privacy
Cryptography
|
Towards A Taxonomy Of Network Security Testing Techniques. |
Blackhat USA-1999 - Las Vegas, USA |
Security
Testing
|
Code Reviews: Making Them Worthwhile |
Blackhat USA-1997 - Las Vegas, USA |
Security
|