Parent directory/ | - | - |
AppSec without additional tools Jason Kent.opus | 7.1 MiB | 2021 May 15 19:46 |
BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to reduce risk Steven Keil.opus | 6.6 MiB | 2021 May 15 19:46 |
CISO for an Hour Keith Fricke.opus | 8.0 MiB | 2021 May 15 19:46 |
Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.opus | 6.2 MiB | 2021 May 15 19:46 |
Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie Thomas Harry Regan.opus | 7.0 MiB | 2021 May 15 19:46 |
Formal Verification of Secure Software Systems Aaron Bedra.opus | 6.3 MiB | 2021 May 15 19:46 |
Information Security Metrics Practical Security Metrics Jack Nichelson.opus | 7.0 MiB | 2021 May 15 19:46 |
Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Robert Wright.opus | 6.5 MiB | 2021 May 15 19:46 |
No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.opus | 5.1 MiB | 2021 May 15 19:46 |
PKI Do You Know Your Exposure Kent King.opus | 5.6 MiB | 2021 May 15 19:46 |
Putting the Intelligence back in Threat Intelligence Edward McCabe.opus | 5.6 MiB | 2021 May 15 19:46 |
Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.opus | 5.4 MiB | 2021 May 15 19:46 |
Security Certifications are they worth it and which ones are right for you William Diederich.opus | 6.7 MiB | 2021 May 15 19:47 |
Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.opus | 4.6 MiB | 2021 May 15 19:46 |
don't try this at home Things not to do when securing an organization Jessica Hebenstreit.opus | 5.8 MiB | 2021 May 15 19:46 |