Title |
Conference |
Tags |
Proving Cybersecurity Effectiveness |
FutureConLosAngeles-2020 - Los Angeles, United States |
|
Panel Discussion: Proving Cyber Security Effectiveness |
FutureConMinneapolis-2019 - Minneapolis, USA |
|
Panel Discussion: Proving Cyber Security Effectiveness |
FutureConColumbus-2019 - Columbus, USA |
|
Panel Discussion: Proving Cyber Security Effectiveness |
FutureConDenver-2019 - Denver, US |
|
Panel Discussion: Proving Cyber Security Effectiveness |
FutureConIndianapolis-2019 - Indianapolis, USA |
|
Left of Boom |
ISSA-2019 - Prior Lake, United States |
|
Hackers, Hooligans, Heists, & History |
BSidesAtlanta-2019 - Atlanta, USA |
|
Left of Boom |
TechnoSecurity&DigitalForensics-2019 - San Diego, US |
|
HACKERS, HOOLIGANS, HEISTS, & HISTORY |
BSidesColumbus-2019 - Columbus, USA |
|
Hackers, Hooligans, Heists, and History |
BSidesSaltLake-2019 - Salt Lake City, USA |
|
THE INDUSTRIALIZATION OF RED AND BLUE TEAMING |
SAINTCONUtah-2018 - Provo, USA |
|
You have many security products, probably too many. But you are still not secure because it's nearly impossible to know if your security products are actually doing what you want. Through live network |
BSidesNashville-2018 - Nashville, USA |
|
Grandmothers, Gangsters, Guerrillas and Governments |
ISSWAustin-2018 - Austin, USA |
|
Addressing Cybersecurity Challenges With Applied Security Analytics |
CISOminneapolis-2016 - minneapolis,usa |
|
Addressing Cybersecurity Challenges With Applied Security Analytics |
CISOhouston-2016 - houston,usa |
|
Addressing Cybersecurity Challenges With Applied Security Analytics |
CISOatlanta-2016 - atlanta,usa |
|
Addressing Cybersecurity Challenges With Applied Security Analytics |
CISOnewyork-2016 - ny,usa |
|
Ground Zero Financial Services: The Latest Targeted Attacks from the Darknet |
BSidesSanFrancisco-2015 - San Francisco,USA |
|
Old Maps No Longer Work – Using Analytics to Evolve Security Strategy |
CISOMinneapolis-2014 - Minneapolis,USA |
|
Information Warfare & Developing Nations: Cyber Becomes an Equalizer |
CDANS-2013 - UK, London |
Security
|
Exploring Three Modern Attack Vectors: Insiders, Industrialized And Apts |
OWASP AppSec Brasil-2010 - Brazil |
Exploitation
|
Dissecting The Modern Threatscape: Malicious Insiders, Industrialized Hacking, And Advanced Persistent Threats |
SecTor-2010 - Canada |
Security
|