The Hitchhiker’s Guide to North Korea's Malware Galaxy |
BlueHat v18
|
How can Someone with Autism Specifically Enhance the Cyber Security Workforce? |
Black Hat USA 2018
|
Building the Cybersecurity Innovation Pipeline |
RSAC USA 2018
|
OPERATION: Dateline |
RSAC USA 2018
|
So you think you can patch: The game show that questions your security assumptions |
BSidesSF2018
|
The Great Escapes of VMWare: A Retrospective Case Study of VMWare G2H Escape Vulnerabilities |
Black Hat Europe 2017
|
Driving down the rabbit hole |
DEF CON 25
|
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd |
DEF CON 25
|
Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks |
Black Hat USA 2017
|
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques |
Black Hat Asia 2017
|