Betrayed by the keyboard: How what you type can give you away |
DEF CON 26
|
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering |
Black Hat USA 2018
|
The CISO—in a Box |
RSAC Asia Pacific & Japan 2018
|
Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure |
Black Hat Asia 2018
|
Dealing the Perfect Hand - Shuffling Memory Blocks on z/OS |
Black Hat Europe 2017
|
See no evil, hear no evil: Hacking invisibly and silently with light and sound |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
The Measure of Success: Security Metrics to Tell Your Story |
RSAC USA 2016
|
Security Considerations for Mobile Payment Devices: Trends, Risks and Countermeasures |
RSAC Asia Pacific & Japan 2015
|