rVMI: A New Paradigm for Full System Analysis |
Black Hat USA 2017
|
Are Legacy Malware Callbacks Clouding Your Security Operations Team? |
RSAC Abu Dhabi 2016
|
What's the DFIRence for ICS? |
Black Hat USA 2016
|
Using EMET to Disable EMET |
Black Hat USA 2016
|
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure |
RSAC Asia Pacific & Japan 2016
|
A New CVE-2015-0057 Exploit Technology |
Black Hat Asia 2016
|
Codifying the Brain: Automation, Alerts and a Human Resource Answer |
RSAC USA 2016
|
Hide and Seek: How Threat Actors Respond in the Face of Public Exposure |
RSAC USA 2016
|
How to Get into ICS Security |
RSAC USA 2016
|
NSM 101 for ICS |
DEF CON 23
|