- Präsentationen
- Dokumente
- Infografiken
Winning in the Dark: Defending Serverless Infrastructure
Puma Security, LLC
•
Vor 3 Jahren
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos, Inc.
•
Vor 3 Jahren
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ATT&CK – Attacker perspective
Marina Krotofil
•
Vor 4 Jahren
Adversary Emulation using CALDERA
Erik Van Buggenhout
•
Vor 4 Jahren
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Threat Detection
Dragos, Inc.
•
Vor 5 Jahren
Dressing up the ICS Kill Chain
Dragos, Inc.
•
Vor 4 Jahren
Fortinet: The New CISO – From Technology to Business Focused Leadership
Mighty Guides, Inc.
•
Vor 5 Jahren
Neighborhood Keeper - Introduction
Dragos, Inc.
•
Vor 4 Jahren
A Case Study on Payment Card Industry Data Security Standards
Victor Oluwajuwon Badejo
•
Vor 8 Jahren
The TTPs of hard hat incident response
Hinne Hettema
•
Vor 4 Jahren
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
•
Vor 5 Jahren
Industrial IoT Security Standards & Frameworks
Priyanka Aash
•
Vor 7 Jahren
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
•
Vor 5 Jahren
Smart Meter- Overview of System and Capabilities
REC Power Distribution Company Ltd, (A wholly own subsidiary of REC Ltd ,a Navratna CPSE ' )
•
Vor 11 Jahren
Smart grid networks and security architecture: Threat analysis, threat scenarios and vulnerabilities
John-André Bjørkhaug
•
Vor 9 Jahren
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
•
Vor 5 Jahren
(SACON) Wasim Halani - OSINT threat hunting
Priyanka Aash
•
Vor 5 Jahren
Serverless Security: What's Left To Protect
Guy Podjarny
•
Vor 5 Jahren
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
veerababu penugonda(Mr-IoT)
•
Vor 5 Jahren
Re engineering process of sri lankan national transport service
Udara Seneviratne
•
Vor 11 Jahren