N/a [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Kenneth Schmutz CyberConIV-2019 - Des Moines, USA
Keynote Simulcast BSidesKnoxville-2019 - Knoxville, USA
Network Detection Response SecureCISO-2019 - Houston, United States
Regaining the Advantage: How Cyber AI Neutralizes Never-Before-Seen Threats - Darktrace SecureCISO-2019 - Houston, United States
Cryptojacking: What’s in Your Environment? - CISCO SecureCISO-2019 - Houston, United States
Risky Business: A Privacy and Security Team’s Guide to Risk Scoring GlobalPrivacySummit-2019 - Washington, USA
Open Space A1: Database as Code CI/CD w/ Databases DevOpsDaysAustin-2019 - Austin, USA
Open Space A2: DevSecOps w/ focus on containers / Scan & Remediate DevOpsDaysAustin-2019 - Austin, USA
Open Space A3: PayTalk / TalkPay DevOpsDaysAustin-2019 - Austin, USA
Open Space A4: How to Contribute to Community / Why aren't you speaking? DevOpsDaysAustin-2019 - Austin, USA
Open Space A5: Machine Learning and AI DevOps DevOpsDaysAustin-2019 - Austin, USA
Open Space A6: Network Automation: Your Wishlist DevOpsDaysAustin-2019 - Austin, USA
Open Space A7: How do you manage changes in K8s DevOpsDaysAustin-2019 - Austin, USA
Open Space A8: DevOps Freelancer Challenges DevOpsDaysAustin-2019 - Austin, USA
Open Space A9: Service Mesh Hotness DevOpsDaysAustin-2019 - Austin, USA
Open Space B1: Object Capabilities: The other side of auth DevOpsDaysAustin-2019 - Austin, USA
Open Space B2: Servers Provisioning Automation (Private Cloud) DevOpsDaysAustin-2019 - Austin, USA
Open Space B3: DevOps @ Home (Home Lab) DevOpsDaysAustin-2019 - Austin, USA
Open Space B6: Good Statistics / Bad Statistics DevOpsDaysAustin-2019 - Austin, USA
Open Space B7: Stateful Workloads on K8s DevOpsDaysAustin-2019 - Austin, USA
Open Space B8: Anything & Everything about DevOps Dojos DevOpsDaysAustin-2019 - Austin, USA
Open Space B9: Delivery Metrics from Pipeline DevOpsDaysAustin-2019 - Austin, USA
Open Space C2: Cloud Formation And Infrastructure as Code for beginners DevOpsDaysAustin-2019 - Austin, USA
Open Space C3: All the roles that fall under DevOps DevOpsDaysAustin-2019 - Austin, USA
Open Space C6: Infrastructure Testing DevOpsDaysAustin-2019 - Austin, USA
Open Space C7: K8s Multitenancy DevOpsDaysAustin-2019 - Austin, USA
Open Space C8: Data Management / App Design DevOpsDaysAustin-2019 - Austin, USA
Open Space C9: Cultivating the DevOps PolyMath DevOpsDaysAustin-2019 - Austin, USA
Cloud Security as Culture CloudSecuritySummit&Training-2019 - San Jose, USA
How Regulations Can Enforce Cybercrime Combat CyberSecuritySummitChile-2019 - Santiago, Chile
Developing a Career in Information Security: Experiences and Realities ISC2SecureSummit-2019 - Washington, USA
Intro to Challenge B by the Trustless Computing Association. FSC6thEdition-2019 - Geneva, Switzerland
Protecting Your Digital Supply Chain DallasCyberSecurityConference-2019 - Princeton, USA
Panel: Building a Better Mouse Trap (Emerging Threats) SecureWorldBoston-2019 - Boston, United States
Panel: You’ve Got Burned! Now What? (Incident Response) SecureWorldBoston-2019 - Boston, United States
Panel: Knowledge Is Power (Encryption) SecureWorldBoston-2019 - Boston, United States
Panel: Access Control – The End of the Password? SecureWorldBoston-2019 - Boston, United States
Panel: The Battle for the Endpoint Continues (Endpoint Security) SecureWorldBoston-2019 - Boston, United States
Panel: Shifting Landscape of Attack Vectors SecureWorldBoston-2019 - Boston, United States
The State of Security Vs Level of Preparedness CS4CAUSA-2019 - Houston, United States
So You’ve Been Hacked. Now What? CS4CAUSA-2019 - Houston, United States
A Review of the Threat Landscape Across the United States CS4CAUSA-2019 - Houston, United States
OT Visibility is a Critical First Step – But Security is a Framework CS4CAUSA-2019 - Houston, United States
Five Ways to Ensure the Integrity of Your Industrial Operations CS4CAUSA-2019 - Houston, United States
Peering Inside the Real-world O&G Industrial SOC CS4CAUSA-2019 - Houston, United States
Protecting the Unprotectable with Next-Generation Authentication CS4CAUSA-2019 - Houston, United States
A Short Analysis of Hidden Vulnerabilities in IIoT & ICS Networks CS4CAUSA-2019 - Houston, United States
To Secure Peace Must We Prepare for (Cyber) War? CS4CAUSA-2019 - Houston, United States
Improving Visibility of your Digital Forensic Data CS4CAUSA-2019 - Houston, United States
GridEx – North America’s Bi-annual Cyber/Physical Security Exercise and Lessons Learned CS4CAUSA-2019 - Houston, United States
Introducing IoT and Making sure Security is a Part of the Process CS4CAUSA-2019 - Houston, United States
Cybersecurity Risks - Oil & Gas Meets Maritime Shipping CS4CAUSA-2019 - Houston, United States
Converging IT-OT Networks: The Power of 100% Device Visibility & Control CS4CAUSA-2019 - Houston, United States
Securing the Future of Energy and Utilities CS4CAUSA-2019 - Houston, United States
Governance, People and Processes CS4CAUSA-2019 - Houston, United States
Strategies to Support Outdated and Vulnerable Systems and Assets CS4CAUSA-2019 - Houston, United States
Current ICS Threat Landscape CS4CAUSA-2019 - Houston, United States
Developments in Making Remote Access to ICS Safer & More Resilient CS4CAUSA-2019 - Houston, United States
Leveraging Cybersecurity to Improve Operations and Situational Awareness CS4CAUSA-2019 - Houston, United States
Joining Resources to Evaluate Threats and Defending US Critical Infrastructure CS4CAUSA-2019 - Houston, United States
Building an Ecosystem to Establish a Resilient and Adaptable Security Posture CS4CAUSA-2019 - Houston, United States
Threats and Attack Vectors are the Main “Influencer” on the Blueprint Solution for ICS CS4CAUSA-2019 - Houston, United States
Automation as a Key Enabler in Leveraging AI for IoT Security CS4CAUSA-2019 - Houston, United States
Creating a Culture of Support for IT CS4CAUSA-2019 - Houston, United States
How Open-Source Intelligence is Used to Attack Critical Infrastructure Assets CS4CAUSA-2019 - Houston, United States
The State of Security Vs Level of Preparedness CS4CAUSA-2019 - Houston, United States
So You’ve Been Hacked. Now What? CS4CAUSA-2019 - Houston, United States
A Review of the Threat Landscape Across the United States CS4CAUSA-2019 - Houston, United States
OT Visibility is a Critical First Step – But Security is a Framework CS4CAUSA-2019 - Houston, United States
Five Ways to Ensure the Integrity of Your Industrial Operations CS4CAUSA-2019 - Houston, United States
Peering Inside the Real-world O&G Industrial SOC CS4CAUSA-2019 - Houston, United States
Protecting the Unprotectable with Next-Generation Authentication CS4CAUSA-2019 - Houston, United States
A Short Analysis of Hidden Vulnerabilities in IIoT & ICS Networks CS4CAUSA-2019 - Houston, United States
To Secure Peace Must We Prepare for (Cyber) War? CS4CAUSA-2019 - Houston, United States
Improving Visibility of your Digital Forensic Data CS4CAUSA-2019 - Houston, United States
GridEx – North America’s Bi-annual Cyber/Physical Security Exercise and Lessons Learned CS4CAUSA-2019 - Houston, United States
Introducing IoT and Making sure Security is a Part of the Process CS4CAUSA-2019 - Houston, United States
Cybersecurity Risks - Oil & Gas Meets Maritime Shipping CS4CAUSA-2019 - Houston, United States
Converging IT-OT Networks: The Power of 100% Device Visibility & Control CS4CAUSA-2019 - Houston, United States
Securing the Future of Energy and Utilities CS4CAUSA-2019 - Houston, United States
Governance, People and Processes CS4CAUSA-2019 - Houston, United States
Strategies to Support Outdated and Vulnerable Systems and Assets CS4CAUSA-2019 - Houston, United States
Current ICS Threat Landscape CS4CAUSA-2019 - Houston, United States
Developments in Making Remote Access to ICS Safer & More Resilient CS4CAUSA-2019 - Houston, United States
Leveraging Cybersecurity to Improve Operations and Situational Awareness CS4CAUSA-2019 - Houston, United States
Joining Resources to Evaluate Threats and Defending US Critical Infrastructure CS4CAUSA-2019 - Houston, United States
Building an Ecosystem to Establish a Resilient and Adaptable Security Posture CS4CAUSA-2019 - Houston, United States
Threats and Attack Vectors are the Main “Influencer” on the Blueprint Solution for ICS CS4CAUSA-2019 - Houston, United States
Automation as a Key Enabler in Leveraging AI for IoT Security CS4CAUSA-2019 - Houston, United States
Creating a Culture of Support for IT CS4CAUSA-2019 - Houston, United States
How Open-Source Intelligence is Used to Attack Critical Infrastructure Assets CS4CAUSA-2019 - Houston, United States
CMMI® Institute: Building Resilience Through a Risk-Based ‘Cybermaturity’ Approach CisoExchangeWest-2019 - San Diego, US
Achieve the desired level of trust and authenticity with a few clicks RISK2019-2019 - Lasko, Slovenia
Disruptive authentication for the best user experience RISK2019-2019 - Lasko, Slovenia
The evolution of trust: from plastic cards to a universal mobile platform RISK2019-2019 - Lasko, Slovenia
The evolution of authentication from passwords to artificial intelligence RISK2019-2019 - Lasko, Slovenia
Rethinking Cyber Architecting to Secure the New Digital Enterprise RISK2019-2019 - Lasko, Slovenia
Insider Threats - Monitoring, Auditing and Risk Control/Management RISK2019-2019 - Lasko, Slovenia
How to Investigate Data Exfiltration Attempts RISK2019-2019 - Lasko, Slovenia
Mastering The Art of Cyber Threat Intelligence RISK2019-2019 - Lasko, Slovenia
Providing Security creates Trust RISK2019-2019 - Lasko, Slovenia
Easy, Efficient, Secure Cyber Protection for All Data, Applications and Systems RISK2019-2019 - Lasko, Slovenia
2018 Application Security Statistics Report Explained FutureConDallas-2019 - Dallas, USA
Win Big with IT Resilience DataConnectorsCyberSecurity-2019 - Charlotte, USA
20X20 Cyber Innovation winner CheckPointAmericas-2019 - Las Vegas, USA
Umbrella Security: How Morton Salt prevents and manages its Threat Landscape CheckPointAmericas-2019 - Las Vegas, USA
KEYNOTE SURPRISE – “OODA-LOOP” HackronTenerife-2019 - Tenerife, Spain
SURPRISE KEYNOTE BSidesCharleston-2018 - Charleston, USA
Lightning talks - first come first serve? BSidesCT-2018 - Connecticut, USA
Keynote: The NIS EU directive implementation in context of the National Cyber Security Strategy SSCS2018-2018 - London, United Kingdom
Plenary session: Building cyber resilience through new laws and standards SSCS2018-2018 - London, United Kingdom
Panel Discussion: Cybersecurity Teams as Business Enablers BSidesDelhi-2018 - Delhi, India
Return of Return of the Dork CactusCon-2018 - Mesa, USA
Blue Team Password Cracking CactusCon-2018 - Mesa, USA
Failures of Mobile Blacklists CactusCon-2018 - Mesa, USA
Real Talk on Comms CactusCon-2018 - Mesa, USA
Packet Capture Community SAINTCONUtah-2018 - Provo, USA
Hacker Mental Health Project toorcon2018SanDiego-2018 - San Diego, USA
Lightning Talks BSidesCleveland-2018 - Cleveland, USA
Jason Gillam BsidesAsheville-2018 - Asheville, USA
Diversity Panel - Panel Discussion BSidesChicago-2018 - Chicago, USA
Lightning Talks BSidesChicago-2018 - Chicago, USA
Women in Tech - Panel Discussion BSidesChicago-2018 - Chicago, USA
Career Development Track: Speed Networking SourceBoston-2018 - Boston, USA
Security Hotseat SourceBoston-2018 - Boston, USA
Career Development Track: Attendee Lightning Talks SourceBoston-2018 - Boston, USA
Keynote Address NaijaSecCon2018-2018 - Lagos, Nigeria
Keynote: Jessica Payne BSidesCharm-2018 - Baltimore, USA
Establishing a Guide to the Cyber Security Body of Knowledge (CyBOK) SIEEEEuropeanSymposiumS&P-2018 - London, United Kingdom
Intro to Lockpicking BSidesKansasCity-2018 - Kansas City, USA
“Spy tricks” Hiding data in plain site BSidesKansasCity-2018 - Kansas City, USA
Resume Rewriting BSidesSanFrancisco-2018 - San Francisco, USA
IoT Village BSidesSanFrancisco-2018 - San Francisco, USA
Lockpick Village BSidesSanFrancisco-2018 - San Francisco, USA
Spymaster Challenge BSidesSanFrancisco-2018 - San Francisco, USA
Capture The Flag BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.1) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.2) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.3) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.4) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.5) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 1.6) BSidesSanFrancisco-2018 - San Francisco, USA
Women in Security Mixer BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 2.1) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 2.2) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 2.3) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 2.4) BSidesSanFrancisco-2018 - San Francisco, USA
Living Security Escape Room (Session 2.5) BSidesSanFrancisco-2018 - San Francisco, USA
Special Redacted BSidesCanberra-2018 - Canberra, Australia
BSides Canberra Panel BSidesCanberra-2018 - Canberra, Australia
Panel: Infosec Professionals Ask Me Anything BSidesOklahoma-2018 - Oklahoma, USA
Hacker Trivia CarolinaCon14-2018 - Raleigh, USA
Panel: Career Search: Are you pwning or being pwned? BSidesOrlando-2018 - Orlando, USA
Firetalks! BSidesOrlando-2018 - Orlando, USA
Resume Review BSidesOrlando-2018 - Orlando, USA
Preventable Fatalities of Multimedia Presentations BSidesOrlando-2018 - Orlando, USA
You Can Capture the Flag, but Can You Code the Rigt Resume for Your Next Job? BSidesOrlando-2018 - Orlando, USA
Women in Tech Connect BSidesVancouver-2018 - Vancouver, Canada
IoT Battle of the Bots BSidesVancouver-2018 - Vancouver, Canada
Surprise keynote KasperskySASCancun-2018 - Cancun, Mexico
Surprise keynote KasperskySASCancun-2018 - Cancun, Mexico
Revisiting Variable Output Length XOR Pseudorandom Function FSE2018-2018 - Bruges, Belgium
Rump Session FSE2018 FSE2018-2018 - Bruges, Belgium
Turning cyber-awareness into good defensive practice SCcongress-2017 - london,uk
Keynote speaker:Open Source Data Search and Analytics for Social Engineering CSOperspectives-2016 - sydney,austrailia
Towards 100 Gbit Flow-Based Network Monitoring Flocon-2016 - san diego,usa
Cloudy, With a Chance of Breach CISOminneapolis-2015 - minneapolis,usa
Simulation and Malware CSET-2015 - washington,USA
Keynote - The Equation Group Dimva-2015 - Milan,Italy
CopperDroid: Automatic Reconstruction of Android Malware Behaviors NDSS-2015 - san diego,usa
Historical Lessons for Improving Cyber Security LASCON-2014 - austin,usa
BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks USENIXatc-2014 - Philadelphia,USA
The Security and Privacy of Bitcoin Transactions EuroCrypt-2014 - copenhagen,denmark
Presentation title: From Minion to Engineer: a fourth grader hacks an embedded system BsidesDFW2013-2013 - Dallas,USA
TCP Idle Scans in IPv6 HITBSecConf Malaysia-2013 - Kuala Lumpur,Malaysia
Hacking Corporations Using Unconventional Chained Exploits HITBSecConf Malaysia-2013 - Kuala Lumpur,Malaysia
Hacker History: This Stuff Matters GrrCon-2013 - Michigan,USA
Hackers get Schooled: Learning Lessons from Academia Shmoocon-2013 - Washington,USA Security
J0035 Semantic Searching IT Careers Concepts Based on Ontology ICICN-2013 - Singapore,NA Security
How I Learned To Stop Worrying and Love The Smart Meter ToorCon-2012 - San Diego,USA Security
Declassifying Government and Undermining a Culture of Insecurity HOPE-9 - New York Security
Windows 7 forensics BugCon-2012 - Mexico Security
Server Optimization BugCon-2012 - Mexico Security
Social Networking Security BugCon-2012 - Mexico Security
The Human, the weak and strong side of computer security BugCon-2012 - Mexico Security
Data Breach Notification Laws: Time for a Pimp Slap BsidesDFW-2011 - Texas,USA