Breaking Access Controls with BLEKey |
Black Hat USA 2015
|
Be Heard: Developing Effective Board-Level Communications for the CISO |
RSAC USA 2015
|
Inside the Boardroom: How Boards Manage Cybersecurity and Risk |
RSAC USA 2015
|
Reverse-Engineering the Supra iBox: Exploitation of a Hardened MSP430-Based Device |
Black Hat USA 2014
|
Showcase Showdown: Browser Security Edition |
RSAC USA 2012
|
No Apology Required: Deconstructing Blackberry 10 |
CanSecWest 2014
|