Brian Contos [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Panel Discussion: Proving Cyber Security Effectiveness FutureConDenver-2019 - Denver, US
Panel Discussion: Proving Cyber Security Effectiveness FutureConIndianapolis-2019 - Indianapolis, USA
Left of Boom ISSA-2019 - Prior Lake, United States
Hackers, Hooligans, Heists, & History BSidesAtlanta-2019 - Atlanta, USA
Left of Boom TechnoSecurity&DigitalForensics-2019 - San Diego, US
HACKERS, HOOLIGANS, HEISTS, & HISTORY BSidesColumbus-2019 - Columbus, USA
Hackers, Hooligans, Heists, and History BSidesSaltLake-2019 - Salt Lake City, USA
THE INDUSTRIALIZATION OF RED AND BLUE TEAMING SAINTCONUtah-2018 - Provo, USA
You have many security products, probably too many. But you are still not secure because it's nearly impossible to know if your security products are actually doing what you want. Through live network BSidesNashville-2018 - Nashville, USA
Grandmothers, Gangsters, Guerrillas and Governments ISSWAustin-2018 - Austin, USA
Addressing Cybersecurity Challenges With Applied Security Analytics CISOminneapolis-2016 - minneapolis,usa
Addressing Cybersecurity Challenges With Applied Security Analytics CISOhouston-2016 - houston,usa
Addressing Cybersecurity Challenges With Applied Security Analytics CISOatlanta-2016 - atlanta,usa
Addressing Cybersecurity Challenges With Applied Security Analytics CISOnewyork-2016 - ny,usa
Ground Zero Financial Services: The Latest Targeted Attacks from the Darknet BSidesSanFrancisco-2015 - San Francisco,USA
Old Maps No Longer Work – Using Analytics to Evolve Security Strategy CISOMinneapolis-2014 - Minneapolis,USA
Information Warfare & Developing Nations: Cyber Becomes an Equalizer CDANS-2013 - UK, London Security
Exploring Three Modern Attack Vectors: Insiders, Industrialized And Apts OWASP AppSec Brasil-2010 - Brazil Exploitation
Dissecting The Modern Threatscape: Malicious Insiders, Industrialized Hacking, And Advanced Persistent Threats SecTor-2010 - Canada Security