COIS/COIS 2016/audio/AppSec without additional tools Jason Kent.opus |
7.1 MB |
COIS/COIS 2016/audio/BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to reduce risk Steven Keil.opus |
6.6 MB |
COIS/COIS 2016/audio/CISO for an Hour Keith Fricke.opus |
8 MB |
COIS/COIS 2016/audio/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.opus |
6.2 MB |
COIS/COIS 2016/audio/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie Thomas Harry Regan.opus |
7 MB |
COIS/COIS 2016/audio/Formal Verification of Secure Software Systems Aaron Bedra.opus |
6.3 MB |
COIS/COIS 2016/audio/Information Security Metrics Practical Security Metrics Jack Nichelson.opus |
7 MB |
COIS/COIS 2016/audio/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Robert Wright.opus |
6.5 MB |
COIS/COIS 2016/audio/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.opus |
5.1 MB |
COIS/COIS 2016/audio/PKI Do You Know Your Exposure Kent King.opus |
5.6 MB |
COIS/COIS 2016/audio/Putting the Intelligence back in Threat Intelligence Edward McCabe.opus |
5.6 MB |
COIS/COIS 2016/audio/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.opus |
5.4 MB |
COIS/COIS 2016/audio/Security Certifications are they worth it and which ones are right for you William Diederich.opus |
6.7 MB |
COIS/COIS 2016/audio/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.opus |
4.6 MB |
COIS/COIS 2016/audio/don't try this at home Things not to do when securing an organization Jessica Hebenstreit.opus |
5.8 MB |
COIS/COIS 2016/video/6 Critical Criteria For Cloud Workload Security Sam Herath.mp4 |
23.5 MB |
COIS/COIS 2016/video/6 Critical Criteria For Cloud Workload Security Sam Herath.srt |
32 KB |
COIS/COIS 2016/video/All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4 |
45.5 MB |
COIS/COIS 2016/video/All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt |
64 KB |
COIS/COIS 2016/video/AppSec without additional tools Jason Kent.mp4 |
26.7 MB |
COIS/COIS 2016/video/AppSec without additional tools Jason Kent.srt |
58 KB |
COIS/COIS 2016/video/Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4 |
35.2 MB |
COIS/COIS 2016/video/Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt |
55 KB |
COIS/COIS 2016/video/Artificial Intelligence Real Threat Prevention Art Hathaway.mp4 |
32.1 MB |
COIS/COIS 2016/video/Artificial Intelligence Real Threat Prevention Art Hathaway.srt |
37 KB |
COIS/COIS 2016/video/Building an Application Security Program Mike Spaulding.mp4 |
50.3 MB |
COIS/COIS 2016/video/Building an Application Security Program Mike Spaulding.srt |
66 KB |
COIS/COIS 2016/video/Building an OSS CICD Security Toolchain Kevin Glavin.mp4 |
34.4 MB |
COIS/COIS 2016/video/Building an OSS CICD Security Toolchain Kevin Glavin.srt |
25 KB |
COIS/COIS 2016/video/Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4 |
27.4 MB |
COIS/COIS 2016/video/Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt |
38 KB |
COIS/COIS 2016/video/CISO for an Hour Keith Fricke.mp4 |
44.1 MB |
COIS/COIS 2016/video/CISO for an Hour Keith Fricke.srt |
66 KB |
COIS/COIS 2016/video/Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4 |
66.1 MB |
COIS/COIS 2016/video/Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt |
39 KB |
COIS/COIS 2016/video/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4 |
41.9 MB |
COIS/COIS 2016/video/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt |
44 KB |
COIS/COIS 2016/video/Cross Industry Collaboration Helen Patton.mp4 |
37.4 MB |
COIS/COIS 2016/video/Cross Industry Collaboration Helen Patton.srt |
38 KB |
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.mp4 |
32.3 MB |
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.srt |
36 KB |
COIS/COIS 2016/video/Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4 |
37.8 MB |
COIS/COIS 2016/video/Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt |
49 KB |
COIS/COIS 2016/video/Datacenter Security Virtualized John Michealson.mp4 |
36.2 MB |
COIS/COIS 2016/video/Datacenter Security Virtualized John Michealson.srt |
51 KB |
COIS/COIS 2016/video/Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4 |
25.5 MB |
COIS/COIS 2016/video/Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt |
45 KB |
COIS/COIS 2016/video/Detecting the Undetectable - What You Need to Know About OSINT Jerod Brennen.mp4 |
43 MB |
COIS/COIS 2016/video/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4 |
33.3 MB |
COIS/COIS 2016/video/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt |
37 KB |
COIS/COIS 2016/video/Don't try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4 |
37.3 MB |
COIS/COIS 2016/video/Economically Justifying IT Security Initiatives Ruben Melendez.mp4 |
37.5 MB |
COIS/COIS 2016/video/Economically Justifying IT Security Initiatives Ruben Melendez.srt |
38 KB |
COIS/COIS 2016/video/Educating the Board of Directors Bob West.mp4 |
23 MB |
COIS/COIS 2016/video/Educating the Board of Directors Bob West.srt |
49 KB |
COIS/COIS 2016/video/Embracing the Cloud Lisa Guess.mp4 |
24.9 MB |
COIS/COIS 2016/video/Embracing the Cloud Lisa Guess.srt |
47 KB |
COIS/COIS 2016/video/Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.mp4 |
49.2 MB |
COIS/COIS 2016/video/Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.srt |
81 KB |
COIS/COIS 2016/video/Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4 |
35.3 MB |
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra (2).mp4 |
19.5 MB |
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra (2).srt |
54 KB |
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra.mp4 |
24 MB |
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra.srt |
42 KB |
COIS/COIS 2016/video/Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4 |
39.9 MB |
COIS/COIS 2016/video/Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4 |
39.6 MB |
COIS/COIS 2016/video/Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt |
34 KB |
COIS/COIS 2016/video/Have you tied together your IAM and Information Security Incident Management Program Josep.mp4 |
48.7 MB |
COIS/COIS 2016/video/Have you tied together your IAM and Information Security Incident Management Program Josep.srt |
62 KB |
COIS/COIS 2016/video/How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4 |
31.4 MB |
COIS/COIS 2016/video/How Experts Undermine Your Forensic Evidence Matthew Curtin.srt |
46 KB |
COIS/COIS 2016/video/How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4 |
38.9 MB |
COIS/COIS 2016/video/How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt |
16 KB |
COIS/COIS 2016/video/IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4 |
30.5 MB |
COIS/COIS 2016/video/IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt |
56 KB |
COIS/COIS 2016/video/IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4 |
55 MB |
COIS/COIS 2016/video/Incident Response No Pain No Gain Jim Wojno.mp4 |
36.7 MB |
COIS/COIS 2016/video/Incident Response No Pain No Gain Jim Wojno.srt |
42 KB |
COIS/COIS 2016/video/InfoSec Productization David Kennedy.mp4 |
43.5 MB |
COIS/COIS 2016/video/InfoSec Productization David Kennedy.srt |
84 KB |
COIS/COIS 2016/video/Information Security Metrics Practical Security Metrics Jack Nichelson.mp4 |
42.9 MB |
COIS/COIS 2016/video/Information Security Metrics Practical Security Metrics Jack Nichelson.srt |
29 KB |
COIS/COIS 2016/video/Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4 |
31.3 MB |
COIS/COIS 2016/video/Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt |
43 KB |
COIS/COIS 2016/video/It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4 |
25 MB |
COIS/COIS 2016/video/It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt |
45 KB |
COIS/COIS 2016/video/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4 |
33.9 MB |
COIS/COIS 2016/video/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt |
63 KB |
COIS/COIS 2016/video/Myths of Cloud Security Debunked Bil Harmer.mp4 |
33.6 MB |
COIS/COIS 2016/video/Myths of Cloud Security Debunked Bil Harmer.srt |
49 KB |
COIS/COIS 2016/video/Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4 |
42.3 MB |
COIS/COIS 2016/video/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.mp4 |
27.7 MB |
COIS/COIS 2016/video/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.srt |
38 KB |
COIS/COIS 2016/video/PKI Do You Know Your Exposure Kent King.mp4 |
28.7 MB |
COIS/COIS 2016/video/Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4 |
27 MB |
COIS/COIS 2016/video/Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt |
32 KB |
COIS/COIS 2016/video/Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4 |
27.8 MB |
COIS/COIS 2016/video/Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt |
61 KB |
COIS/COIS 2016/video/Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4 |
31.4 MB |
COIS/COIS 2016/video/Putting the Intelligence back in Threat Intelligence Edward McCabe.srt |
40 KB |
COIS/COIS 2016/video/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4 |
33.5 MB |
COIS/COIS 2016/video/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt |
14 KB |
COIS/COIS 2016/video/SecOps Innovating Security in Innovative Organizations Warner Moore.mp4 |
29 MB |
COIS/COIS 2016/video/SecOps Innovating Security in Innovative Organizations Warner Moore.srt |
29 KB |
COIS/COIS 2016/video/Securing our Future Lessons From the Human Immune System Gavin Hill.mp4 |
36.4 MB |
COIS/COIS 2016/video/Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4 |
27.4 MB |
COIS/COIS 2016/video/Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt |
43 KB |
COIS/COIS 2016/video/Security Certifications are they worth it and which ones are right for you William Diederi.mp4 |
37.4 MB |
COIS/COIS 2016/video/Security analytics journey a years lesson learned Mike Schiebel.mp4 |
32.3 MB |
COIS/COIS 2016/video/Security vs Compliance in Healthcare.mp4 |
42.6 MB |
COIS/COIS 2016/video/Security vs Compliance in Healthcare.srt |
44 KB |
COIS/COIS 2016/video/State of Security and 2016 Predictions Jason Samide.mp4 |
26.1 MB |
COIS/COIS 2016/video/State of Security and 2016 Predictions Jason Samide.srt |
13 KB |
COIS/COIS 2016/video/The CONfidence of Things John Robinson.mp4 |
40.4 MB |
COIS/COIS 2016/video/The Humanity of Phishing Attack and Defense Aaron Higbee.mp4 |
44.5 MB |
COIS/COIS 2016/video/The Humanity of Phishing Attack and Defense Aaron Higbee.srt |
70 KB |
COIS/COIS 2016/video/The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4 |
29.6 MB |
COIS/COIS 2016/video/The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt |
56 KB |
COIS/COIS 2016/video/The node js highway attacks are at full throttle jJoshua Clark.mp4 |
27.5 MB |
COIS/COIS 2016/video/The node js highway attacks are at full throttle jJoshua Clark.srt |
44 KB |
COIS/COIS 2016/video/Third Party Risk Governance Why and How Jeffrey Sweet.mp4 |
31.1 MB |
COIS/COIS 2016/video/Third Party Risk Governance Why and How Jeffrey Sweet.srt |
55 KB |
COIS/COIS 2016/video/Threat Modeling for Secure Software Design Robert Hurlbut.mp4 |
28.9 MB |
COIS/COIS 2016/video/Threat Modeling for Secure Software Design Robert Hurlbut.srt |
61 KB |
COIS/COIS 2016/video/Todays Threat Landscape Dean Shroll.mp4 |
36.3 MB |
COIS/COIS 2016/video/Todays Threat Landscape Dean Shroll.srt |
43 KB |
COIS/COIS 2016/video/Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4 |
27.2 MB |
COIS/COIS 2016/video/TouchID of iOS Security James Jamie Bowser.mp4 |
32.7 MB |
COIS/COIS 2016/video/Understanding Attackers use of Covert Communications Chris Haley.mp4 |
28.9 MB |
COIS/COIS 2016/video/Understanding Attackers use of Covert Communications Chris Haley.srt |
34 KB |
COIS/COIS 2016/video/Vendors and business associates friends or foes Robert Brzezinski.mp4 |
49.4 MB |
COIS/COIS 2016/video/Who is Winning Gary Sheehan.mp4 |
40.2 MB |
COIS/COIS 2016/video/Who is Winning Gary Sheehan.srt |
40 KB |
COIS/COIS 2016/video/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4 |
23.8 MB |
COIS/COIS 2016/video/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt |
22 KB |
COIS/COIS 2016/video/Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4 |
19.1 MB |
COIS/COIS 2016/video/Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt |
34 KB |
COIS/COIS 2016/video/YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4 |
35.8 MB |
COIS/COIS 2016/video/YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt |
57 KB |
COIS/COIS 2016/video/You're measuring all the wrong things information security metrics Shawn Sines.mp4 |
25.1 MB |
COIS/COIS thank you.txt |
867 B |