COIS/COIS 2016/video/COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4 |
217.2 MB |
COIS/COIS 2016/video/COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4 |
38.8 MB |
COIS/COIS 2016/video/COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.srt |
46 KB |
COIS/COIS 2016/video/COIS DA02 Datacenter Security Virtualized John Michealson.mp4 |
47.8 MB |
COIS/COIS 2016/video/COIS DA02 Datacenter Security Virtualized John Michealson.srt |
51 KB |
COIS/COIS 2016/video/COIS DA03 Embracing the Cloud Lisa Guess.mp4 |
39.6 MB |
COIS/COIS 2016/video/COIS DA03 Embracing the Cloud Lisa Guess.srt |
47 KB |
COIS/COIS 2016/video/COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4 |
35.5 MB |
COIS/COIS 2016/video/COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt |
45 KB |
COIS/COIS 2016/video/COIS DA05 Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4 |
46.9 MB |
COIS/COIS 2016/video/COIS DA06 PKI Do You Know Your Exposure Kent King.mp4 |
27.5 MB |
COIS/COIS 2016/video/COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.mp4 |
32.8 MB |
COIS/COIS 2016/video/COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.srt |
38 KB |
COIS/COIS 2016/video/COIS DA08 Todays Threat Landscape Dean Shroll.mp4 |
44.4 MB |
COIS/COIS 2016/video/COIS DA08 Todays Threat Landscape Dean Shroll.srt |
43 KB |
COIS/COIS 2016/video/COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.mp4 |
35 MB |
COIS/COIS 2016/video/COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.srt |
32 KB |
COIS/COIS 2016/video/COIS DC00 Educating the Board of Directors Bob West.mp4 |
69.2 MB |
COIS/COIS 2016/video/COIS DC00 Educating the Board of Directors Bob West.srt |
49 KB |
COIS/COIS 2016/video/COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4 |
32.9 MB |
COIS/COIS 2016/video/COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt |
38 KB |
COIS/COIS 2016/video/COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4 |
34.3 MB |
COIS/COIS 2016/video/COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt |
61 KB |
COIS/COIS 2016/video/COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.mp4 |
37.5 MB |
COIS/COIS 2016/video/COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.srt |
61 KB |
COIS/COIS 2016/video/COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4 |
45.7 MB |
COIS/COIS 2016/video/COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt |
56 KB |
COIS/COIS 2016/video/COIS DC05 Building an Application Security Program Mike Spaulding.mp4 |
116.2 MB |
COIS/COIS 2016/video/COIS DC05 Building an Application Security Program Mike Spaulding.srt |
66 KB |
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).mp4 |
30.6 MB |
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).srt |
54 KB |
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.mp4 |
30.3 MB |
COIS/COIS 2016/video/COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.srt |
42 KB |
COIS/COIS 2016/video/COIS DC07 AppSec without additional tools Jason Kent.mp4 |
37.6 MB |
COIS/COIS 2016/video/COIS DC07 AppSec without additional tools Jason Kent.srt |
58 KB |
COIS/COIS 2016/video/COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4 |
44.5 MB |
COIS/COIS 2016/video/COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt |
63 KB |
COIS/COIS 2016/video/COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.mp4 |
34 MB |
COIS/COIS 2016/video/COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.srt |
37 KB |
COIS/COIS 2016/video/COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4 |
54.1 MB |
COIS/COIS 2016/video/COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt |
45 KB |
COIS/COIS 2016/video/COIS F00 Security vs Compliance in Healthcare.mp4 |
68.8 MB |
COIS/COIS 2016/video/COIS F00 Security vs Compliance in Healthcare.srt |
44 KB |
COIS/COIS 2016/video/COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4 |
52 MB |
COIS/COIS 2016/video/COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt |
16 KB |
COIS/COIS 2016/video/COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.mp4 |
58.5 MB |
COIS/COIS 2016/video/COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.srt |
38 KB |
COIS/COIS 2016/video/COIS F03 Cross Industry Collaboration Helen Patton.mp4 |
45.5 MB |
COIS/COIS 2016/video/COIS F03 Cross Industry Collaboration Helen Patton.srt |
38 KB |
COIS/COIS 2016/video/COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.mp4 |
47.6 MB |
COIS/COIS 2016/video/COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.srt |
55 KB |
COIS/COIS 2016/video/COIS F05 IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4 |
68.7 MB |
COIS/COIS 2016/video/COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4 |
43.3 MB |
COIS/COIS 2016/video/COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt |
57 KB |
COIS/COIS 2016/video/COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4 |
43.8 MB |
COIS/COIS 2016/video/COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt |
37 KB |
COIS/COIS 2016/video/COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4 |
55.5 MB |
COIS/COIS 2016/video/COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt |
49 KB |
COIS/COIS 2016/video/COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4 |
34.3 MB |
COIS/COIS 2016/video/COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt |
56 KB |
COIS/COIS 2016/video/COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4 |
75.9 MB |
COIS/COIS 2016/video/COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt |
34 KB |
COIS/COIS 2016/video/COIS K01 Vendors and business associates friends or foes Robert Brzezinski.mp4 |
84.7 MB |
COIS/COIS 2016/video/COIS K02 State of Security and 2016 Predictions Jason Samide.mp4 |
39.6 MB |
COIS/COIS 2016/video/COIS K02 State of Security and 2016 Predictions Jason Samide.srt |
13 KB |
COIS/COIS 2016/video/COIS DA00 Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4 |
50.5 MB |
COIS/COIS 2016/video/COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt |
39 KB |
COIS/COIS 2016/video/COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4 |
48.9 MB |
COIS/COIS 2016/video/COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt |
14 KB |
COIS/COIS 2016/video/COIS K05 Incident Response No Pain No Gain Jim Wojno.mp4 |
51.9 MB |
COIS/COIS 2016/video/COIS K05 Incident Response No Pain No Gain Jim Wojno.srt |
42 KB |
COIS/COIS 2016/video/COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.mp4 |
63 MB |
COIS/COIS 2016/video/COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.srt |
25 KB |
COIS/COIS 2016/video/COIS K07 A TouchID of iOS Security James Jamie Bowser.mp4 |
45.3 MB |
COIS/COIS 2016/video/COIS MA00 Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4 |
33.7 MB |
COIS/COIS 2016/video/COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.mp4 |
51.3 MB |
COIS/COIS 2016/video/COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.srt |
29 KB |
COIS/COIS 2016/video/COIS MA02 Youre measuring all the wrong things information security metrics Shawn Sines.mp4 |
29.6 MB |
COIS/COIS 2016/video/COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4 |
33.8 MB |
COIS/COIS 2016/video/COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt |
22 KB |
COIS/COIS 2016/video/COIS MA04 Security Certifications are they worth it and which ones are right for you William Diederi.mp4 |
45 MB |
COIS/COIS 2016/video/COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.mp4 |
59.1 MB |
COIS/COIS 2016/video/COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.srt |
29 KB |
COIS/COIS 2016/video/COIS MA06 The CONfidence of Things John Robinson.mp4 |
53.7 MB |
COIS/COIS 2016/video/COIS MA07 Who is Winning Gary Sheehan.mp4 |
56 MB |
COIS/COIS 2016/video/COIS MA07 Who is Winning Gary Sheehan.srt |
40 KB |
COIS/COIS 2016/video/COIS MA08 Security analytics journey a years lesson learned Mike Schiebel.mp4 |
41.8 MB |
COIS/COIS 2016/video/COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4 |
47.1 MB |
COIS/COIS 2016/video/COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt |
43 KB |
COIS/COIS 2016/video/COIS MO01 Securing our Future Lessons From the Human Immune System Gavin Hill.mp4 |
43.5 MB |
COIS/COIS 2016/video/COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.mp4 |
84.4 MB |
COIS/COIS 2016/video/COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.srt |
62 KB |
COIS/COIS 2016/video/COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4 |
71.9 MB |
COIS/COIS 2016/video/COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt |
44 KB |
COIS/COIS 2016/video/COIS MO04 Dont try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4 |
64.3 MB |
COIS/COIS 2016/video/COIS MO05 CISO for an Hour Keith Fricke.mp4 |
59.3 MB |
COIS/COIS 2016/video/COIS MO05 CISO for an Hour Keith Fricke.srt |
66 KB |
COIS/COIS 2016/video/COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4 |
53.7 MB |
COIS/COIS 2016/video/COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt |
55 KB |
COIS/COIS 2016/video/COIS MO07 Myths of Cloud Security Debunked Bil Harmer.mp4 |
65.5 MB |
COIS/COIS 2016/video/COIS MO07 Myths of Cloud Security Debunked Bil Harmer.srt |
49 KB |
COIS/COIS 2016/video/COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4 |
93.2 MB |
COIS/COIS 2016/video/COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt |
32 KB |
COIS/COIS 2016/video/COIS R01 Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4 |
52.6 MB |
COIS/COIS 2016/video/COIS R02 Detecting the Undetectable What You Need to Know About OSINT Jerod Brennen.mp4 |
51.3 MB |
COIS/COIS 2016/video/COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4 |
27.8 MB |
COIS/COIS 2016/video/COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt |
34 KB |
COIS/COIS 2016/video/COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.mp4 |
74.5 MB |
COIS/COIS 2016/video/COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.srt |
81 KB |
COIS/COIS 2016/video/COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4 |
44 MB |
COIS/COIS 2016/video/COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.srt |
40 KB |
COIS/COIS 2016/video/COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4 |
73.5 MB |
COIS/COIS 2016/video/COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt |
64 KB |
COIS/COIS 2016/video/COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.mp4 |
60.4 MB |
COIS/COIS 2016/video/COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.srt |
70 KB |
COIS/COIS 2016/video/COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.mp4 |
32.2 MB |
COIS/COIS 2016/video/COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.srt |
44 KB |
COIS/COIS 2016/video/COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4 |
39.7 MB |
COIS/COIS 2016/video/COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt |
43 KB |
COIS/COIS 2016/video/COIS R10 Understanding Attackers use of Covert Communications Chris Haley.mp4 |
39.2 MB |
COIS/COIS 2016/video/COIS R10 Understanding Attackers use of Covert Communications Chris Haley.srt |
34 KB |
COIS/COIS 2016/video/COIS R11 InfoSec Productization David Kennedy.mp4 |
50.8 MB |
COIS/COIS 2016/video/COIS R11 InfoSec Productization David Kennedy.srt |
84 KB |
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.mp4 |
53.7 MB |
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.srt |
36 KB |
COIS/COIS thank you.txt |
779 B |