Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller |
DEF CON 26
|
The Sad Tale of Etaoin ShrdLu and the Danger of Automated Pen Tests |
RSAC USA 2018
|
Building Information Security into Your Third-Party Vendor Management Program |
RSAC USA 2017
|
Android Malware Pattern Recognition for Fraud and Attribution |
RSAC Abu Dhabi 2016
|
Integrating Retail Cybersecurity, Loss Prevention, Risk, Fraud and Privacy |
RSAC USA 2016
|
Balancing Compliance and Operational Security Demands |
RSAC USA 2015
|
From the Battlefield: Managing Customer Perceptions in a Security Crisis |
RSAC USA 2015
|