Past Presentations

  • The Researcher’s Guide to the IoT Galaxy
  • “I” Before “R” Except After “IOC”
  • Simplifying Cyber Security and Today’s Growing Regulatory Compliance
  • The “Big Security Flaw” & What CUs Must Know about Meltdown & Spectre
  • Tabletop Exercise: Migrating Business Data to the Cloud
  • 5 Low-Cost Cyber-Security Tips To Guard Against 85% Of Known Threats
  • Forging Forensic Fortifications
  • Bootstrapping A Security Research Project
  • Building a Security Strategy Without a Security Staff
  • Maneuvering Management Madness
  • CISOs Guide to Incident Response
  • Facilitating Fluffy Forensics
  • The Not-So-Improbable Future of Ransomware
  • An Introduction to Graph Theory for Security People Who Can’t Math Good
  • Fighting Child Exploitation with Oculum
  • Why Your Company Needs an Independent Security Advisory Board
  • Puppetizing Data Security, Compliance, and Privacy
  • APIs for Incident Response
  • DIY DNS DFIR: You’re Doing it WRONG
  • 15 Years Later: Data Awareness in a Post Robert Hanssen World
  • Hello Barbie Forensics
  • Are You Raising Your Internet Assets in a Bad Neighborhood?
  • Making Lemonade With (Data) Lemons
  • The Impact of Ransomware & How to Defend Against It
  • Research Into IoT Medical Device Security
  • Building Bridges: Forcing Hackers and Business to ‘Hug it Out’
  • Overlooked Opportunities and Environmental Epiphanies
  • The Five Point Palm Exploding Heart Technique for Forensics
  • Unveiling the Open Source Visualization Engine for Busy Hackers
Scroll to top