Personal Information
Organization / Workplace
Shenzhen, Guangdong China
- Presentations
- Documents
- Infographics
Social Media Security Risk Slide Share Version
famudal
•
12 years ago
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
•
12 years ago
Top 8 global megatrends
Anders Lindgren
•
14 years ago
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincent Van Mieghem, Deloitte
MITRE - ATT&CKcon
•
5 years ago
Wavemaker Cryptocurrency Overview Dec 2017
David Siemer
•
6 years ago
SXSW 2019 - Top Trends
Matteo Sarzana
•
4 years ago
The A to Z Guide to Business Continuity and Disaster Recovery
Sirius
•
9 years ago
6 TIPS to SURVIVE the 2nd MACHINE AGE
Floown
•
8 years ago
How to Survive Doomsday
Empowered Presentations
•
11 years ago
Philosophy of Technology
Melanie Swan
•
7 years ago
AI and ML in Cybersecurity
Forcepoint LLC
•
5 years ago
Understanding the "Intelligence" in AI
Forcepoint LLC
•
4 years ago
The essential future topics and memes from my 2015 presentations (Futurist Keynote Speaker Gerd Leonhard)
Gerd Leonhard
•
8 years ago
How to Test High-Performance Next-Generation Firewalls
Ixia
•
12 years ago
Firewall Testing Methodology
Ixia
•
13 years ago
Practical Applications of Block Chain Technologies
Priyanka Aash
•
7 years ago
Capture the Flag Exercise Using Active Deception Defense
Fidelis Cybersecurity
•
5 years ago
How to Plan Purple Team Exercises
Haydn Johnson
•
6 years ago
Building a Cyber Range for training Cyber Defense Situation Awareness
Thibault Debatty
•
4 years ago
Cyber Range - An Open-Source Offensive / Defensive Learning Environment on AWS
Tom Cappetta
•
4 years ago