Cybersecurity: An Innovative Approach to Advanced Persistent Threats |
RSAC USA 2014
|
Security Business Intelligence– Big Data for Faster Detection/Response |
RSAC USA 2014
|
Your Product is Made WHERE? |
RSAC USA 2014
|
Privacy by Design—From Theory to Practice |
RSAC Europe 2012
|
The Mobile Enterprise: 7 Strategies to Manage Risk & Maximise Opportunity |
RSAC Europe 2012
|
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access |
RSAC USA 2012
|
Low cost radio wave attacks on modern platforms |
CanSecWest 2017
|
Introduction - Invite only bug bounty program |
CanSecWest 2017
|
Privilege escalation on high-end servers due to implementation gaps in CPU Hot-Add flow |
CanSecWest 2017
|
All Your Boot Are Belong To Us |
CanSecWest 2014
|