BITCQ

COIS

Size: 2.5 GB
Magnet link

Name Size
COIS/COIS 2016/audio/AppSec without additional tools Jason Kent.opus 7.1 MB
COIS/COIS 2016/audio/BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to reduce risk Steven Keil.opus 6.6 MB
COIS/COIS 2016/audio/CISO for an Hour Keith Fricke.opus 8 MB
COIS/COIS 2016/audio/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.opus 6.2 MB
COIS/COIS 2016/audio/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie Thomas Harry Regan.opus 7 MB
COIS/COIS 2016/audio/Formal Verification of Secure Software Systems Aaron Bedra.opus 6.3 MB
COIS/COIS 2016/audio/Information Security Metrics Practical Security Metrics Jack Nichelson.opus 7 MB
COIS/COIS 2016/audio/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Robert Wright.opus 6.5 MB
COIS/COIS 2016/audio/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.opus 5.1 MB
COIS/COIS 2016/audio/PKI Do You Know Your Exposure Kent King.opus 5.6 MB
COIS/COIS 2016/audio/Putting the Intelligence back in Threat Intelligence Edward McCabe.opus 5.6 MB
COIS/COIS 2016/audio/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.opus 5.4 MB
COIS/COIS 2016/audio/Security Certifications are they worth it and which ones are right for you William Diederich.opus 6.7 MB
COIS/COIS 2016/audio/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.opus 4.6 MB
COIS/COIS 2016/audio/don't try this at home Things not to do when securing an organization Jessica Hebenstreit.opus 5.8 MB
COIS/COIS 2016/video/6 Critical Criteria For Cloud Workload Security Sam Herath.mp4 23.5 MB
COIS/COIS 2016/video/6 Critical Criteria For Cloud Workload Security Sam Herath.srt 32 KB
COIS/COIS 2016/video/All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4 45.5 MB
COIS/COIS 2016/video/All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt 64 KB
COIS/COIS 2016/video/AppSec without additional tools Jason Kent.mp4 26.7 MB
COIS/COIS 2016/video/AppSec without additional tools Jason Kent.srt 58 KB
COIS/COIS 2016/video/Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4 35.2 MB
COIS/COIS 2016/video/Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt 55 KB
COIS/COIS 2016/video/Artificial Intelligence Real Threat Prevention Art Hathaway.mp4 32.1 MB
COIS/COIS 2016/video/Artificial Intelligence Real Threat Prevention Art Hathaway.srt 37 KB
COIS/COIS 2016/video/Building an Application Security Program Mike Spaulding.mp4 50.3 MB
COIS/COIS 2016/video/Building an Application Security Program Mike Spaulding.srt 66 KB
COIS/COIS 2016/video/Building an OSS CICD Security Toolchain Kevin Glavin.mp4 34.4 MB
COIS/COIS 2016/video/Building an OSS CICD Security Toolchain Kevin Glavin.srt 25 KB
COIS/COIS 2016/video/Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4 27.4 MB
COIS/COIS 2016/video/Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt 38 KB
COIS/COIS 2016/video/CISO for an Hour Keith Fricke.mp4 44.1 MB
COIS/COIS 2016/video/CISO for an Hour Keith Fricke.srt 66 KB
COIS/COIS 2016/video/Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4 66.1 MB
COIS/COIS 2016/video/Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt 39 KB
COIS/COIS 2016/video/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4 41.9 MB
COIS/COIS 2016/video/Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt 44 KB
COIS/COIS 2016/video/Cross Industry Collaboration Helen Patton.mp4 37.4 MB
COIS/COIS 2016/video/Cross Industry Collaboration Helen Patton.srt 38 KB
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.mp4 32.3 MB
COIS/COIS 2016/video/Cyber Security Super Bowl 50 Jim Libersky.srt 36 KB
COIS/COIS 2016/video/Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4 37.8 MB
COIS/COIS 2016/video/Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt 49 KB
COIS/COIS 2016/video/Datacenter Security Virtualized John Michealson.mp4 36.2 MB
COIS/COIS 2016/video/Datacenter Security Virtualized John Michealson.srt 51 KB
COIS/COIS 2016/video/Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4 25.5 MB
COIS/COIS 2016/video/Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt 45 KB
COIS/COIS 2016/video/Detecting the Undetectable - What You Need to Know About OSINT Jerod Brennen.mp4 43 MB
COIS/COIS 2016/video/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4 33.3 MB
COIS/COIS 2016/video/Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt 37 KB
COIS/COIS 2016/video/Don't try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4 37.3 MB
COIS/COIS 2016/video/Economically Justifying IT Security Initiatives Ruben Melendez.mp4 37.5 MB
COIS/COIS 2016/video/Economically Justifying IT Security Initiatives Ruben Melendez.srt 38 KB
COIS/COIS 2016/video/Educating the Board of Directors Bob West.mp4 23 MB
COIS/COIS 2016/video/Educating the Board of Directors Bob West.srt 49 KB
COIS/COIS 2016/video/Embracing the Cloud Lisa Guess.mp4 24.9 MB
COIS/COIS 2016/video/Embracing the Cloud Lisa Guess.srt 47 KB
COIS/COIS 2016/video/Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.mp4 49.2 MB
COIS/COIS 2016/video/Fail Now So I don't Fail Later A look into security testing and training methodologies Deral.srt 81 KB
COIS/COIS 2016/video/Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4 35.3 MB
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra (2).mp4 19.5 MB
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra (2).srt 54 KB
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra.mp4 24 MB
COIS/COIS 2016/video/Formal Verification of Secure Software Systems Aaron Bedra.srt 42 KB
COIS/COIS 2016/video/Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4 39.9 MB
COIS/COIS 2016/video/Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4 39.6 MB
COIS/COIS 2016/video/Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt 34 KB
COIS/COIS 2016/video/Have you tied together your IAM and Information Security Incident Management Program Josep.mp4 48.7 MB
COIS/COIS 2016/video/Have you tied together your IAM and Information Security Incident Management Program Josep.srt 62 KB
COIS/COIS 2016/video/How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4 31.4 MB
COIS/COIS 2016/video/How Experts Undermine Your Forensic Evidence Matthew Curtin.srt 46 KB
COIS/COIS 2016/video/How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4 38.9 MB
COIS/COIS 2016/video/How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt 16 KB
COIS/COIS 2016/video/IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4 30.5 MB
COIS/COIS 2016/video/IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt 56 KB
COIS/COIS 2016/video/IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4 55 MB
COIS/COIS 2016/video/Incident Response No Pain No Gain Jim Wojno.mp4 36.7 MB
COIS/COIS 2016/video/Incident Response No Pain No Gain Jim Wojno.srt 42 KB
COIS/COIS 2016/video/InfoSec Productization David Kennedy.mp4 43.5 MB
COIS/COIS 2016/video/InfoSec Productization David Kennedy.srt 84 KB
COIS/COIS 2016/video/Information Security Metrics Practical Security Metrics Jack Nichelson.mp4 42.9 MB
COIS/COIS 2016/video/Information Security Metrics Practical Security Metrics Jack Nichelson.srt 29 KB
COIS/COIS 2016/video/Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4 31.3 MB
COIS/COIS 2016/video/Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt 43 KB
COIS/COIS 2016/video/It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4 25 MB
COIS/COIS 2016/video/It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt 45 KB
COIS/COIS 2016/video/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4 33.9 MB
COIS/COIS 2016/video/Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt 63 KB
COIS/COIS 2016/video/Myths of Cloud Security Debunked Bil Harmer.mp4 33.6 MB
COIS/COIS 2016/video/Myths of Cloud Security Debunked Bil Harmer.srt 49 KB
COIS/COIS 2016/video/Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4 42.3 MB
COIS/COIS 2016/video/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.mp4 27.7 MB
COIS/COIS 2016/video/No Tradeoffs Cloud Security and Privacy don't Need to Be at Odds Jervis Hui.srt 38 KB
COIS/COIS 2016/video/PKI Do You Know Your Exposure Kent King.mp4 28.7 MB
COIS/COIS 2016/video/Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4 27 MB
COIS/COIS 2016/video/Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt 32 KB
COIS/COIS 2016/video/Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4 27.8 MB
COIS/COIS 2016/video/Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt 61 KB
COIS/COIS 2016/video/Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4 31.4 MB
COIS/COIS 2016/video/Putting the Intelligence back in Threat Intelligence Edward McCabe.srt 40 KB
COIS/COIS 2016/video/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4 33.5 MB
COIS/COIS 2016/video/Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt 14 KB
COIS/COIS 2016/video/SecOps Innovating Security in Innovative Organizations Warner Moore.mp4 29 MB
COIS/COIS 2016/video/SecOps Innovating Security in Innovative Organizations Warner Moore.srt 29 KB
COIS/COIS 2016/video/Securing our Future Lessons From the Human Immune System Gavin Hill.mp4 36.4 MB
COIS/COIS 2016/video/Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4 27.4 MB
COIS/COIS 2016/video/Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt 43 KB
COIS/COIS 2016/video/Security Certifications are they worth it and which ones are right for you William Diederi.mp4 37.4 MB
COIS/COIS 2016/video/Security analytics journey a years lesson learned Mike Schiebel.mp4 32.3 MB
COIS/COIS 2016/video/Security vs Compliance in Healthcare.mp4 42.6 MB
COIS/COIS 2016/video/Security vs Compliance in Healthcare.srt 44 KB
COIS/COIS 2016/video/State of Security and 2016 Predictions Jason Samide.mp4 26.1 MB
COIS/COIS 2016/video/State of Security and 2016 Predictions Jason Samide.srt 13 KB
COIS/COIS 2016/video/The CONfidence of Things John Robinson.mp4 40.4 MB
COIS/COIS 2016/video/The Humanity of Phishing Attack and Defense Aaron Higbee.mp4 44.5 MB
COIS/COIS 2016/video/The Humanity of Phishing Attack and Defense Aaron Higbee.srt 70 KB
COIS/COIS 2016/video/The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4 29.6 MB
COIS/COIS 2016/video/The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt 56 KB
COIS/COIS 2016/video/The node js highway attacks are at full throttle jJoshua Clark.mp4 27.5 MB
COIS/COIS 2016/video/The node js highway attacks are at full throttle jJoshua Clark.srt 44 KB
COIS/COIS 2016/video/Third Party Risk Governance Why and How Jeffrey Sweet.mp4 31.1 MB
COIS/COIS 2016/video/Third Party Risk Governance Why and How Jeffrey Sweet.srt 55 KB
COIS/COIS 2016/video/Threat Modeling for Secure Software Design Robert Hurlbut.mp4 28.9 MB
COIS/COIS 2016/video/Threat Modeling for Secure Software Design Robert Hurlbut.srt 61 KB
COIS/COIS 2016/video/Todays Threat Landscape Dean Shroll.mp4 36.3 MB
COIS/COIS 2016/video/Todays Threat Landscape Dean Shroll.srt 43 KB
COIS/COIS 2016/video/Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4 27.2 MB
COIS/COIS 2016/video/TouchID of iOS Security James Jamie Bowser.mp4 32.7 MB
COIS/COIS 2016/video/Understanding Attackers use of Covert Communications Chris Haley.mp4 28.9 MB
COIS/COIS 2016/video/Understanding Attackers use of Covert Communications Chris Haley.srt 34 KB
COIS/COIS 2016/video/Vendors and business associates friends or foes Robert Brzezinski.mp4 49.4 MB
COIS/COIS 2016/video/Who is Winning Gary Sheehan.mp4 40.2 MB
COIS/COIS 2016/video/Who is Winning Gary Sheehan.srt 40 KB
COIS/COIS 2016/video/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4 23.8 MB
COIS/COIS 2016/video/Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt 22 KB
COIS/COIS 2016/video/Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4 19.1 MB
COIS/COIS 2016/video/Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt 34 KB
COIS/COIS 2016/video/YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4 35.8 MB
COIS/COIS 2016/video/YODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt 57 KB
COIS/COIS 2016/video/You're measuring all the wrong things information security metrics Shawn Sines.mp4 25.1 MB
COIS/COIS thank you.txt 867 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...