×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of centralohioissa
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk
527 views
Matthew Cook - How Fraudsters Are 'Following the Money' Into Online Games
985 views
Jamie Bowser - A Touch(ID) of iOS Security
862 views
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identifying and Exploiting Vulnerabilities via Hardware Reverse Engineering
880 views
Keith Fricke - CISO for an Hour
657 views
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (CI/CD2)
597 views
Jack Nichelson - Information Security Metrics - Practical Security Metrics
671 views
Tre Smith - From Decision to Implementation: Who's On First?
478 views
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
523 views
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
701 views
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
501 views
Warner Moore - SecOps: Innovating Security in Innovative Organizations
500 views
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
554 views
Sam Herath - Six Critical Criteria for Cloud Workload Security
539 views
Tom Kopchak - It was the best of logs, it was the worst of logs - Stories through Logging
490 views
Aaron Higbee - The Humanity of Phishing Attack & Defense
809 views
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber Defense Strategy
633 views
Robert Hurlbut - Threat Modeling for Secure Software Design
747 views
Jim Libersky: Cyber Security - Super Bowl 50
507 views
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing An Organization)
565 views
Next >