Events Add an event Speakers Talks Collections
 

Speakers on Cybersecurity

Learn from leading speakers on Cybersecurity sharing their perspectives, experience and insights.

Sort by
Newest
Trending
1-30 of 715
1-30 of 715
Filter
Thomas Rid
Professor of Strategic Studies at Johns Hopkins University's School of Advanced International Studies
Orde Kittrie
Professor of Law/Washington, DC Program at Arizona State University Law School
Dr. George Lucas
VADM James B. Stockdale Chair in Ethics and author of Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare at Naval War College
alphago, attitude (psychology), autonomy, bias, cyberwarfare, decision-making, free will, friendly fire, humanitarian intervention, iliad, international humanitarian law, international law, machine learning, military robot, moral reasoning, morality, motivation, reason, religion, right of return, russian interference in the 2016 united states elections, self-determination, watson (computer)
Jens David Ohlin
Allan R. Tessler Dean and Professor of Law at Cornell Law School
Dr. Michael L. Gross
Professor, and co-author of the forthcoming Soft War: The Ethics of Unarmed Conflict at the School of Political Science at the University of Haifa
artillery, civilian, concept, crime, cyberwarfare, hezbollah, human nature, idea, insurgency, international law, judgment (law), just war theory, justice, law of war, library, mental disorder, organized crime, proportionality (law), religion, state of nature, terrorism, torture, violence, war crime, west bank
Tami Meisels
Senior lecturer at Tel Aviv University
Edward Barrett
Professor and Research Director, Stockdale Center at U.S. Naval Academy
Helen Frowe
Professor of Practical Philosophy at University of Stockholm
David Omand
Senior Advisor at Paladin Capital Group
Dr. Tony Pfaff
Research Professor for the Military Profession and Ethic at Strategic Studies Institute
academi, aggression, causality, civilian, civil–military relations, consequentialism, cyberwarfare, distinguished warfare medal, global positioning system, injustice, leadership, maritime security, non-combatant, peacekeeping, piracy, proxy war, reason, rights, sandinista national liberation front, saudi arabia, strategic studies institute, united states department of state, united states naval academy, veteran, war
Dr. David J. Luban
University Professor in Law and Philosophy, Distinguished Chair in Ethics, and author of Torture, Power, and Law at Georgetown Law, Stockdale Center
alphago, attitude (psychology), autonomy, bias, cyberwarfare, decision-making, free will, friendly fire, humanitarian intervention, iliad, international humanitarian law, international law, machine learning, military robot, moral reasoning, morality, motivation, reason, religion, right of return, russian interference in the 2016 united states elections, self-determination, watson (computer)
Cecile Fabre
Senior Research Fellow at All Souls College
Michael Skerker
Associate professor in the Leadership, Ethics, and Law department at Naval Academy
Mitt Regan
McDevitt Professor of Jurisprudence and Co-Director of the Center for the Study of the Legal Profession and Senior Fellow at Georgetown University Law Center, Stockdale Center
centrality, civilian, communication protocol, computer network, imputation (law), international law, leadership, middle management, military, morality, organization, organizational structure, organized crime, resource, science, social network analysis, social science, targeted killing, terrorism, torture, transparency (behavior), unmanned combat aerial vehicle, violence, war crime, westphalian sovereignty
Michael Morell
Former Acting Director and Deputy Director at Central Intelligence Agency
Zekai Wu
security researcher at Tencent Security Xuanwu Lab
Hao Xing
Researcher at Tencent Security Xuanwu Lab
Kymberlee Price
Open Source Security Program Management Lead at Microsoft Corporation
amazon alexa, application security, cortana, encryption, exploit (computer security), github, hacker culture, information security, internet bot, investor, linux, malware, meltdown (security vulnerability), password, penetration test, post-traumatic stress disorder, social engineering (security), spectre (security vulnerability), startup company, voice user interface, vulnerability (computing), web browser, website, world wide web
Jason Healey
Senior Research Scholar at Columbia University's School for International and Public Affairs
Stephanie Domas
Director of Product Security Strategy at Intel
Jeff Moss
Commissioner at Global Commission on the Stability of Cyberspace
agile software development, android (operating system), anonymity, anycast, automation, bill booth, black hat, black hat 2018 briefings, black hat 2019, black hat briefings, black hat briefings 2018, black hat keynote, black hat usa, black hat usa 18, black hat usa 2018, black hat usa 2019, blackhat, blackhatusa, blame, christopher krebs, cisa, cold war, compliance (psychology), computer security, con, conference speakers, conversation, corbin souffrant, culture, cyberattack, cyberjunkie, cyberwarfare, decentralization, def, def con 2019, def con 27, defcon, denial-of-service attack, devops, digital journalism, dino dai zovi, disclosure, discovery (law), education, edward snowden, engineer, expert, federal bureau of investigation, feeling, firefox, freebsd, fuzzing, hacker conference, hackers, high-yield debt, international humanitarian law, internet, internet protocol suite, javascript, jennifer granick, ken thompson, kernel (operating system), law, linux, mind, multics, multistakeholder governance model, net neutrality, nothing, operating system, osi model, pablo breuer, privacy, punishment, pwn2own, reason, reasonable doubt, reciprocity (social psychology), request for comments, research, research and development, risk, root name server, runa sandvik, security conference, signal, software bug, software engineering, software engineering institute, software testing, subpoena, thought, time-sharing, tor (anonymity network), transparency (behavior), understanding, united nations, united states department of homeland security, unix, vulnerability (computing), web browser, whatsapp, windows xp, witness
Oryan De Paz
Low-Level Researcher & Developer at Symantec at Javelin
building a diverse security research team, the ripple effect
Omer Yair
Endpoint Team Lead at Symantec
64-bit computing, authentication, building a diverse security research team, call stack, cisco systems, computer security, con, concept, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, eye contact, gadget, hacker, hacker community, hacker conference, hackers, hacking conference, heat, instruction set architecture, jesus, microsoft windows, mind, money, pointer (computer programming), privilege escalation, research, security conference, security conference 2019, service pack, sms, switch, system call, textbook, the ripple effect, twitter, whatsapp, windows vista
Matt Tait
COO at Corellium
contactless deliveries
James Kettle
Head of Research at PortSwigger Web Security
accounting, adobe flash, application programming interface, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, bug bounty program, cache (computing), census, cloudflare, complex system, computer network, computer security, con, conference speakers, content delivery network, cross-site scripting, cyber security, dc27, deception, def, def con 2019, def con 27, defcon, determinism, dns spoofing, domain name system, drupal, end user, evidence, facebook, ghost, google search, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, hotspot (wi-fi), html, http cookie, https, hypertext transfer protocol, information, internationalization and localization, internet, internet explorer, ip address, javascript, kanye west, knowledge, malware, microsoft edge, moana (2016 film), music, ocean, open-source software, password, perception, pinterest, proxy server, query string, reddit, research, safari (web browser), same-origin policy, security conference, security conference 2019, server (computing), siri, sms, smuggling, software bug, synchronization, tax, text messaging, thai language, translation, transmission control protocol, transport-layer protocol, understanding, url, url redirection, user agent, voicemail, web browser, web cache, website, world wide web
Natalie Silvanovich
Security Researcher at Google
64-bit computing, apple inc., application software, assembly language, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, client (computing), compiler, email, email address, email client, exploit (computer security), google, imessage, instruction set architecture, internet, internet message access protocol, interpreter (computing), ios jailbreaking, java (programming language), javascript, jpeg, language, machine code, magic number (programming), memory, mind, modular programming, multimedia messaging service, music, object (computer science), page (computer memory), pointer (computer programming), program optimization, property list, reserved word, scripting language, serialization, server (computing), sms, software bug, subroutine, variable (computer science), visual voicemail, voicemail, vulnerability (computing), web browser, webassembly, world wide web
Richard Emerson
Senior Cyber Threat Analyst at IBM
security errors
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 24
1-30 of 715