Events Add an event Speakers Talks Collections
 

Talks about Cybersecurity

Watch best presentations on challenges, solutions, trends and outlook in Cybersecurity.

Sort by
Newest
Trending
1-30 of 454
1-30 of 454
Filter

Top Seven AI Breaches: Learning to Protect Against Unsafe Learning

05/20/2021
Views 63
0
algorithm, chatbot, ethics, gender, knowledge, machine learning, reason, siri, anger, antivirus software, axiom, gender neutrality, global catastrophic risk, good and evil, human subject research, logic, non-binary gender, theory, thought, transparency (behavior), violence, top seven ai breaches
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The UDS Security Model of the Tesla CAN Bus and Battery Management System

05/20/2021
Views 58
0
backup, bluetooth, debugging, firmware, linux, nvidia, reason, assembly language, can bus, computer file, electric battery, electrical resistance and conductance, jtag, password, resistor, system on a chip, tegra, temperature, tesla model s, tesla, inc., upload, voltage, contactor, shunt (electrical), security model
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

So You Want to Be an Expert Witness

05/20/2021
Views 55
0
knowledge, witness, attorney–client privilege, complaint, discovery (law), jargon, jury, non-disclosure agreement, salary, service of process, testimony, understanding, common law, expert witness, federal rules of evidence, evidence (law), bench trial, daubert standard, default judgment, prejudice (legal term), questioned document examination, tampering with evidence
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Adversary Simulation: Close the Gaps in Your Security Posture

05/20/2021
Views 50
0
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Blockchain Security Guarantees and Exploits

05/20/2021
Views 70
0
blockchain, cryptocurrency, ethereum, fuzzing, github, malware, smart contract, computer monitor, cryptographic hash function, elliptic curve digital signature algorithm, hdmi, probability distribution, random number generation, randomness, role-playing game, security hacker, software bug, tempest (codename), virtual economy, world of warcraft, massively multiplayer online role-playing game, deviation (statistics), continuous uniform distribution, digital visual interface, wildstar (video game)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Who Stole My 100,000 Dollars’ Worth Bitcoin Wallets - Story of HoneyTokens

05/20/2021
Views 57
0
backup, bitcoin, computer security, cryptocurrency, mind, operating system, pdf, research, belief, computer file, credit card, cyberwarfare, desktop metaphor, directory (computing), domain name system, firefox, gps tracking unit, http 404, honeypot (computing), hypertext transfer protocol, icon (computing), thought, user agent, web server, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The Scientific Method: Security Chaos Experimentation & Attacker Math

05/20/2021
Views 67
0
experiment, mindset, physics, branches of science, calculus, cognition, confidence, force, game theory, isaac newton, theory, rational choice theory, behavioral game theory
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Weak Links in Cloud IAM - Never Trust. Always Verify!

05/20/2021
Views 63
0
authentication, best practice, cloud computing, cryptocurrency, database, education, encryption, icloud, identity management, kubernetes , research, risk, amazon elastic compute cloud, cloud computing security, credential, firewall (computing), image scanner, login, multi-factor authentication, password, principle of least privilege, rsa security, superuser, user (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Securing Tesla and Mobileye from Split-Second Phantom Attacks

05/20/2021
Views 76
0
color, computer security, deep learning, internet, machine learning, pixel, prediction, science, self-driving car, traffic, camera, lidar, optical flow, optics, outlier, perception, projector, stereoscopy, tesla, inc., truth, visual perception, robust statistics, depth perception
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Infosec Makeover: Love it or Leave it, Product Security is Here to Stay

05/20/2021
Views 67
0
case study, continuous integration, construction, inspection, job description, plumbing, systems development life cycle, technical support
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ransomware Threat Landscape

05/20/2021
Views 62
0
categorization, crowdstrike, cryptolocker, espionage, microsoft exchange server, national health service, testimony, virtual machine, bank fraud, cheque fraud
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Displacing the Dollar: Is Crypto Robust Enough to be the New Reserve Currency?

05/20/2021
Views 77
0
cash, monero, monetization, satoshi nakamoto, bitcoin network, bretton woods system, consensus (computer science), devaluation, fixed exchange rate system, inflation, keystroke logging, legal tender, medium of exchange, mining pool, monetary policy, option (finance), balance of payments
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

From Zero to Hero – How Cisco Deployed Zero Trust in Five Months

05/20/2021
Views 137
0
advertising, salesforce, mobile device, push technology
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Metrics Development for Board and Risk Committee Reporting

05/20/2021
Views 91
0
machine, pain, policy, property, team, bank, board of directors, consensus decision-making, curiosity, evidence, strategic planning, truth, public utility
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Multi-Cloud Security Monitoring and CIS Benchmarks Evaluation at Scale

05/20/2021
Views 80
0
computer programming, facebook, identity management, information security, json, mongodb, operating system, programming language, proprietary software, relational database, system, cloud computing security, computer data storage, dashboard (business), evaluation, file format, input/output, interface (computing), regulatory compliance, scheme (programming language), multi-cloud security monitoring
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Burnout—The Greatest Threat to Your Organization’s Security

05/20/2021
Views 68
0
anxiety, fatigue, health, heart, music, sleep, stroke, cortisol, depression (mood), headache, herpes labialis, hypertension, influenza, major depressive disorder, myocardial infarction, stress (biology), working time, weakness, muscle weakness
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Serverless Architecture Security Patterns for Securing the Unseen

05/20/2021
Views 78
0
edge computing, justice, robot, search engine, data validation, function (mathematics)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Developers Dislike Security: Ten Frustrations and Resolutions

05/20/2021
Views 78
0
creativity, software testing, value proposition, attitude (psychology), azure devops server, faith, guard rail, i'm with you (album), return on investment, risk assessment, sql injection
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Using Threat Modeling to Improve Compliance

05/20/2021
Views 75
0
accessibility, credit, shopify, opera (web browser), payment card industry data security standard, peripheral component interconnect, pci-x
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How I Hacked Your Website and You Didn’t Even Know

05/20/2021
Views 74
0
internet, internet security, javascript, web analytics, web application, website, alexa internet, content security policy, credit card fraud, data exfiltration, exploit (computer security), html5, internet privacy, personal computer, proxy server, server (computing), vulnerability (computing), world wide web, solarwinds
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Malware Reverse Engineering with PE Tree—OSS Inspired by COVID

05/20/2021
Views 83
0
data, 32-bit computing, bit, booting, byte, entropy, entry point, itch, portable executable, signature, sky, string (computer science), covid, 16-bit computing, malware reverse engineering
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Me, My Adversary & AI: Investigating & Hunting with Machine Learning

05/20/2021
Views 110
0
anomaly detection, computer, emerging technologies, directory (computing), forensic science, police, scheduling (computing), tablet computer, wisdom, artifact (archaeology)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Controls: It Isn't Just Technical Controls That Need Testing

05/20/2021
Views 73
0
disease, mining, water, civilization, the abyss, time zone, uncertainty, database security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts

05/20/2021
Views 105
0
european union, manufacturing, national security, china–united states trade war, e-democracy, great firewall, huawei, just-in-time manufacturing, new world order (politics), arms industry, hong kong national security law, splinternet
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Modern Identity Hacking: Have Hackers Really Adjusted to Constant Remote?

05/20/2021
Views 74
0
laptop, outlook.com, physical security, url redirection, help desk, modern identity hacking
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Your Metrics Suck! 5 SecOps Metrics That Are Better Than MTTR

05/20/2021
Views 93
0
automation, business, insurance, intelligence, investment, knowledge, language, learning, mindset, research, resource, shopping, utility, attention, bit, book, covid-19 pandemic, firewall (computing), lottery, mission statement, truth, use case, self-efficacy, 5 secops metrics, next-generation firewall
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cloud Threat Modeling - from Architecture Design to Application Development

05/20/2021
Views 301
0
design, elasticsearch, sap, cloud computing security, denial-of-service attack, educational technology, threat model, troy, greek mythology, agamemnon, trojan horse, cloud threat modeling, achilles, home alone, kevin mccallister, marv (sin city), misuse case, software assurance
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hacker’s Paradise: Top 10 Biggest Threats When Working From Home

05/20/2021
Views 82
0
best practice, chromebook, email, facebook, operating system, social media, cybercrime, dynamic-link library, http cookie, microsoft sql server, multi-factor authentication, online and offline, password, proxy server, server message block, spamming, telecommuting, virtual private network, windows task scheduler, biggest threats, hacker’s paradise
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Ethical AI: Addressing Bias & Algorithmic Fairness

05/20/2021
Views 90
0
algorithm, computer science, computer vision, ethical ai, prediction, accuracy and precision, deepfake, display resolution, doctor of philosophy, graduate school, sensitivity and specificity, statistical classification, training, validation, and test sets, kullback–leibler divergence, addressing bias, algorithmic fairness
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The Rise of the BISO Role

05/20/2021
Views 110
0
business, google, science, strategy, beast (comics), compliance (psychology), contract, operating model, promise, strategic management, internal audit, pawnbroker, biso role
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
1-30 of 454
Featured Speakers
Suzanne Frey
Vice President, Engineering at Google Cloud
Alan Paller
President at SANS Technology Institute
Ed Skoudis
Instructor at SANS Institute
Heather Mahalik
Director of Forensics Engineering at ManTech
Johannes Ullrich
Dean of Research at SANS Technology Institute
Robert Lee
Chief Executive Officer and Founder at Dragos, Inc.