'Cyber' Who Done It?! Attribution Analysis Through Arrest History |
DEF CON 24
|
OSS Security Maturity: Time to Put On Your Big Boy Pants! |
Black Hat USA 2016
|
Bring Your Own Internet of Things (BYO-IoT) |
RSAC USA 2016
|
Stranger Danger! What is the Risk from 3rd Party Libraries? |
Black Hat USA 2015
|
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! |
DEF CON 22
|
Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread |
Black Hat USA 2014
|
Follow the Money: Security Researchers, Disclosure, Confidence and Profit |
RSAC USA 2014
|
Data Breach Intelligence: Does History Always Repeat Itself? |
RSAC USA 2013
|