2021-10-07 | Pete Lindstrom, Applying Risk Reduced per Unit Cost to IT Adversarial Risk Management, Phils |
2021-10-07 | Paul Simmonds, Fix digital identity, stop the bad guys |
2021-10-07 | Max Kilger, Anticipating the Nature and LIkelihood of a Cyberterror Community |
2021-10-07 | Kelly Shortridge, Know Thyself Optimizing Team Decision Making |
2021-10-07 | Jonathan Spring,Forensics, decisions, and making the abstract concrete |
2021-10-07 | John Brown, Drop packets really fast with BGP, uRPF and Exa BGP, Ops Track |
2021-10-07 | Trenton Ivey, The Medium Makes the Art Vulnerabilities vs Tactics |
2021-10-07 | Tom Ottoson, Finding the Grey Sheep before they go Baaaaad |
2021-10-07 | Steve Crocker, The standards process |
2021-10-07 | Sounil Yu, The Cyber Defense Matrix A Scientific Model for Cybersecurity |
2021-10-07 | Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track |
2021-10-07 | Slack Announcement |
2021-10-07 | Sacha Faust, Scaling Red Team, Ops Track |
2021-10-07 | Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track |
2021-10-07 | Ido Safruti, Abusing Google and Facebook login, Ops Track |
2021-10-07 | Gadi Evron, Co evolutionary arms races with potentially highly adapted adversary |
2021-10-07 | Falcon Darkstar Momot, How can a protocol be concise |
2021-10-07 | Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track |
2021-10-07 | Conference Intro feat Gadi Evron, Stop Putting Attackers on A Pedestal |
2021-10-07 | Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track |
2021-10-07 | Art Manion, Desperately Seeking Severity |