Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 70
1-30 of 70
Filter

The unexpected life of a DAO coordinator

09/15/2021
Views 509
0
creativity, culture, engineering, experience, feeling, nintendo, nothing, organization, reason, team, technology, tool, apathy, catholic church, decision-making, guild, instinct, j. k. rowling, lol, mass, prayer, self-actualization, social engineering (security), zero-sum game, preference
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Azure security baseline for Azure Serveless

09/29/2021
Views 260
0
amazon web services, api, authentication, business, computer security, database, malware, microsoft, powershell, security token, software as a service, backdoor (computing), code injection, https, hypertext transfer protocol, laptop, login, microsoft windows, multi-factor authentication, password, social engineering (security), usb, user (computing), virtual private network, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Microsoft’s Journey to Digitally Transforming the Customer Experience

09/21/2021
Views 63
0
best practice, bluetooth, cloud computing, customer experience, digital transformation, engineering, expert, intelligence, microsoft, software , time, virtual assistant, correlation and dependence, customer satisfaction, interactive voice response, knowledge base, performance indicator, real-time computing, social engineering (security), subject-matter expert, tablet computer, translation, troubleshooting, visualization (graphics)
Available
In cart
2 308 ₽
2 308 ₽
$29
$29
€ 29
€ 29
A$45
A$45
£25
£25
C$42
C$42

Nowhere to Hide: How COVID-19 Forever Changed Your Company’s Attack Surface

01/27/2021
Views 138
0
cloud computing, computer security, cybersecurity, health, information, infosec, mobile app, national security, operating system, personal data, phishing, public health, ransomware, rsa, rsac, rsaconference, security, siri, android (operating system), credential, cyberwarfare, espionage, gateway (telecommunications), internet protocol, microsoft windows, social engineering (security), telecommuting, thought, vulnerability (computing), world wide web, health technology, extortion
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Lessons Learned Developing an AI Cyber Immune System: The Good, Bad & Ugly

01/27/2021
Views 208
0
automation, big data, computer security, cybersecurity, information, infosec, infrastructure, internet of things, machine learning, rsa, rsac, rsaconference, security, unmanned aerial vehicle, cyber-physical system, cyberattack, cyberwarfare, digital twin, distributed generation, energy development, intrusion detection system, operational technology, perception, power station, social engineering (security), stuxnet, telecommuting, transport, trust (social science), zero-day (computing), transport network analysis
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Locking Down the Security of IAM | Josh Stella | Conf42: Cloud Native

04/29/2021
Views 96
0
amazon web services, api, asynchronous, automation, best practice, cloud computing, data center, data lakes, database, distributed database, fintech, graalvm, hacker, hdfs, health check, identity management, kotlin, microservice, operating system, public cloud, quarkus, serverless, social media, telemetry, twitter, active directory, amazon elastic compute cloud, authorization, cgroups, cloud computing security, data exfiltration, function (mathematics), health insurance portability and accountability act, need for speed, security hacker, social engineering (security), use case, vulnerability (computing), world wide web, attribute-based access control, flagger , app migration, caching patterns, cloud sidecar, clusters gitops, fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, graviton2, iam reliability, infrastructure drift, jumpstart, kubernetes cloud, multi-cloud magic, opa, open liberty, pipelines ci/cd, poilcy-as-code
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Cloud Threat Modeling - from Architecture Design to Application Development

05/20/2021
Views 2.16 K
0
cloud computing, database, design, elasticsearch, encryption, privacy, risk, cloud computing security, denial-of-service attack, educational technology, social engineering (security), threat model, troy, vulnerability (computing), greek mythology, agamemnon, trojan horse, cloud threat modeling, achilles, home alone, kevin mccallister, marv (sin city), misuse case, software assurance
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

The Road to End-to-End Encryption

05/20/2021
Views 291
0
cloud computing, cryptography , email, encryption, github, alice and bob, backdoor (computing), client (computing), cryptographic hash function, email address, end-to-end encryption, key (cryptography), laptop, man-in-the-middle attack, martin hellman, patch (computing), public-key cryptography, server (computing), single sign-on, social engineering (security), telephone, transport layer security, videotelephony, whitfield diffie, zoom (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

How the BEC Threat Landscape is Evolving and What We Can Do About It

05/20/2021
Views 181
0
fraud, internet, investment, investor, money laundering, phishing, ransomware, real estate investing, walmart, apple inc., cyberattack, cybercrime, cyberwarfare, debit card, english language, itunes, lawyer, mail, payroll, receipt, social engineering (security), sole proprietorship, wire transfer, green dot corporation, stored-value card, bec
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Purple Team Auth: Hacking & Bypassing MFA Systems, and How to Armor Up

05/20/2021
Views 305
0
authentication, phishing, sms, twitter, active directory, dmz (computing), emv, firewall (computing), lock and key, mobile browser, multi-factor authentication, one-time password, password, sim card, security hacker, single sign-on, social engineering (security), spoofing attack, syslog, text messaging, voicemail, webmail, world wide web, icloud leaks of celebrity photos, mfa systems
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Getting Engagement in the Midst of Chaos

09/17/2020
Views 44
0
anxiety, brain, cybersecurity, emotion, fatigue, gamification, human, information, infosec, leadership, learning, misinformation, psychology, reason, rsa, rsac, rsaconference, security, social media, twitter, water, amazon (company), attention, clickbait, human factors and ergonomics, nature, password, self, social engineering (security), text messaging, thought, zoom (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Your Application is Mostly Written by Strangers

09/17/2020
Views 103
0
authentication, cryptocurrency, cybersecurity, information, infosec, internet, java (programming language), javascript, malware, open source, open-source software, programmer, research, rsa, rsac, rsaconference, security, software , software development, source code, apache maven, application software, distributed version control, free software, library (computing), multi-factor authentication, npm (software), password, social engineering (security), software bug, vbscript, rubygems
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Securing Your M&A Activity with Cybersecurity Due Diligence

09/15/2020
Views 379
0
application security, authentication, case study, cloud computing, computer security, computing, cybersecurity, email, encryption, information, information security, infosec, intellectual property, privacy, risk, rsa, rsac, rsaconference, security, sms, telstra, access control, cyberattack, iso/iec 27001, information sensitivity, marriott international, mergers and acquisitions, one-time password, password, social engineering (security), valuation (finance), world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Inside the Mind of a Hacker: How a Light Bulb Almost Stopped Christmas

09/15/2020
Views 342
0
cloud computing, computer security, cybersecurity, database, information, infosec, internet, internet of things, phishing, rsa, rsac, rsaconference, security, social media, access control, bring your own device, computer network, cybercrime, firewall (computing), gateway (telecommunications), industrial internet of things, intrusion detection system, network security, password, penetration test, personal computer, piracy, server (computing), social engineering (security), user (computing), vulnerability (computing), world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Hacking People’s Mind: When Threat Actors Master Social Engineering

09/15/2020
Views 938
0
cybersecurity, digital transformation, engineering, information, infosec, insurance, machine, money, news, research, rsa, rsac, rsaconference, security, sms, statistics, united kingdom, brainstorming, covid-19 pandemic, child, cybercrime, jewellery, lease, radar, severe acute respiratory syndrome coronavirus 2, social engineering (security), text messaging, virus, help desk, prudential financial, relief
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Through the Eyes of the Adversary: How to Build a Threat Intel Program

09/15/2020
Views 1.12 K
0
automation, best practice, cybersecurity, engineering, information, infosec, intellectual property, intelligence, internet, learning, mind, organization, property, ransomware, reason, research, rsa, rsac, rsaconference, security, social media, space, supply chain, apple inc., bribery, denial-of-service attack, espionage, leverage (finance), physical security, probation, social engineering (security)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Preparing for page experience ranking | Session

05/19/2021
Views 19.72 K
0
accessibility, api, google, google chrome, google i/o, google io, google search, internet, javascript, malware, security, software , user experience, web application, web development, general data protection regulation, hypertext transfer protocol, internet privacy, life-cycle assessment, man-in-the-middle attack, social engineering (security), web browser, web page, world wide web, potentially unwanted program, google news, #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, type: conference talk (full production), purpose: educate, google page experience 2021, google page experience update 2021, google ranking factors 2021, google search central, google web search, how to improve website search performance, how to optimize web pages on google, page experience ranking signals, web search
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Evidence-Based Product Backlogs

11/17/2020
Views 2
0
computer, empathy, engineer, nothing, research, risk, software , startup company, twitter, usability, user experience, utility, amazon (company), ambiguity, application software, book, end user, evidence, filling station, luck, scrum (software development), social engineering (security), speculation, don norman
Available
In cart
1 989 ₽
1 989 ₽
$25
$25
€ 25
€ 25
A$39
A$39
£22
£22
C$36
C$36

Tech Talent 2020 - Unplugging Talent from Overseas

10/08/2020
Views 32
0
behavior, culture, customer, knowledge, leadership, linkedin, mindset, motivation, recruitment, reverse engineering, samsung, singapore, united states, booking.com, covid-19 pandemic, electric battery, goal, jesus, map, rapid transit, rapping, restaurant, social engineering (security), taxicab, romo
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Talk: Secure Software Supply Chains for Python

05/15/2021
Views 1.55 K
0
documentation, dustin ingram, malware, metadata, python, python code, python community, application software, computer file, computer keyboard, cryptographic hash function, cyberwarfare, denial-of-service attack, https, linux distribution, linux kernel, man-in-the-middle attack, package manager, password, patch (computing), python (programming language), social engineering (security), software bug, software repository, spamming, supply chain attack, web of trust, world wide web, python software foundation, pycon us, pycon us 2021, python talks 2021, python 2021, python tutorials 2021, dustin ingram python, python software supply chain, software supply chain, talk by dustin ingram
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Zelle® + U.S. Bank®: How Consumer Payment Innovations Are Influencing Business Operations

08/23/2020
Views 155
0
credit, mastercard, online banking, payments, peer-to-peer, point of sale, application software, automated teller machine, bank, cheque, credit card, debit card, economy of the united states, fee, financial transaction, password, payment, pricing, renting, social engineering (security), subscription business model, transaction account, visa inc., zelle (payment service), non-sufficient funds, ach network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

So you committed a secret... - GitHub Universe 2020

12/08/2020
Views 1.81 K
0
api, collaboration, dash, email, encryption, engineering, enterprise software, experience, future, git, github, google, open source, product lifecycle, programming, regular expression, software development, space, supply chain, twitter, version control, blog, cigarette, credential, innersource, internet troll, life-cycle assessment, ratio, social security (united states), social engineering (security), wisdom, github universe 2020, github universe, octocat
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Fraud Detection: Using ML to Identify and Manage Fraudulent Activities - L200 (United States)

05/13/2020
Views 3.25 K
0
2020, amazon, amazon s3, analytics, api, aws, fraud, insurance, internet, machine learning, microservices, prediction, research, united states, accuracy and precision, amazon alexa, artificial neural network, credit card, latency (engineering), predictive modelling, real-time computing, sensitivity and specificity, social engineering (security), training, validation, and test sets, type i and type ii errors, unsupervised learning, aws events, aws summit online, may 13, level 200, fraud detector, track 1, track 2, track: interact, track: machine learnin, track: machine learning
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Navigating Security, Privacy and Scalability concerns in the world of Blockchain | Discussion

07/16/2020
Views 47
0
authentication, biometrics, bitcoin, blockchain, cloud computing, computer security, facebook, google, internet of things, mobile security, mongodb, privacy, smart city, software , usability, youtube, android (operating system), consensus (computer science), database transaction, digital identity, multi-factor authentication, password, proof of work, public-key cryptography, social engineering (security)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Blockchain Africa Conference 2020 - Victor Mapunga

03/12/2020
Views 1.72 K
0
authentication, blockchain, census, cryptocurrency, internet, interoperability, know your customer, mobile app, money laundering, price, smartphone, sms, whatsapp, apple inc., birth certificate, credential, digital identity, existence, grandparent, identity document, mobile phone, social engineering (security), sub-saharan africa, verifiable credentials, unstructured supplementary service data
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Practical Defenses Against Adversarial Machine Learning

08/06/2020
Views 2.55 K
0
analytics, cloud computing, computer vision, cryptography , distributed computing, email, google play, machine learning, malware, phishing, proprietary software, research, reverse engineering, self-driving car, android (operating system), bit, byzantine fault, consensus (computer science), doctor of philosophy, facial recognition system, fault tolerance, sense, social engineering (security), statistical classification
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa

08/06/2020
Views 382
0
blockchain, computer security, conversation, education, expert, innovation, mentorship, mobile security, personal data, phishing, research, web application, automated teller machine, cyberattack, cybercrime, identity theft, information and communications technology, information sensitivity, one-time password, personal identification number, sim card, social engineering (security), telecommunication, vulnerability (computing), m-pesa
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

A Framework for Evaluating and Patching the Human Factor in Cybersecurity

08/06/2020
Views 357
0
computer security, email, facebook, information security, information security awareness , personal data, phishing, privacy, research, simulation, application software, browser isolation, communication protocol, computer network, evaluation, man-in-the-middle attack, password, self-report study, social engineering (security), vulnerability (computing), world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

How OHSU leveraged computer vision and IoT to help the battle against Covid-19

07/17/2020
Views 16
0
adoption, best practice, data analysis, engineering, ethics, future, health, health care, imagination, technology, venturebeat, anesthesiology, coronavirus disease 2019, health administration, health professional, health system, helicopter, hospital, intensive care medicine, intensive care unit, nursing, patient, pharmacist, physician, situation awareness, social engineering (security)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

AI and Security Lessons, Challenges and Future Directions | Dawn Song | AAAI Invited Talk

02/17/2020
Views 1.31 K
0
23andme, chatbot, computer security, cryptography , deep learning, differential privacy, economics, intelligence, machine learning, memory, phishing, privacy, speech recognition, statistics, amazon alexa, credit card, image segmentation, information sensitivity, latanya sweeney, privacy policy, social engineering (security), transparency (behavior), type system, ai conference, aaai, aaai 20, ai and security lessons, ai challenges and future directions, ai summer, dawn song, research conference, research talk, uc berkeley
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3
1-30 of 70