![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vVFcGUH92X2fgLGlSRH9Hcc9XncbYQj3SZnIUEXXq2PR2HGsDK2Q6Zg5ovBHJsFWepkvyL0GYTglBM6rNk7nj-9jTNQsPabapyqjDnjbd2kIE=s0-d) |
|
|
|
"Welcome to SecTor 2015" - Brian Bourne |
|
|
|
Big Data Needs Big Privacy ... Enter Privacy by Design - Dr. Ann Cavoukian |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
IT Security Operations: Successful Transformation - Kristin Lovejoy |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Globalization of Cybercrime - Jason Brown |
|
|
|
Maturing InfoSec: Lessons from Aviation on Information Sharing - Trey Ford |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
|
|
|
|
![IT Security Experts Canada Toronto SecTor - Technical Track](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s49MeSXVaZ76hspSxMSETDXFGLaATiRli6jTOr32F8BkuOU5-HLlqHjr5heQ-ZG_gkK7LBewXu2YCFRHfHqnkPqr-1q9u-F9bdg1aFaOshrX8WJ3zv=s0-d) |
|
|
|
Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Mike Rothman |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Breaking Access Controls with BLEKey - Mark Bassegio and Eric Evenchick
|
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Breaking and Fixing Python Applications - Enrico Branca |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
![Tools Tools](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tCty9weZJqS01KkPsGtoJbnsr1iPRf-jum9brJrywx_TG8I_gT0bj8EXwfaRwl9F_8SZdY25Is7ncOC6-mWsa-onNj-cr3WMr9XKGrwX8A=s0-d) |
Complete Application Ownage via Multi-POST XSRF - Adrien de Beaupré |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Confessions of a Professional Cyber Stalker - Ken Westin |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Cymon - An Open Threat Intelligence System - Roy Firestein |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Alex Pinto |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
DevOps For The Home - Kellman Meghu |
|
|
|
Drug Pump and Medical Device Security - Jeremy Richards |
|
|
|
Exploitation Trends: From Potential Risk to Actual Risk - Tim Rains |
|
|
|
Hijacking Arbitrary .NET Application Control Flow - Topher Timzen |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Incoming Threats At the Speed of Retail - Wendy Nather |
|
|
|
Learning To Love Your Attackers - Ryan Linn |
|
|
|
Making & Breaking Machine Learning Anomaly Detectors in Real Life - Clarence Chio |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Malware Activity in Mobile Networks – An Insider View - Kevin McNamee |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Software Defined Networking / Attacker Defined Networking - Rob VandenBrink |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Stealth Attack From The Produce Aisle - Todd Dow and Keith Benedict |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Lee Brotherston |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
UNMASKING MALWARE - Christopher Elisan |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
What Google knows about you and your devices, and how to get it - Vladimir Katalov |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Brendan O'Connor and James Arlen |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
|
|
|
|
![IT Security Experts Canada Toronto SecTor - Management Track](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t_UkxlrpLAi8HZAtc-TFGpAbhOhBiT4zbhxMQBJp98w31yDI9E5ITPy1Djq1vpGTKBAF_S_OJnFxtEGIlKOrgbbsjHkefC8PTyFKaHUag1TI1yZHwkc8QSC5X8=s0-d) |
|
|
|
Bulletproofing Your Incident Response Plan: Effective Tabletops - Reg Harnish |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Chris Wysopal |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Dolla Dolla Bill Y'all: Cybercrime Cashouts - Benjamin Brown |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Make Metrics Matter - Jessica Ireland |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Bob DuCharme |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Jim Penrose |
|
|
|
What does it take to deliver the most technologically advanced Games ever? - Enzo Sacco and Quang Tu |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
|
|
|
|
![IT Security Experts Canada Toronto SecTor - Management Track](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_spil5WB6I-kHOveLppAbHSXmA-gUsZivmOLpi39z7wtxqs_lkP-BDRT7DIlQ8asFuikr17h2PN7QA9ZCZebTLVfFRsLcFSXTwnZeSBKzxPGkN5gCIjh7yoYAzp13PyIkrK2Xuq=s0-d) |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
![Tools Tools](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tCty9weZJqS01KkPsGtoJbnsr1iPRf-jum9brJrywx_TG8I_gT0bj8EXwfaRwl9F_8SZdY25Is7ncOC6-mWsa-onNj-cr3WMr9XKGrwX8A=s0-d) |
Agile Incident Management - Bringing the "Win" Back to Data and Privacy Breach Responses - Robert Beggs |
|
|
|
Building an Effective Vulnerability & Remediation Management Program - Dave Millier |
|
|
|
Ground Zero Financial Services: Targeted Attacks from the Darknet - Joe Pizzo |
|
|
|
Peeling The Layers Of Vawtrak - Raul Alvarez |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Preventing Home Automation Security Disasters - James Arlen |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Chayim Kirshen |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Security for non-Unicorns - Ben Hughes |
|
|
|
The Internet of Bad Things and Securing the Software Defined Data Center - Ian Redden and Marc Edun |
|
|
|
|
|
|
|
![IT Security Experts Canada Toronto SecTor - Sponsor Talk Track](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uzL3c_u-dahdugHyEhaQ41V4TzWMQk2SEPMYUwuywdghRUlIc64csnwaLPTiue8vACPzQ0u-jiwW1l4T85mQonqTa4qWIla2BQOCnrtX3TXw0T4xM5a8Ve=s0-d) |
|
|
|
2015 State of Vulnerability Exploits - Amol Sarwate |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Advanced Threat Analytics: Adapt as Fast as Your Enemies - Jasbir Gill and Lanny Cofman |
|
|
|
Advanced Threats: Eliminating the Blind Spot - Fahmy Kadiri |
|
|
|
Browser and Environment Hardening - Kurtis Armour |
|
|
|
Building Better Indicators: Crowdsourcing Malware IOCs - Sean Wilson |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Business Backed CVEs - The Major Vulnerabilities of the Past Year - Atif Ghauri and Brad Antoniewicz |
|
|
|
Certifi-gate: Has your Android device been Pwned? - Shai Yanovski |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Changing the Game of Threat Hunting - Jim Penrose |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Detecting the Bear in Camp: How to Find Your True Vulnerabilities - Ryan Poppa |
|
|
|
Effective Ways to Tackle Vulnerability Remediation - Dave Millier |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Ensuring the Success of Your IAM Project - Jeremy Hanlon |
|
|
|
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured - Sean Earhard |
|
|
|
Insider Threat – The Soft Underbelly of CyberSecurity - Harold Byun |
|
|
|
Knowing what happened is only half the battle. - Grayson Lenik |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
|
|
Mitigating the Alert - Impact Prevention in a super active security battlefield - Brian Read |
|
|
|
One Ring to Rule Them All - Hardware isolation and the future of virtualization security - Simon Crosby |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
SIEM and the Art of Log Management - Jeff Pold and Ron Pettit |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
Taking back Endpoint Control! - John Beal |
|
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
The State of Software Security - Chris Wysopal |
![Media File Media File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txEzoukYqwBLJHfsmD4FNg83DBRXQfBQIZcagQW4bbLvTRh_isP3EIMEdSOHur8Uv2sKaSJzXqVOEnF8PDSbZ00ccEzpuzQF_GN5w2i5X4=s0-d) |
![Presentation File Presentation File](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v9ao6KYuKxvWXNgi3k33Z1PXZ79Whrur00bUbBPSp5bdpMtLf8Cg01a-O__37pNcHNyqYbZk8u68gbLGpZCatjWBmFstkbIcoNkApOHfEqwcG5GA=s0-d) |
|
|
|
|
|
gracias por el aporte esta interesante
ResponderEliminar