 |
|
|
|
| "Welcome to SecTor 2015" - Brian Bourne |
|
|
|
| Big Data Needs Big Privacy ... Enter Privacy by Design - Dr. Ann Cavoukian |
 |
 |
|
| IT Security Operations: Successful Transformation - Kristin Lovejoy |
 |
|
|
| Globalization of Cybercrime - Jason Brown |
|
|
|
| Maturing InfoSec: Lessons from Aviation on Information Sharing - Trey Ford |
 |
|
|
|
|
|
|
 |
|
|
|
| Automation is your Friend: Embracing SkyNet to Scale Cloud Security - Mike Rothman |
 |
|
|
Breaking Access Controls with BLEKey - Mark Bassegio and Eric Evenchick
|
 |
|
|
| Breaking and Fixing Python Applications - Enrico Branca |
 |
 |
 |
| Complete Application Ownage via Multi-POST XSRF - Adrien de Beaupré |
 |
 |
|
| Confessions of a Professional Cyber Stalker - Ken Westin |
 |
|
|
| Cymon - An Open Threat Intelligence System - Roy Firestein |
 |
|
|
| Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing - Alex Pinto |
|
 |
|
| DevOps For The Home - Kellman Meghu |
|
|
|
| Drug Pump and Medical Device Security - Jeremy Richards |
|
|
|
| Exploitation Trends: From Potential Risk to Actual Risk - Tim Rains |
|
|
|
| Hijacking Arbitrary .NET Application Control Flow - Topher Timzen |
 |
 |
|
| Incoming Threats At the Speed of Retail - Wendy Nather |
|
|
|
| Learning To Love Your Attackers - Ryan Linn |
|
|
|
| Making & Breaking Machine Learning Anomaly Detectors in Real Life - Clarence Chio |
 |
|
|
| Malware Activity in Mobile Networks – An Insider View - Kevin McNamee |
 |
 |
|
| Software Defined Networking / Attacker Defined Networking - Rob VandenBrink |
 |
|
|
| Stealth Attack From The Produce Aisle - Todd Dow and Keith Benedict |
|
 |
|
| Stealthier Attacks and Smarter Defending with TLS Fingerprinting - Lee Brotherston |
 |
 |
|
| UNMASKING MALWARE - Christopher Elisan |
 |
|
|
| What Google knows about you and your devices, and how to get it - Vladimir Katalov |
|
 |
|
| Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities - Brendan O'Connor and James Arlen |
 |
|
|
|
|
|
|
 |
|
|
|
| Bulletproofing Your Incident Response Plan: Effective Tabletops - Reg Harnish |
 |
|
|
| CISO Survival Guide: How to thrive in the C-Suite and Boardroom - Chris Wysopal |
|
 |
|
| Dolla Dolla Bill Y'all: Cybercrime Cashouts - Benjamin Brown |
 |
|
|
| Make Metrics Matter - Jessica Ireland |
|
 |
|
| The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight! - Bob DuCharme |
 |
|
|
| There’s no such thing as a coincidence - Discovering Novel Cyber Threats - Jim Penrose |
|
|
|
| What does it take to deliver the most technologically advanced Games ever? - Enzo Sacco and Quang Tu |
|
 |
|
|
|
|
|
 |
 |
 |
 |
| Agile Incident Management - Bringing the "Win" Back to Data and Privacy Breach Responses - Robert Beggs |
|
|
|
| Building an Effective Vulnerability & Remediation Management Program - Dave Millier |
|
|
|
| Ground Zero Financial Services: Targeted Attacks from the Darknet - Joe Pizzo |
|
|
|
| Peeling The Layers Of Vawtrak - Raul Alvarez |
|
 |
|
| Preventing Home Automation Security Disasters - James Arlen |
 |
 |
|
| Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things - Chayim Kirshen |
 |
|
|
| Security for non-Unicorns - Ben Hughes |
|
|
|
| The Internet of Bad Things and Securing the Software Defined Data Center - Ian Redden and Marc Edun |
|
|
|
|
|
|
|
 |
|
|
|
| 2015 State of Vulnerability Exploits - Amol Sarwate |
 |
 |
|
| Advanced Threat Analytics: Adapt as Fast as Your Enemies - Jasbir Gill and Lanny Cofman |
|
|
|
| Advanced Threats: Eliminating the Blind Spot - Fahmy Kadiri |
|
|
|
| Browser and Environment Hardening - Kurtis Armour |
|
|
|
| Building Better Indicators: Crowdsourcing Malware IOCs - Sean Wilson |
 |
 |
|
| Business Backed CVEs - The Major Vulnerabilities of the Past Year - Atif Ghauri and Brad Antoniewicz |
|
|
|
| Certifi-gate: Has your Android device been Pwned? - Shai Yanovski |
 |
|
|
| Changing the Game of Threat Hunting - Jim Penrose |
 |
|
|
| Detecting the Bear in Camp: How to Find Your True Vulnerabilities - Ryan Poppa |
|
|
|
| Effective Ways to Tackle Vulnerability Remediation - Dave Millier |
 |
|
|
| Ensuring the Success of Your IAM Project - Jeremy Hanlon |
|
|
|
| Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured - Sean Earhard |
|
|
|
| Insider Threat – The Soft Underbelly of CyberSecurity - Harold Byun |
|
|
|
| Knowing what happened is only half the battle. - Grayson Lenik |
 |
|
|
| Mitigating the Alert - Impact Prevention in a super active security battlefield - Brian Read |
|
|
|
| One Ring to Rule Them All - Hardware isolation and the future of virtualization security - Simon Crosby |
 |
 |
|
| SIEM and the Art of Log Management - Jeff Pold and Ron Pettit |
 |
 |
|
| Taking back Endpoint Control! - John Beal |
|
 |
|
| The State of Software Security - Chris Wysopal |
 |
 |
|
|
|
|
|
gracias por el aporte esta interesante
ResponderEliminar