Lessons from a Recovering Runtime Application Self-Protection Addict |
RSAC USA 2017
|
Defending a Cloud Application |
RSAC USA 2016
|
Backdooring Git |
DEF CON 23
|
Closing the Gap: Steps to Satisfy the Demand for Security Talent |
RSAC USA 2015
|
Examining the Legal & Policy Implications of a Breach: Who's Responsible? |
RSAC USA 2013
|
Studio: Who, What, Where and How: Five Big Questions in Mobile Security |
RSAC USA 2013
|
Who, What, Where and How: Five Big Questions in Mobile Security |
RSAC USA 2013
|
Software Security Goes Mobile |
RSAC USA 2012
|