Roger A. Grimes [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
12 ways hackers can and do get around your favorite MFA solution. FutureConKansasCity-2020 - Virtual, Virtual
KEYNOTE: Quantum reckoning: The coming day when quantum computers break cryptography WebSecuritySummit-2020 - Virtual, Virtual
What You're Doing Wrong With Your Defense and How to Fix BSidesColumbus-2020 - Virtual, virtual
Creating Your Best Data-Driven Defense AfricaCyberSecurityCultureConference-2020 - Virtual, Virtual
Quantum Day of Reckoning SecureIowaConference-2019 - Ankeny, USA
Day When Quantum Computers Breaks Crypto BSidesTampa-2019 - Tampa, USA
How least privilege models, like UAC and su, will not defeat malware AUScert-2008 - Gold Coast, Australia