Title |
Conference |
Tags |
Code Dependency: Chinese APTs in Software Supply Chain Attacks |
BSides Las Vegas-2022 - Las Vegas, LV |
Ground Floor
|
Mind the Gap - Managing Insecurity in Enterprise IoT |
BSidesWashington-2019 - Washington, USA |
|
Draw a Bigger Circle: InfoSec Evolves |
DerbyConVIIIEvolution-2018 - Louisville, USA |
|
Patching: Show me where it hurts |
DerbyConVIIIEvolution-2018 - Louisville, USA |
|
Don't Bring Me Down: Are You Ready for Weaponized Botnets? |
BSidesLasVegas-2018 - Las Vegas, USA |
|
Firetalk #6: Patching — It’s Complicated |
shmoocon-2018 - washington,usa |
|
REDUCE YOUR ACTIVE DIRECTORY ATTACK SURFACE: SECURING THE FOREST THROUGH THE TREES |
BsidesCa-2017 - toronto,canada |
|
Banking on Insecurity: Why Attackers Can Take the Money and Run |
hackfest-2017 - quebec,canada |
|
It's A Disaster! |
CircleCityCon-2017 - Indianapolis,usa |
|
Blue Team Reboot: Adaptive Proactive Defence Strategy |
hackfest-2016 - quebec,canada |
|
Intro to Storage Security, Looking Past the Server |
BSidesLasVegas-2016 - las vegas,usa |
|
How to Rob a Bank – or The SWIFT and Easy Way to Grow Your Online Savings Account |
BSidesLasVegas-2016 - las vegas,usa |
|
What Lurks in the Shadow: Addressing the Growing Security Risk of Shadow IT & Shadow Data |
BSidesToronto-2015 - Toronto,Canada |
|
What Lurks in the Shadow |
BSidesLasVegas-2015 - Las vegas,usa |
|