|
|
|
|
"Welcome to SecTor 2015" - Brian Bourne |
|
|
|
Big Data Needs Big Privacy ... Enter Privacy by Design - Dr. Ann Cavoukian |
|
|
|
IT Security Operations: Successful Transformation - Kristin Lovejoy |
|
|
|
Globalization of Cybercrime - Jason Brown |
|
|
|
Maturing InfoSec: Lessons from Aviation on Information Sharing - Trey Ford |
|
|
|
|
|
|
|
|
|
|
|
Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Mike Rothman |
|
|
|
Breaking Access Controls with BLEKey - Mark Bassegio and Eric Evenchick
|
|
|
|
Breaking and Fixing Python Applications - Enrico Branca |
|
|
|
Complete Application Ownage via Multi-POST XSRF - Adrien de Beaupré |
|
|
|
Confessions of a Professional Cyber Stalker - Ken Westin |
|
|
|
Cymon - An Open Threat Intelligence System - Roy Firestein |
|
|
|
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Alex Pinto |
|
|
|
DevOps For The Home - Kellman Meghu |
|
|
|
Drug Pump and Medical Device Security - Jeremy Richards |
|
|
|
Exploitation Trends: From Potential Risk to Actual Risk - Tim Rains |
|
|
|
Hijacking Arbitrary .NET Application Control Flow - Topher Timzen |
|
|
|
Incoming Threats At the Speed of Retail - Wendy Nather |
|
|
|
Learning To Love Your Attackers - Ryan Linn |
|
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life - Clarence Chio |
|
|
|
Malware Activity in Mobile Networks – An Insider View - Kevin McNamee |
|
|
|
Software Defined Networking / Attacker Defined Networking - Rob VandenBrink |
|
|
|
Stealth Attack From The Produce Aisle - Todd Dow and Keith Benedict |
|
|
|
Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Lee Brotherston |
|
|
|
UNMASKING MALWARE - Christopher Elisan |
|
|
|
What Google knows about you and your devices, and how to get it - Vladimir Katalov |
|
|
|
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Brendan O'Connor and James Arlen |
|
|
|
|
|
|
|
|
|
|
|
Bulletproofing Your Incident Response Plan: Effective Tabletops - Reg Harnish |
|
|
|
CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Chris Wysopal |
|
|
|
Dolla Dolla Bill Y'all: Cybercrime Cashouts - Benjamin Brown |
|
|
|
Make Metrics Matter - Jessica Ireland |
|
|
|
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Bob DuCharme |
|
|
|
There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Jim Penrose |
|
|
|
What does it take to deliver the most technologically advanced Games ever? - Enzo Sacco and Quang Tu |
|
|
|
|
|
|
|
|
|
|
|
Agile Incident Management - Bringing the "Win" Back to Data and Privacy Breach Responses - Robert Beggs |
|
|
|
Building an Effective Vulnerability & Remediation Management Program - Dave Millier |
|
|
|
Ground Zero Financial Services: Targeted Attacks from the Darknet - Joe Pizzo |
|
|
|
Peeling The Layers Of Vawtrak - Raul Alvarez |
|
|
|
Preventing Home Automation Security Disasters - James Arlen |
|
|
|
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Chayim Kirshen |
|
|
|
Security for non-Unicorns - Ben Hughes |
|
|
|
The Internet of Bad Things and Securing the Software Defined Data Center - Ian Redden and Marc Edun |
|
|
|
|
|
|
|
|
|
|
|
2015 State of Vulnerability Exploits - Amol Sarwate |
|
|
|
Advanced Threat Analytics: Adapt as Fast as Your Enemies - Jasbir Gill and Lanny Cofman |
|
|
|
Advanced Threats: Eliminating the Blind Spot - Fahmy Kadiri |
|
|
|
Browser and Environment Hardening - Kurtis Armour |
|
|
|
Building Better Indicators: Crowdsourcing Malware IOCs - Sean Wilson |
|
|
|
Business Backed CVEs - The Major Vulnerabilities of the Past Year - Atif Ghauri and Brad Antoniewicz |
|
|
|
Certifi-gate: Has your Android device been Pwned? - Shai Yanovski |
|
|
|
Changing the Game of Threat Hunting - Jim Penrose |
|
|
|
Detecting the Bear in Camp: How to Find Your True Vulnerabilities - Ryan Poppa |
|
|
|
Effective Ways to Tackle Vulnerability Remediation - Dave Millier |
|
|
|
Ensuring the Success of Your IAM Project - Jeremy Hanlon |
|
|
|
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured - Sean Earhard |
|
|
|
Insider Threat – The Soft Underbelly of CyberSecurity - Harold Byun |
|
|
|
Knowing what happened is only half the battle. - Grayson Lenik |
|
|
|
Mitigating the Alert - Impact Prevention in a super active security battlefield - Brian Read |
|
|
|
One Ring to Rule Them All - Hardware isolation and the future of virtualization security - Simon Crosby |
|
|
|
SIEM and the Art of Log Management - Jeff Pold and Ron Pettit |
|
|
|
Taking back Endpoint Control! - John Beal |
|
|
|
The State of Software Security - Chris Wysopal |
|
|
|
|
|
|
|
gracias por el aporte esta interesante
ResponderEliminar