Downloads & Media
Presentations
-
Adaptive & Unified Approach to Risk Management and Compliance via CCF
-
Anatomy of an Attack
-
A New Way of Looking at Smart City Security: Securing the Fabric
-
ARM: A Security Opportunity against Advanced Persistent Threats
-
A Use Case Framework for Intelligence Driven Security Operations Centers
-
BADMIN: (Ab)using Legitimate Sysadmin Tools for Offense
-
Becoming the Adversary—A Hacker's Perspective on Attacking an Organization
-
Cloud Security—Myths and Reality
-
Combating Cyber Risk in the Supply Chain
-
Cyber Security Awareness for Executives
-
Cyber Threat Intelligence Sharing Standards
-
Escalating Middle Eastern Cyber Tension: An Open Source (OSINT) Analysis
-
Escalating Middle Eastern Cyber Tension: An Open Source (OSINT) Analysis
-
False Data Injection Attacks on Industrial Control Systems
-
From "Fences" To "Bodyguards"—How Data-Centric Security Works
-
Global & Regional Trends in Cybercrime & the Divergence of Cybercriminals
-
GRC Implementation...Behind the Scenes
-
How I Learned to Stop Worrying and Love the Internet of Things
-
How Next Generation Trusted Identities Can Help Transform Your Business
-
How to Prepare for the Worst: Don't Let Your First Crisis Be a Real One
-
Introducing a New CISO—Dos and Don’ts of the First Six Months
-
IoT: Securing the Smart City
-
IoT, the Next BYOD—Will We Make the Same Mistakes?
-
Journey into the Darknet
-
Let’s Go Hunting
-
Lie, Cheat and Deceive: Change the Rules of Cyber Defense
-
Logically Securing a Public Cloud Service
-
Machine Learning—The New Face of BYOD
-
Maximum Overdrive: Death by Your Microwave
-
Obtaining Enterprise Cyber-situational Awareness
-
Overcome by Cyber Risks? Economic Costs and Benefits of Being Connected
-
Proactive Counterespionage as a Part of Business Continuity and Resiliency
-
Protecting the Energy Industrial Infrastructures from Advancing Threats
-
Securing Automobility: Cyborgs and the Social Network of Things
-
Securing Smart City Platforms: IoT, M2M, Cloud and Big Data
-
Security Basics Seminar
-
Security Intelligence: The Truth Is Out There
-
Security Posture for Critical Information Infrastructure Protection (CIIP).
-
Smart Grid Security: A Look to the Future
-
State of the Art in Strategic Decision-Making Exercises in Cyber Security
-
The Components of National and International Governance of Cyberspace
-
The Real Security Issues that Deserve a Logo
-
The Ticking Time Bomb of Insider Threat
-
The Time Is Now—A New Era for Cybersecurity
-
The ZeroTrust Initiative—There Is No Security without Transparency
-
Understanding Cyber Attacks That Leverage the Telephony Channel
-
Using Security Analytics to Transform Smart Grid Security
-
Using Visibility to Turn the Tables on Cybercriminals
-
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
-
Why the Global Cyber Security Landscape Paints a Concerning Picture
-
Windows 10: Disrupting Cyber Threats