Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Betrayed by the keyboard: How what you type can give you away DEF CON 26
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering Black Hat USA 2018
The CISO—in a Box RSAC Asia Pacific & Japan 2018
Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure Black Hat Asia 2018
Dealing the Perfect Hand - Shuffling Memory Blocks on z/OS Black Hat Europe 2017
See no evil, hear no evil: Hacking invisibly and silently with light and sound DEF CON 25
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd DEF CON 25
The Measure of Success: Security Metrics to Tell Your Story RSAC USA 2016
Security Considerations for Mobile Payment Devices: Trends, Risks and Countermeasures RSAC Asia Pacific & Japan 2015