Talks about Cybersecurity

Watch best presentations on challenges, solutions, trends and outlook in Cybersecurity.

Sort by
Newest
Trending
1-30 of 230
Filter

ANGEL REDOBLE - CYBERSECURITY FORUM 2018:

03/27/2019
Views 366
0
asia, business, cybersecurity, event, hacking, leadership, networking, philippines, security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

ARTHUR NOWAK - ASIA BPM SUMMIT:

03/27/2019
Views 69
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

ELEK TOTH - ASIA BPM SUMMIT:

03/27/2019
Views 101
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

VICTOR ALIWALAS - ASIA BPM SUMMIT:

03/27/2019
Views 1.11 K
0
artificial intelligence, asia, asymmetric digital subscriber line, automation, bpo, business, business intelligence, business process management, call centre, cisco systems, cloud computing, digital subscriber line, disruptive innovation, e-commerce, event, fiber to the x, fiber-optic communication, instacart, leadership, networking, office 365, outsourcing, philippines, quality assurance, regulatory compliance, robot, siri, social media, software agent, technology roadmap, telecommuting, voice user interface, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

HAIDEE ENRIQUEZ - ASIA BPM SUMMIT:

03/27/2019
Views 148
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

RAVI AGARWAL - ASIA BPM SUMMIT:

03/27/2019
Views 63
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

SEAN MATHER - ASIA BPM SUMMIT:

03/27/2019
Views 24
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

CHRISTOPHE VICIC - ASIA BPM SUMMIT:

03/27/2019
Views 46
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

JOEY GURANGO - ASIA BPM SUMMIT:

03/27/2019
Views 47
0
asia, bpo, business, event, leadership, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

ALEXIS DABON - ASIA CEO FORUM CEBU:

03/27/2019
Views 43
0
asia, business, cebu, event, leadership, networking, philippines, property, real estate, visayas
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Amitt Sharma of observe.AI - Asia BPM Summit

03/27/2019
Views 669
0
asia, asia ceo, bpo, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Jonathan de Luzuriaga of Spring Valley Tech - Asia BPM Summit

03/27/2019
Views 111
0
asia, asia ceo, bpo, networking, outsourcing, philippines
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Vic Tria of PLDT Alpha - Asia BPM Summit

03/27/2019
Views 41
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Monchito Ibrahim, DICT - Asia BPM Summit 2019

03/27/2019
Views 122
0
analytics, business analytics, cebu, clinical coder, college, data science, health care, iloilo, iloilo city, informatics, information management, japan, lean six sigma, orlando, florida, outsourcing, philippines, reason, science, science, technology, engineering, and mathematics, singapore, six sigma, software, software development, startup company, voicemail
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: State of the Onion by Doug Burks and Mike Reeves

10/04/2019
Views 3.01 K
0
api, brand, central processing unit, computer monitor, cut, copy, and paste, domain name system, elasticsearch, grafana, graphical user interface, hyper-threading, internet, internet access, java (programming language), menu (computing), openvpn, pcap, security onion, security onion solutions, software, software performance testing, ssh (secure shell), steve jobs, transmission control protocol, tunneling protocol, twitter, unmanned aerial vehicle, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Introduction to Data Analysis by David Bianco

10/04/2019
Views 1.41 K
0
analytics, api, comma-separated values, command-line interface, data analysis, data type, hypertext transfer protocol, information security, json, library (computing), numpy, open-source software, project jupyter, python (programming language), seasonality, security onion, security onion solutions, software, spreadsheet, ssh (secure shell), stack (abstract data type), string (computer science), tab key, time series, truth, tunneling protocol, visualization (graphics)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Getting the Most out of Freq and Domain_Stats by Mark Baggett

10/04/2019
Views 1.09 K
0
artificial intelligence, bittorrent, botnet, database, domain name registrar, domain name system, entropy (information theory), hostname, intelligence, internet bot, machine learning, malware, name server, penetration test, powershell, punycode, regular expression, security onion, security onion solutions, transport layer security, twitter, unicode, web application, web server, website, windows 10, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Integrating Osquery into Security Onion by Josh Brower

10/04/2019
Views 1.02 K
0
aqua (user interface), blacklist (computing), computer network, cron, cross-platform software, dashboard (business), database, desktop computer, file-system permissions, geodetic datum, google chrome, identifier, ip address, laptop, linux, localhost, metadata, phishing, ping (networking utility), security onion, security onion solutions, software release life cycle, software versioning, sql, sql syntax, syslog, user identifier
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Pcaps Ahoy! by Brad Duncan

10/04/2019
Views 1.17 K
0
activex, adobe flash, bios, botnet, computer network, cryptocurrency, domain name system, email, email spam, handshaking, hypertext transfer protocol, internet, internet explorer, linux distribution, malware, microsoft powerpoint, port (computer networking), public key certificate, security onion, security onion solutions, server message block, transmission control protocol, transport layer security, trojan horse (computing), user datagram protocol, wireshark, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Welcome to Georgia Cyber Center by Todd Gay

10/04/2019
Views 384
0
atlanta, augusta university, augusta, georgia, coffee, computer security, cybercrime, education, elevator, entrepreneurship, fort gordon, georgia (u.s. state), georgia bureau of investigation, innovation, lunch, photocopier, reason, research, restaurant, savannah river, security onion, security onion solutions, space, startup company, technology, understanding, university system of georgia, virtual world
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Blue, Red, Purple, White: Which team are you on? By Don Murdoch

10/04/2019
Views 1.09 K
0
communication protocol, computer mouse, cryptographic hash function, gateway (telecommunications), gigabyte, h.323, internet protocol, ip address, learning, md5, network address translation, open-source-software movement, parsing, pcap, powershell, red team, research, security onion, security onion solutions, simulation, sql injection, transmission control protocol, use case, utility, voice over ip, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2018: Save Time with Modern Filtering Techniques by Mark Jeanmougin

10/04/2019
Views 1.6 K
0
book, central processing unit, command-line interface, computer data storage, computer file, data compression, digital forensics, font, granularity (parallel computing), input/output, instruction set architecture, intel, internet, man page, parallel computing, parameter (computer programming), pdf, pentium, postscript, printer (computing), research, security onion, security onion solutions, sim card, software, world wide web, zip (file format)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security Onion Conference 2019: Welcome and Opening Remarks

10/04/2019
Views 1.47 K
0
blood, cam, desk, fist bump, georgia (u.s. state), onion, perspiration, philips, photography, polk county, florida, security onion, security onion solutions, social media, technology
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Dominance as a New Trusted Computing Primitive for the IoT

05/22/2019
Views 399
0
authentication, booting, computer hardware, computing, contract, firmware, flash memory, flip-flop (electronics), hacker, hacker culture, infinite loop, internet, internet of things, law, memory, microcontroller, password, patch (computing), serial port, smart city, social norm, software, switch, timer, watchdog timer
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone

05/22/2019
Views 905
0
algorithm, ambient music, confidentiality, covid-19 pandemic, data compression, encryption, experiment, frequency, frequency domain, human eye, information, light, metadata, network packet, optical spectrometer, privacy, radar, selfie, signal, siren (alarm), time, unmanned aerial vehicle, video, wi-fi
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party...

05/22/2019
Views 461
0
amazon alexa, computer, computing, dog, experience, forensic dentistry, google, google nest (smart speakers), language, learning, mexico, mobile app, music, news, paypal, pretty good privacy, reddit, reputation, research, speech recognition, speech synthesis, spelling, tax, whatsapp, wisdom
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

SoK: Security Evaluation of Home Based IoT Deployment

05/22/2019
Views 806
0
amazon alexa, cloud computing, commercial off-the-shelf, communication protocol, component-based software engineering, domain name system, encryption, facebook, home network, internet, internet of things, man-in-the-middle attack, microsoft windows, mind, mobile app, privacy, quality of service, reliability engineering, snapshot (photography), software bug, ssh (secure shell), start menu, transport layer security, universal plug and play, windows xp
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

PhishFarm: A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against...

05/22/2019
Views 258
0
android (operating system), blacklist (computing), cloaking, cloud computing, data sharing, email, email spam, firefox, gmail, google chrome, internet, ios, multi-factor authentication, opera (web browser), outlook.com, phishing, safari (web browser), social engineering (security), trove, user agent, web browser, web crawler, website, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from...

05/22/2019
Views 313
0
amazon mechanical turk, bias, census, crowdsourcing, education, frequent-flyer program, internet, mathematics, mean, password, password strength, personal data, privacy, privacy settings, question, research, research question, sampling (statistics), sampling frame, social media, statistics, survey methodology, twitter, wi-fi, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions

05/22/2019
Views 159
0
alphabet, baidu, chinese dictionary, computer keyboard, consonant, dictionary, edit distance, english alphabet, english language, google ads, google search, google translate, pinyin, pinyin input method, recurrent neural network, search engine optimization, spamdexing, spamming, spelling, tone (linguistics), typographical error, vowel, web search engine, web traffic, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8