FileMood

Download COIS

COIS

Name

COIS

 DOWNLOAD Copy Link

Total Size

3.9 GB

Total Files

126

Hash

23E0D2AA4C0213C417D1BD1182C1A5D137465D80

/COIS 2016/video/

COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.mp4

227.7 MB

COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.mp4

40.7 MB

COIS DA01 How Experts Undermine Your Forensic Evidence Matthew Curtin.srt

46.7 KB

COIS DA02 Datacenter Security Virtualized John Michealson.mp4

50.1 MB

COIS DA02 Datacenter Security Virtualized John Michealson.srt

52.5 KB

COIS DA03 Embracing the Cloud Lisa Guess.mp4

41.5 MB

COIS DA03 Embracing the Cloud Lisa Guess.srt

47.9 KB

COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.mp4

37.2 MB

COIS DA04 It was the best of logs it was the worst of logs Stories through Logging Tom Kopchak.srt

45.9 KB

COIS DA05 Finding the Needle in the Hardware Haystack Identifying and Exploiting Vulnerabilities via.mp4

49.2 MB

COIS DA06 PKI Do You Know Your Exposure Kent King.mp4

28.9 MB

COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.mp4

34.4 MB

COIS DA07 No Tradeoffs Cloud Security and Privacy Dont Need to Be at Odds Jervis Hui.srt

38.4 KB

COIS DA08 Todays Threat Landscape Dean Shroll.mp4

46.5 MB

COIS DA08 Todays Threat Landscape Dean Shroll.srt

43.5 KB

COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.mp4

36.7 MB

COIS DA09 6 Critical Criteria For Cloud Workload Security Sam Herath.srt

32.8 KB

COIS DC00 Educating the Board of Directors Bob West.mp4

72.6 MB

COIS DC00 Educating the Board of Directors Bob West.srt

49.9 KB

COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.mp4

34.5 MB

COIS DC01 Burp Collaborator The Friend You Didnt Know You Needed Jon Gorenflo.srt

39.3 KB

COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.mp4

36.0 MB

COIS DC02 Psychological Warfare How Cyber Criminals Mess With Your Mind Brian Henger.srt

62.0 KB

COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.mp4

39.3 MB

COIS DC03 Threat Modeling for Secure Software Design Robert Hurlbut.srt

62.3 KB

COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.mp4

48.0 MB

COIS DC04 IAST Deep Dive Understanding Interactive Application Security Testing Ofer Maor.srt

57.6 KB

COIS DC05 Building an Application Security Program Mike Spaulding.mp4

121.9 MB

COIS DC05 Building an Application Security Program Mike Spaulding.srt

67.2 KB

COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).mp4

32.1 MB

COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra (2).srt

55.4 KB

COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.mp4

31.7 MB

COIS DC06 Formal Verification of Secure Software Systems Aaron Bedra.srt

42.9 KB

COIS DC07 AppSec without additional tools Jason Kent.mp4

39.5 MB

COIS DC07 AppSec without additional tools Jason Kent.srt

59.8 KB

COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.mp4

46.7 MB

COIS DC08 Leveraging your APM NPM solutions to Compliment your Cyber Defense Strategy Ken Czekaj Rob.srt

64.3 KB

COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.mp4

35.6 MB

COIS DC09 Artificial Intelligence Real Threat Prevention Art Hathaway.srt

37.6 KB

COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.mp4

56.8 MB

COIS DC10 Defending the Next Decade Building a Modern Defense Strategy Mark Mahovlich.srt

46.3 KB

COIS F00 Security vs Compliance in Healthcare.mp4

72.1 MB

COIS F00 Security vs Compliance in Healthcare.srt

45.1 KB

COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.mp4

54.5 MB

COIS F01 How to Secure Things Influence People 10 Critical Habits of Effective Security Managers Chr.srt

16.9 KB

COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.mp4

61.3 MB

COIS F02 Economically Justifying IT Security Initiatives Ruben Melendez.srt

39.4 KB

COIS F03 Cross Industry Collaboration Helen Patton.mp4

47.7 MB

COIS F03 Cross Industry Collaboration Helen Patton.srt

38.5 KB

COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.mp4

49.9 MB

COIS F04 Third Party Risk Governance Why and How Jeffrey Sweet.srt

55.9 KB

COIS F05 IT Data Analytics Why the cobblers children have no shoes Carolyn Engstrom.mp4

72.1 MB

COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.mp4

45.4 MB

COIS F07 BYODAWSCYW Bring Your Own Device And Whatever Security Controls You Want One approach to re.srt

58.9 KB

COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.mp4

46.0 MB

COIS F08 Disaster Recovery and Business Continuity Its never so bad that it cant get worse Valerie T.srt

37.9 KB

COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.mp4

58.2 MB

COIS F10 Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics Heather Enlow Chri.srt

50.1 KB

COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.mp4

36.0 MB

COIS F11 The Legal Perspective on Data Security for 2016 Dino Tsibouris Mehmet Munur.srt

56.9 KB

COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.mp4

79.6 MB

COIS K00 Gamify Awareness Training Failure to engage is failure to secure Michael Woolard.srt

35.1 KB

COIS K01 Vendors and business associates friends or foes Robert Brzezinski.mp4

88.8 MB

COIS K02 State of Security and 2016 Predictions Jason Samide.mp4

41.5 MB

COIS K02 State of Security and 2016 Predictions Jason Samide.srt

13.2 KB

COIS DA00 Future of Information Security Governance Risk and Compliance Max Aulakh Bill Lisse.mp4

53.0 MB

COIS K03 A Capability Maturity Model for Sustainable Data Loss Protection Gabriel Gumbs.srt

39.6 KB

COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.mp4

51.3 MB

COIS K04 Risk Management Tactics to Move From Decision to Execution Tremayne Tre Smith.srt

14.0 KB

COIS K05 Incident Response No Pain No Gain Jim Wojno.mp4

54.5 MB

COIS K05 Incident Response No Pain No Gain Jim Wojno.srt

42.8 KB

COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.mp4

66.1 MB

COIS K06 Building an OSS CICD Security Toolchain Kevin Glavin.srt

25.2 KB

COIS K07 A TouchID of iOS Security James Jamie Bowser.mp4

47.5 MB

COIS MA00 Top 10 Tips for Educating Employees about Cybersecurity Mark Villinski.mp4

35.3 MB

COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.mp4

53.8 MB

COIS MA01 SecOps Innovating Security in Innovative Organizations Warner Moore.srt

29.9 KB

COIS MA02 Youre measuring all the wrong things information security metrics Shawn Sines.mp4

31.1 MB

COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.mp4

35.5 MB

COIS MA03 Why Cybercriminals Are Following The Money Into Online Video Games Matthew Cook.srt

22.9 KB

COIS MA04 Security Certifications are they worth it and which ones are right for you William Diederi.mp4

47.2 MB

COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.mp4

61.9 MB

COIS MA05 Information Security Metrics Practical Security Metrics Jack Nichelson.srt

29.4 KB

COIS MA06 The CONfidence of Things John Robinson.mp4

56.3 MB

COIS MA07 Who is Winning Gary Sheehan.mp4

58.7 MB

COIS MA07 Who is Winning Gary Sheehan.srt

40.7 KB

COIS MA08 Security analytics journey a years lesson learned Mike Schiebel.mp4

43.8 MB

COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.mp4

49.3 MB

COIS MO00 Integrated Software in Networking the Mystery of SDN Oliver Schuermann.srt

43.8 KB

COIS MO01 Securing our Future Lessons From the Human Immune System Gavin Hill.mp4

45.6 MB

COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.mp4

88.5 MB

COIS MO02 Have you tied together your IAM and Information Security Incident Management Program Josep.srt

63.2 KB

COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.mp4

75.4 MB

COIS MO03 Compliance and Security Building a Cybersecurity Risk Management Program Jason Harrell.srt

45.5 KB

COIS MO04 Dont try this at home Things not to do when securing an organization Jessica Hebenstreit.mp4

67.4 MB

COIS MO05 CISO for an Hour Keith Fricke.mp4

62.2 MB

COIS MO05 CISO for an Hour Keith Fricke.srt

67.4 KB

COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.mp4

56.3 MB

COIS MO06 Apple v DOJ Privacy in Todays Enterprise Justin Harvey.srt

56.5 KB

COIS MO07 Myths of Cloud Security Debunked Bil Harmer.mp4

68.7 MB

COIS MO07 Myths of Cloud Security Debunked Bil Harmer.srt

50.2 KB

COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.mp4

97.7 MB

COIS R00 Penetrating the Perimeter Tales from the Battlefield Phil Grimes.srt

33.0 KB

COIS R01 Navigating the FDA Recommendations on Medical Device Security and how they will shape the f.mp4

55.2 MB

COIS R02 Detecting the Undetectable What You Need to Know About OSINT Jerod Brennen.mp4

53.8 MB

COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.mp4

29.2 MB

COIS R03 Why I quit my dream job at Citi A data centric approach to key management Mike Bass.srt

34.9 KB

COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.mp4

78.1 MB

COIS R04 Fail Now So I Dont Fail Later A look into security testing and training methodologies Deral.srt

82.6 KB

COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.mp4

46.1 MB

COIS R05 Putting the Intelligence back in Threat Intelligence Edward McCabe.srt

40.7 KB

COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.mp4

77.1 MB

COIS R06 All Your Door Belong To Me Attacking Physical Access Systems Valerie Thomas.srt

66.0 KB

COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.mp4

63.3 MB

COIS R07 The Humanity of Phishing Attack and Defense Aaron Higbee.srt

72.0 KB

COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.mp4

33.8 MB

COIS R08 cois r08 the node js highway attacks are at full throttle jJoshua Clark.srt

45.2 KB

COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.mp4

41.6 MB

COIS R09 Securing the Breach Using a Holistic Data Protection Framework Alex Hanway.srt

44.0 KB

COIS R10 Understanding Attackers use of Covert Communications Chris Haley.mp4

41.1 MB

COIS R10 Understanding Attackers use of Covert Communications Chris Haley.srt

35.1 KB

COIS R11 InfoSec Productization David Kennedy.mp4

53.3 MB

COIS R11 InfoSec Productization David Kennedy.srt

85.8 KB

Cyber Security Super Bowl 50 Jim Libersky.mp4

56.3 MB

Cyber Security Super Bowl 50 Jim Libersky.srt

37.2 KB

/

COIS thank you.txt

0.8 KB

 

Total files 126


Copyright © 2024 FileMood.com