Looking for Malicious Hardware Implants with Minimal Equipment |
ShmooCon 2019
|
Incident Response and the Attorney Client Privilege |
ShmooCon 2019
|
From Bot to Robot: How Abilities and Law Change with Physicality |
Black Hat USA 2018
|
Why Can't We Have Nice Things? Conflict Resolution in Information Security |
BSidesSF2016
|
Advances in Linux Process Forensics Using ECFS |
DEF CON 23
|
Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware |
Black Hat USA 2015
|