Hacking Bourbon

il y a 4 ans 208 Vues

2013 (ISC)² Congress: This Curious Thing Called Ethics

il y a 6 ans 85 Vues

Securing Big Data and the Grid

il y a 6 ans 75 Vues

Perimeter Defense in a World Without Walls

il y a 6 ans 279 Vues

Risk Based Planning for Mission Continuity

il y a 6 ans 115 Vues

Security Capability Model - InfoSec Forum VIII

il y a 6 ans 709 Vues

Advanced IAM - Surviving the IAM Audit

il y a 6 ans 78 Vues

Debunking Information Security myths

il y a 6 ans 71 Vues

Hacking a Major Security Conference

il y a 6 ans 72 Vues

Building & Running A Successful Identity Program

il y a 6 ans 52 Vues

Case Study: Securing & Tokenizing Big Data

il y a 6 ans 63 Vues

Crypto in the Real World: or How to Scare an IT Auditor

il y a 6 ans 98 Vues