Parent directory/ | - | - |
Side Hustles Your Entry Into Tech - Elyse Y. Robinson.eng.srt | 32.5 KiB | 2022 May 25 00:55 |
When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.eng.srt | 33.5 KiB | 2022 May 25 00:57 |
Zero Trust Model Impostors Among us - Sarthak Taneja.eng.srt | 46.7 KiB | 2022 May 25 00:46 |
How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.eng.srt | 58.2 KiB | 2022 May 25 01:04 |
IPv6Does size matter - Anastasiia Mytrofanovska.eng.srt | 61.8 KiB | 2022 May 25 00:47 |
Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.eng.srt | 65.7 KiB | 2022 May 25 00:44 |
Jinkies this Email looks Suspicious - Nicole Hoffman.eng.srt | 66.0 KiB | 2022 May 25 00:57 |
Opening Keynote - Tatyana Bolton.eng.srt | 68.1 KiB | 2022 May 25 00:57 |
Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.eng.srt | 72.9 KiB | 2022 May 25 01:01 |
Notable ICS Cybersecurity Events - Jason Allnut.eng.srt | 75.9 KiB | 2022 May 25 00:53 |
Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.eng.srt | 78.4 KiB | 2022 May 25 02:03 |
Bad legislation for Critical infrastructure Security - Keenan Skelly.eng.srt | 79.2 KiB | 2022 May 25 02:03 |
Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.eng.srt | 86.3 KiB | 2022 May 25 00:50 |
Adopt purple team strategy to augment Application Security - Trupti Shiralkar.eng.srt | 87.4 KiB | 2022 May 25 02:03 |
Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.eng.srt | 92.0 KiB | 2022 May 25 00:45 |
Closing Keynote - The FAIL Horsemen.eng.srt | 103.6 KiB | 2022 May 25 02:03 |
When Opposites Attract Making Privacy Trend on TikTok - Ghufran Salih.mp4 | 16.6 MiB | 2022 May 27 06:19 |
Zero Trust Model Impostors Among us - Sarthak Taneja.mp4 | 18.5 MiB | 2022 May 27 06:19 |
Side Hustles Your Entry Into Tech - Elyse Y. Robinson.mp4 | 26.6 MiB | 2022 May 27 06:19 |
IPv6Does size matter - Anastasiia Mytrofanovska.mp4 | 30.0 MiB | 2022 May 27 06:19 |
How an ineffective Data Governance Program destroyed the Galactic Empire - Micah Brown.mp4 | 30.6 MiB | 2022 May 27 06:19 |
Jinkies this Email looks Suspicious - Nicole Hoffman.mp4 | 31.4 MiB | 2022 May 27 06:19 |
Cybersecurity Education Without Behavior Change, What Is The Point - Sidd Chopra.mp4 | 32.0 MiB | 2022 May 27 06:19 |
Notable ICS Cybersecurity Events - Jason Allnut.mp4 | 39.2 MiB | 2022 May 27 06:19 |
Solving Web Security Vulnerabilities with Pentesting - Gabrielle Botbol.mp4 | 40.1 MiB | 2022 May 27 06:19 |
Tropical Spy tricks and tales of a Brazilian social engineer - Marina Ciavatta.mp4 | 40.8 MiB | 2022 May 27 06:19 |
Rebuilding Trust after a Cyber or Disinformation Attack - Devi Nair.mp4 | 41.3 MiB | 2022 May 27 06:19 |
Bad legislation for Critical infrastructure Security - Keenan Skelly.mp4 | 45.5 MiB | 2022 May 27 06:19 |
Adopt purple team strategy to augment Application Security - Trupti Shiralkar.mp4 | 46.5 MiB | 2022 May 27 06:19 |
Utilizing Native Functionality in ICS to improve Security - Vivek Ponnada.mp4 | 50.1 MiB | 2022 May 27 06:19 |
Opening Keynote - Tatyana Bolton.mp4 | 56.7 MiB | 2022 May 27 06:19 |
Closing Keynote - The FAIL Horsemen.mp4 | 86.1 MiB | 2022 May 27 06:19 |