- Presentations
- Documents
- Infographics
Winning in the Dark: Defending Serverless Infrastructure
Puma Security, LLC
•
3 years ago
How to Increase ICS Cybersecurity Return on Investment (ROI)
Dragos, Inc.
•
3 years ago
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ATT&CK – Attacker perspective
Marina Krotofil
•
4 years ago
Adversary Emulation using CALDERA
Erik Van Buggenhout
•
4 years ago
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Threat Detection
Dragos, Inc.
•
5 years ago
Dressing up the ICS Kill Chain
Dragos, Inc.
•
4 years ago
Fortinet: The New CISO – From Technology to Business Focused Leadership
Mighty Guides, Inc.
•
5 years ago
Neighborhood Keeper - Introduction
Dragos, Inc.
•
4 years ago
A Case Study on Payment Card Industry Data Security Standards
Victor Oluwajuwon Badejo
•
8 years ago
The TTPs of hard hat incident response
Hinne Hettema
•
4 years ago
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
•
5 years ago
Industrial IoT Security Standards & Frameworks
Priyanka Aash
•
6 years ago
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Katie Nickels
•
5 years ago
Smart Meter- Overview of System and Capabilities
REC Power Distribution Company Ltd, (A wholly own subsidiary of REC Ltd ,a Navratna CPSE ' )
•
11 years ago
Smart grid networks and security architecture: Threat analysis, threat scenarios and vulnerabilities
John-André Bjørkhaug
•
9 years ago
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
•
5 years ago
(SACON) Wasim Halani - OSINT threat hunting
Priyanka Aash
•
5 years ago
Serverless Security: What's Left To Protect
Guy Podjarny
•
5 years ago
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
veerababu penugonda(Mr-IoT)
•
5 years ago
Re engineering process of sri lankan national transport service
Udara Seneviratne
•
11 years ago