- Presentations
- Documents
- Infographics
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Review Process From the Ground Up
Wendy Knox Everette
•
4 years ago
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
•
5 years ago
Purple Teaming with ATT&CK - x33fcon 2018
Christopher Korban
•
6 years ago
Multi-omics infrastructure and data for R/Bioconductor
Levi Waldron
•
6 years ago
WebXR: Introducing Mixed Reality and the Immersive Web - Peter O'Shaughnessy - Codemotion Rome 2018
Codemotion
•
5 years ago
OSINT like a Boss & Python Automation
Santhosh Baswa
•
5 years ago
SecOps - IR and Forensic Workflows - Python (Security Automation)
Santhosh Baswa
•
5 years ago
(SACON) Shomiron das gupta - threat hunting use cases
Priyanka Aash
•
5 years ago
End-to-End Security Analytics with the Elastic Stack
Elasticsearch
•
4 years ago
Threat-Modeling-as-Code: ThreatPlaybook AppSecUSA 2018 Presentation
Abhay Bhargav
•
5 years ago
IBM Bluemix OpenWhisk: IBM InterConnect 2017, Las Vegas, USA: Technical Strategy
OpenWhisk
•
7 years ago
SecOps Workshop (Gregory Pickett)
Priyanka Aash
•
6 years ago
Recent ECB/ EBA regulations how they will impact European banks in 2016
IBM Security
•
8 years ago
IBM Interconnect 2017 - Maximo update
Cyrus Sorab
•
6 years ago
Leveraging IoT and cognitive for asset and field force optimization_ibm
Cyrus Sorab
•
6 years ago
IOC Solutions By Element Blue
Steven Gerhardt
•
11 years ago
Docker and IBM Integration Bus
Geza Geleji
•
7 years ago
IBM Immune System
Luke Kenny
•
6 years ago
All products
Yasir Mohsin Kazmi
•
8 years ago