BITCQ

COIS

Size: 3.6 GB
Magnet link

Name Size
COIS/COIS 2016/video/COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4 217.2 MB
COIS/COIS 2016/video/COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4 38.8 MB
COIS/COIS 2016/video/COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.srt 46 KB
COIS/COIS 2016/video/COIS DA02 Datacenter Security Virtualized John Michealson.mp4 47.8 MB
COIS/COIS 2016/video/COIS DA02 Datacenter Security Virtualized John Michealson.srt 51 KB
COIS/COIS 2016/video/COIS DA03 Embracing the Cloud Lisa Guess.mp4 39.6 MB
COIS/COIS 2016/video/COIS DA03 Embracing the Cloud Lisa Guess.srt 47 KB
COIS/COIS 2016/video/COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4 35.5 MB
COIS/COIS 2016/video/COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt 45 KB
COIS/COIS 2016/video/COIS DA05 Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4 46.9 MB
COIS/COIS 2016/video/COIS DA06 PKI Do You Know Your Exposure Kent King.mp4 27.5 MB
COIS/COIS 2016/video/COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.mp4 32.8 MB
COIS/COIS 2016/video/COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.srt 38 KB
COIS/COIS 2016/video/COIS DA08 Todays Threat Landscape Dean Shroll.mp4 44.4 MB
COIS/COIS 2016/video/COIS DA08 Todays Threat Landscape Dean Shroll.srt 43 KB
COIS/COIS 2016/video/COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.mp4 35 MB
COIS/COIS 2016/video/COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.srt 32 KB
COIS/COIS 2016/video/COIS DC00 Educating the Board of Directors Bob West.mp4 69.2 MB
COIS/COIS 2016/video/COIS DC00 Educating the Board of Directors Bob West.srt 49 KB
COIS/COIS 2016/video/COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4 32.9 MB
COIS/COIS 2016/video/COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt 38 KB
COIS/COIS 2016/video/COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4 34.3 MB
COIS/COIS 2016/video/COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt 61 KB
COIS/COIS 2016/video/COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.mp4 37.5 MB
COIS/COIS 2016/video/COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.srt 61 KB
COIS/COIS 2016/video/COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4 45.7 MB
COIS/COIS 2016/video/COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt 56 KB
COIS/COIS 2016/video/COIS DC05 Building an Application Security Program Mike Spaulding.mp4 116.2 MB
COIS/COIS 2016/video/COIS DC05 Building an Application Security Program Mike Spaulding.srt 66 KB
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).mp4 30.6 MB
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).srt 54 KB
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.mp4 30.3 MB
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.srt 42 KB
COIS/COIS 2016/video/COIS DC07 AppSec without additional tools Jason Kent.mp4 37.6 MB
COIS/COIS 2016/video/COIS DC07 AppSec without additional tools Jason Kent.srt 58 KB
COIS/COIS 2016/video/COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4 44.5 MB
COIS/COIS 2016/video/COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt 63 KB
COIS/COIS 2016/video/COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.mp4 34 MB
COIS/COIS 2016/video/COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.srt 37 KB
COIS/COIS 2016/video/COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4 54.1 MB
COIS/COIS 2016/video/COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt 45 KB
COIS/COIS 2016/video/COIS F00 Security vs Compliance in Healthcare.mp4 68.8 MB
COIS/COIS 2016/video/COIS F00 Security vs Compliance in Healthcare.srt 44 KB
COIS/COIS 2016/video/COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4 52 MB
COIS/COIS 2016/video/COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt 16 KB
COIS/COIS 2016/video/COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.mp4 58.5 MB
COIS/COIS 2016/video/COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.srt 38 KB
COIS/COIS 2016/video/COIS F03 Cross Industry Collaboration Helen Patton.mp4 45.5 MB
COIS/COIS 2016/video/COIS F03 Cross Industry Collaboration Helen Patton.srt 38 KB
COIS/COIS 2016/video/COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.mp4 47.6 MB
COIS/COIS 2016/video/COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.srt 55 KB
COIS/COIS 2016/video/COIS F05 IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4 68.7 MB
COIS/COIS 2016/video/COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4 43.3 MB
COIS/COIS 2016/video/COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt 57 KB
COIS/COIS 2016/video/COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4 43.8 MB
COIS/COIS 2016/video/COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt 37 KB
COIS/COIS 2016/video/COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4 55.5 MB
COIS/COIS 2016/video/COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt 49 KB
COIS/COIS 2016/video/COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4 34.3 MB
COIS/COIS 2016/video/COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt 56 KB
COIS/COIS 2016/video/COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4 75.9 MB
COIS/COIS 2016/video/COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt 34 KB
COIS/COIS 2016/video/COIS K01 Vendors and business associates friends or foes Robert Brzezinski.mp4 84.7 MB
COIS/COIS 2016/video/COIS K02 State of Security and 2016 Predictions Jason Samide.mp4 39.6 MB
COIS/COIS 2016/video/COIS K02 State of Security and 2016 Predictions Jason Samide.srt 13 KB
COIS/COIS 2016/video/COIS DA00 Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4 50.5 MB
COIS/COIS 2016/video/COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt 39 KB
COIS/COIS 2016/video/COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4 48.9 MB
COIS/COIS 2016/video/COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt 14 KB
COIS/COIS 2016/video/COIS K05 Incident Response No Pain No Gain Jim Wojno.mp4 51.9 MB
COIS/COIS 2016/video/COIS K05 Incident Response No Pain No Gain Jim Wojno.srt 42 KB
COIS/COIS 2016/video/COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.mp4 63 MB
COIS/COIS 2016/video/COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.srt 25 KB
COIS/COIS 2016/video/COIS K07 A TouchID of iOS Security James Jamie Bowser.mp4 45.3 MB
COIS/COIS 2016/video/COIS MA00 Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4 33.7 MB
COIS/COIS 2016/video/COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.mp4 51.3 MB
COIS/COIS 2016/video/COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.srt 29 KB
COIS/COIS 2016/video/COIS MA02 Youre measuring all the wrong things information security metrics Shawn Sines.mp4 29.6 MB
COIS/COIS 2016/video/COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4 33.8 MB
COIS/COIS 2016/video/COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt 22 KB
COIS/COIS 2016/video/COIS MA04 Security Certifications are they worth it and which ones are right for you William Diederi.mp4 45 MB
COIS/COIS 2016/video/COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.mp4 59.1 MB
COIS/COIS 2016/video/COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.srt 29 KB
COIS/COIS 2016/video/COIS MA06 The CONfidence of Things John Robinson.mp4 53.7 MB
COIS/COIS 2016/video/COIS MA07 Who is Winning Gary Sheehan.mp4 56 MB
COIS/COIS 2016/video/COIS MA07 Who is Winning Gary Sheehan.srt 40 KB
COIS/COIS 2016/video/COIS MA08 Security analytics journey a years lesson learned Mike Schiebel.mp4 41.8 MB
COIS/COIS 2016/video/COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4 47.1 MB
COIS/COIS 2016/video/COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt 43 KB
COIS/COIS 2016/video/COIS MO01 Securing our Future Lessons From the Human Immune System Gavin Hill.mp4 43.5 MB
COIS/COIS 2016/video/COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.mp4 84.4 MB
COIS/COIS 2016/video/COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.srt 62 KB
COIS/COIS 2016/video/COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4 71.9 MB
COIS/COIS 2016/video/COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt 44 KB
COIS/COIS 2016/video/COIS MO04 Dont try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4 64.3 MB
COIS/COIS 2016/video/COIS MO05 CISO for an Hour Keith Fricke.mp4 59.3 MB
COIS/COIS 2016/video/COIS MO05 CISO for an Hour Keith Fricke.srt 66 KB
COIS/COIS 2016/video/COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4 53.7 MB
COIS/COIS 2016/video/COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt 55 KB
COIS/COIS 2016/video/COIS MO07 Myths of Cloud Security Debunked Bil Harmer.mp4 65.5 MB
COIS/COIS 2016/video/COIS MO07 Myths of Cloud Security Debunked Bil Harmer.srt 49 KB
COIS/COIS 2016/video/COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4 93.2 MB
COIS/COIS 2016/video/COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt 32 KB
COIS/COIS 2016/video/COIS R01 Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4 52.6 MB
COIS/COIS 2016/video/COIS R02 Detecting the Undetectable What You Need to Know About OSINT Jerod Brennen.mp4 51.3 MB
COIS/COIS 2016/video/COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4 27.8 MB
COIS/COIS 2016/video/COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt 34 KB
COIS/COIS 2016/video/COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.mp4 74.5 MB
COIS/COIS 2016/video/COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.srt 81 KB
COIS/COIS 2016/video/COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4 44 MB
COIS/COIS 2016/video/COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.srt 40 KB
COIS/COIS 2016/video/COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4 73.5 MB
COIS/COIS 2016/video/COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt 64 KB
COIS/COIS 2016/video/COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.mp4 60.4 MB
COIS/COIS 2016/video/COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.srt 70 KB
COIS/COIS 2016/video/COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.mp4 32.2 MB
COIS/COIS 2016/video/COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.srt 44 KB
COIS/COIS 2016/video/COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4 39.7 MB
COIS/COIS 2016/video/COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt 43 KB
COIS/COIS 2016/video/COIS R10 Understanding Attackers use of Covert Communications Chris Haley.mp4 39.2 MB
COIS/COIS 2016/video/COIS R10 Understanding Attackers use of Covert Communications Chris Haley.srt 34 KB
COIS/COIS 2016/video/COIS R11 InfoSec Productization David Kennedy.mp4 50.8 MB
COIS/COIS 2016/video/COIS R11 InfoSec Productization David Kennedy.srt 84 KB
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.mp4 53.7 MB
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.srt 36 KB
COIS/COIS thank you.txt 779 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...