Autotuning Cyber: Finding the Threat Signal in the Data Noise |
RSAC Asia Pacific & Japan 2018
|
Harnessing the Law of Data Gravity: Cyber-Defence for the Hybrid Cloud |
RSAC Asia Pacific & Japan 2018
|
Data Integrity: The Elephant Threat in the Room (Ask the Expert Roundtable) |
RSAC Asia Pacific & Japan 2018
|
Securing Your Cloud Estate with the CIS Critical Security Controls |
RSAC Asia Pacific & Japan 2018
|
A General Introduction to Modern Cryptography |
RSAC USA 2018
|
Finding Needles in a Haystack: Effective Indicators of Insider Threat |
RSAC USA 2018
|
Tech Scams: It’s Time to Release the Hounds |
RSAC USA 2018
|
The Price of Cyber-Warfare |
RSAC USA 2018
|
COMMSEC: The Life & Death of Kernel Object Abuse |
HITBSecConf2018 – Amsterdam
|
Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment |
Black Hat Asia 2018
|