cyber security information security ciso platform annual summit information technology ciso defcon security sacon cisoplatform hacking and attack techniques cisco information emerging areas technology architecture cloud security mobile security . incident response + soc hacking privacy security awareness and human element software/application security and devops ai framework hardware security data threat intelligence chief information security officer security architecture grc infosec network threat hunting vulnerabilities & exploits workshop 3rdpartyrisk cio malware application security data protection zero trust iot iot security incident response informationsecurity firecompass gen ai mac/ios security challenges cisoplatform summit and sacon aws soc regulations wireless attack artificial intelligence api gdpr kubernetes cloud webinar deception technologies deception in security internet of things risk owasp security trends forensic android security docker learning ml mitigations ci threat case study threat protection infrastructure management python personal devops supply chain mapping project program machine learning threat modelling crypto yara rules blockchain data security protocol windows loader network security reverse engineering big data deception red team blue team appsec breach cpas vendorrisk shadowit informationtechnology hardware attacks shadow it saas dpdp informatica securing ai cyber devsecops ransomware smart city attacks drones anti-drone systems nano drones genesis scripting engine scripting engine reverseengineering privilege pitfalls samsung gear smart watch smart watch vulnerabilities security in medical security in pharma soviet russia smartcard cnap hacking the brain pwn an sdn controller identity threats bypassing port-security macsec connected vehicle security issues industrial iot industrial iot security standards & frameworks securityprogram mfa darkweb windows security windows defender antivirus windows reverse engineering tls secure communication browser security device compromise third party supply chain automatic yara rules generation application replay attacks on ethereum smart contracts hardware backdoors in x86 cpus x86 cpus ble devices security cwp google play store zta tracking malware developers matlab rce on pie binaries man-in-the-disk tineola macos firewalls jailbreaking the 3ds wifi mitm wifi mana cellular networks authentication security end-to-end secure communication weaponizing unicode homographs beyond idns hacking plcs hacking ble bicycle locks api security multi-container applications backdooring smart city security 802.1x-2010 authentication wingos extreme networks exploiting vulnerabilities mobile point of sales systems ssrf ransparent session hijacking edge side include injection compromising online accounts cracking voicemail systems barcode security barcode scanners uefi exploitation firmware security embedded devices vpn networks compression oracle attacks game hackers instrumenting android emulators network identification device identification csirt incidentresponse usb techniques sap erp alexanderpolyakov sase computer security enterprise security fire compass iam neural network genai cybersecurity security decision identity compliance governance ai in cybersecurity 2013 ai code generation iit prof. indranil sengupta ai risk professional branding top100ciso chatgpt edr def open source security infosec media innovation ai worksflows operating system defense coordinated disclosure internetofthings eu data protection framework nist cyber security framework advance soc soc architecture api governance data resilience threat detection security challenges ciso priorities new threats forensics kill chain mfa bypass head it injecting security into web apps with runtime patc technical architecture of rasp technology application threat modelling it managers cybersecurity portfolio cybersecurity portfolio management google’s beyondcorp approach to security automotive security risk quantification (source: rsa usa 2016-san francisco) bfsi exhibitor taxonomy bank security deepfake vectors security incidents web3 attacks risk management healthcare lessons log4j new age threats evolution change management internet zachman framework sabsa ciso platform security maturity model siem pcr vlan blitz waf redash pam building program data processing ecosystem data usage data collection data destruction structure law cycle landscape protection enumeration mitre attack financial india global machine lifecycle oss tech dat mapping wireless operations control systems industrial enterprise open source intelligence workflow automation processor discovery data inventory sme ioc future work scalability generation process hypothesis security control organization hunting economy market drives transformation government steganography developing digital monetization api architecture digital transormation world dwell time data privacy policy industry transportation transport iso 27701 iso dp regulation privacy principles international standards certification pims standard hackathon mobile apps website database ttp sol personal data life ios 11 sandbox qualcomm basebands active directory administrator insecurities what the fax macos kernel graphics driver exploit of nxp socs vulnerability ms17-010 eternal exploits types of ethical hacking cloud pentest ethical hacking steps azure gcp ethical hacking wapt web hacking security vulnerabilities sim architecture cyber range hidden internet surface web non human breaking signatures vendor supply chain breaking smart speakers third party embedded supply chain attacking apple kernel drivers digital leviathan nation-state big brothers lost and found certificates residual certificates pre-owned domains deserialization gadget chains phy layer vulnerabilities rf fuzzing tools criminal justice system reaping and breaking keys security governance breaking parser logic malware analysis automated disassembly architecture setup covid19 kids cyber safety savetheworld chennaichapter international destress source windows system trust networks vendor offense 5g surf practical exploitation of iot networks and ecosyst (sacon 2020) adventures in sdn security share dev change empowerment radio signals mobile network bec breachdisclosure containersecurity bestofsecurity bos paas murraygoldschmidt cyber terrorism thirdparty risk mitigation strategies with better context. checklist thirdpartyrisk vendorriskmanagement vendorriskassessment nasa databreach next generation threat digitalfootprint osint payments
See more