Мероприятия Добавить мероприятие Спикеры Доклады Коллекции
 

Доклады по теме Кибербезопасность

Смотрите лучшие доклады о проблемах, решениях, тенденциях и перспективах в кибербезопасности.

Сортировать по
Новизне
Популярности
1-30 из 601
1-30 из 601
Фильтр

Как строить работу службы ИБ через риски безопасности?

21.09.2021
Просмотра 42
0
Доступно
В корзине
1 000 ₽
1 000 ₽
$15
$15
€ 13
€ 13
A$20
A$20

Top Seven AI Breaches: Learning to Protect Against Unsafe Learning

20.05.2021
Просмотра 63
0
algorithm, chatbot, ethics, gender, knowledge, machine learning, reason, siri, anger, antivirus software, axiom, gender neutrality, global catastrophic risk, good and evil, human subject research, logic, non-binary gender, theory, thought, transparency (behavior), violence, top seven ai breaches
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

The UDS Security Model of the Tesla CAN Bus and Battery Management System

20.05.2021
Просмотров 60
0
backup, bluetooth, debugging, firmware, linux, nvidia, reason, assembly language, can bus, computer file, electric battery, electrical resistance and conductance, jtag, password, resistor, system on a chip, tegra, temperature, tesla model s, tesla, inc., upload, voltage, contactor, shunt (electrical), security model
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

So You Want to Be an Expert Witness

20.05.2021
Просмотров 58
0
knowledge, lawsuit, witness, attorney–client privilege, complaint, discovery (law), jargon, jury, non-disclosure agreement, salary, service of process, testimony, understanding, common law, expert witness, deposition (law), federal rules of evidence, evidence (law), bench trial, daubert standard, default judgment, prejudice (legal term), questioned document examination, tampering with evidence
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Adversary Simulation: Close the Gaps in Your Security Posture

20.05.2021
Просмотра 54
0
api, application security, architect, automation, computer security, information security, outsourcing, red team, robotics, simulation, system, web service, active directory, antivirus software, audit, computer network, cron, cyberwarfare, proxy server, regulatory compliance, swot analysis, thought, understanding, vulnerability (computing), adversary simulation
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Blockchain Security Guarantees and Exploits

20.05.2021
Просмотра 72
0
cryptocurrency, fuzzing, github, malware, computer monitor, cryptographic hash function, elliptic curve digital signature algorithm, hdmi, probability distribution, random number generation, randomness, role-playing game, security hacker, software bug, tempest (codename), virtual economy, world of warcraft, massively multiplayer online role-playing game, deviation (statistics), continuous uniform distribution, digital visual interface, wildstar (video game)
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Who Stole My 100,000 Dollars’ Worth Bitcoin Wallets - Story of HoneyTokens

20.05.2021
Просмотров 57
0
backup, bitcoin, computer security, cryptocurrency, mind, operating system, pdf, research, belief, computer file, credit card, cyberwarfare, desktop metaphor, directory (computing), domain name system, firefox, gps tracking unit, http 404, honeypot (computing), hypertext transfer protocol, icon (computing), thought, user agent, web server, world wide web
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

The Scientific Method: Security Chaos Experimentation & Attacker Math

20.05.2021
Просмотров 68
0
design, experiment, knowledge, learning, memory, mindset, physics, prediction, progress, reality, science, belief, branches of science, calculus, cognition, confidence, force, game theory, isaac newton, psychological resilience, scientific method, theory, truth, rational choice theory, behavioral game theory
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Weak Links in Cloud IAM - Never Trust. Always Verify!

20.05.2021
Просмотров 67
0
best practice, cryptocurrency, education, icloud, identity management, kubernetes , amazon elastic compute cloud, credential, image scanner, login, multi-factor authentication, principle of least privilege, rsa security, superuser, user (computing)
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Securing Tesla and Mobileye from Split-Second Phantom Attacks

20.05.2021
Просмотров 78
0
color, computer security, deep learning, internet, machine learning, pixel, prediction, science, self-driving car, traffic, camera, lidar, optical flow, optics, outlier, perception, projector, stereoscopy, tesla, inc., truth, visual perception, robust statistics, depth perception
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Infosec Makeover: Love it or Leave it, Product Security is Here to Stay

20.05.2021
Просмотра 74
0
business, case study, cloud computing, continuous integration, facebook, firmware, identity management, information security, product lifecycle, recruitment, team, construction, inspection, intrusion detection system, job description, laptop, medical device, password, penetration test, physical security, plumbing, systems development life cycle, technical support
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Ransomware Threat Landscape

20.05.2021
Просмотров 65
0
backup, categorization, crowdstrike, data center, encryption, fraud, malware, motivation, ransomware, software , antivirus software, application software, belief, cryptolocker, espionage, microsoft exchange server, microsoft windows, national health service, spamming, testimony, virtual machine, vulnerability (computing), bank fraud, extortion, cheque fraud
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Displacing the Dollar: Is Crypto Robust Enough to be the New Reserve Currency?

20.05.2021
Просмотров 78
0
bitcoin, blockchain, cash, computer security, cryptocurrency, machine learning, malware, monero, monetization, money, satoshi nakamoto, bitcoin network, bretton woods system, consensus (computer science), devaluation, digital currency, fixed exchange rate system, inflation, keystroke logging, legal tender, medium of exchange, mining pool, monetary policy, option (finance), balance of payments
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

From Zero to Hero – How Cisco Deployed Zero Trust in Five Months

20.05.2021
Просмотра 162
0
advertising, authentication, cisco systems, cloud computing, salesforce, active directory, android (operating system), certificate authority, computer network, dmz (computing), end user, microsoft windows, mobile device, multi-factor authentication, password, push technology, tablet computer, virtual private network
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Cybersecurity Metrics Development for Board and Risk Committee Reporting

20.05.2021
Просмотров 97
0
computer security, cybersecurity, information security, machine, pain, policy, property, audit, curiosity, evidence, penetration test, regulatory compliance, risk assessment, strategic planning, vulnerability (computing), public utility
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Multi-Cloud Security Monitoring and CIS Benchmarks Evaluation at Scale

20.05.2021
Просмотров 85
0
cloud computing, computer programming, computer security, database, elasticsearch, facebook, identity management, information security, json, mongodb, operating system, programming language, proprietary software, relational database, system, cloud computing security, computer data storage, dashboard (business), evaluation, file format, ip address, input/output, interface (computing), regulatory compliance, scheme (programming language), multi-cloud security monitoring
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Burnout—The Greatest Threat to Your Organization’s Security

20.05.2021
Просмотров 69
0
anxiety, employment, fatigue, health, heart, music, pandemic, risk, sleep, stroke, covid-19 pandemic, cortisol, depression (mood), headache, herpes labialis, hypertension, influenza, major depressive disorder, myocardial infarction, security hacker, stress (biology), telecommuting, working time, weakness, muscle weakness
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Serverless Architecture Security Patterns for Securing the Unseen

20.05.2021
Просмотров 80
0
authentication, edge computing, facebook, identity management, product lifecycle, robot, search engine, amazon dynamodb, authorization, command-line interface, computer network, data validation, end user, firewall (computing), function (mathematics), kernel (operating system), server (computing), serverless computing, single sign-on, social norm, transport layer security
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Developers Dislike Security: Ten Frustrations and Resolutions

20.05.2021
Просмотра 82
0
application security, computer programming, creativity, devops, empathy, mind, reason, software testing, value proposition, attitude (psychology), azure devops server, faith, guard rail, i'm with you (album), return on investment, risk assessment, sql injection, software bug, understanding
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Using Threat Modeling to Improve Compliance

20.05.2021
Просмотров 78
0
accessibility, authentication, computer security, credit, data security, law, outsourcing, point of sale, shopify, software development, audit, contract, credit card, general data protection regulation, opera (web browser), payment card industry data security standard, rsa conference, regulatory compliance, software framework, peripheral component interconnect, pci-x
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

How I Hacked Your Website and You Didn’t Even Know

20.05.2021
Просмотров 77
0
google chrome, internet, internet security, javascript, malware, operating system, web analytics, web application, website, alexa internet, content security policy, credit card fraud, data exfiltration, exploit (computer security), html5, hypertext transfer protocol, internet privacy, personal computer, proxy server, server (computing), web browser, world wide web, solarwinds
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Malware Reverse Engineering with PE Tree—OSS Inspired by COVID

20.05.2021
Просмотра 83
0
api, compiler, data, database, memory, operating system, reverse engineering, 32-bit computing, bit, booting, byte, computer file, core dump, entropy, entry point, http cookie, itch, lighting, portable executable, signature, sky, software bug, string (computer science), covid, 16-bit computing, malware reverse engineering
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Me, My Adversary & AI: Investigating & Hunting with Machine Learning

20.05.2021
Просмотров 110
0
anomaly detection, big data, computer, emerging technologies, machine learning, memory, metadata, news, prediction, science, system, technology, computer file, directory (computing), file system, forensic science, password, police, scheduling (computing), tablet computer, thread (computing), wisdom, artifact (archaeology)
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Cybersecurity Controls: It Isn't Just Technical Controls That Need Testing

20.05.2021
Просмотра 74
0
computer security, database, disease, email, memory, mining, privacy, risk, simulation, water, access control, civilization, credit card, password, patch (computing), security hacker, server (computing), the abyss, time zone, user (computing), virtual private network, white hat (computer security), database security
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts

20.05.2021
Просмотров 108
0
computer security, data security, european union, national security, surveillance, united states, covid-19 pandemic, china–united states trade war, cyberwarfare, e-democracy, great firewall, huawei, information privacy, just-in-time manufacturing, new world order (politics), psychological resilience, supply chain attack, arms industry, hong kong national security law, splinternet
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Modern Identity Hacking: Have Hackers Really Adjusted to Constant Remote?

20.05.2021
Просмотра 74
0
authentication, biometrics, data breach, data security, internet, powershell, authorization, computer file, computer network, dmz (computing), laptop, multi-factor authentication, outlook.com, password, physical security, server (computing), telecommuting, url redirection, web browser, world wide web, help desk, iris recognition, modern identity hacking
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Your Metrics Suck! 5 SecOps Metrics That Are Better Than MTTR

20.05.2021
Просмотров 96
0
automation, business, insurance, intelligence, investment, knowledge, language, learning, mindset, research, resource, shopping, utility, attention, bit, book, covid-19 pandemic, firewall (computing), lottery, mission statement, truth, use case, self-efficacy, 5 secops metrics, next-generation firewall
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Cloud Threat Modeling - from Architecture Design to Application Development

20.05.2021
Просмотров 308
0
cloud computing, database, design, elasticsearch, encryption, privacy, risk, sap, cloud computing security, denial-of-service attack, educational technology, social engineering (security), threat model, troy, vulnerability (computing), greek mythology, agamemnon, trojan horse, cloud threat modeling, achilles, home alone, kevin mccallister, marv (sin city), misuse case, software assurance
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Hacker’s Paradise: Top 10 Biggest Threats When Working From Home

20.05.2021
Просмотра 82
0
best practice, chromebook, computer security, email, facebook, internet, malware, operating system, social media, wi-fi, computer network, cybercrime, dynamic-link library, http cookie, microsoft sql server, multi-factor authentication, online and offline, password, proxy server, server message block, spamming, telecommuting, virtual private network, windows task scheduler, biggest threats, hacker’s paradise
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно

Ethical AI: Addressing Bias & Algorithmic Fairness

20.05.2021
Просмотра 93
0
algorithm, computer science, computer vision, ethical ai, machine learning, malware, prediction, reason, science, twitter, accuracy and precision, deepfake, display resolution, doctor of philosophy, facial recognition system, graduate school, sensitivity and specificity, statistical classification, training, validation, and test sets, kullback–leibler divergence, addressing bias, algorithmic fairness
Доступно
В корзине
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
Бесплатно
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 21
1-30 из 601
Рекомендуемые спикеры
Suzanne Frey
Vice President, Engineering в Google Cloud
Alan Paller
President в SANS Technology Institute
Ed Skoudis
Instructor в SANS Institute
Heather Mahalik
Director of Forensics Engineering в ManTech
Johannes Ullrich
Dean of Research в SANS Technology Institute
Robert Lee
Chief Executive Officer and Founder в Dragos, Inc.