Louisville Infosec 2014 Videos
Below are the videos from the Louisville Infosec 2014 conference. Thanks to @theglennbarrett, @f0zziehakz and @bridwellc for helping me record.
All of Your Compliance Needs with One Methodolgy
Jim CzerwonkaLockade: Electronic Games for Locksport
Adrian CrenshawWhat's Hiding in Your Software Components? Hidden Risks of Component-Based Software Development: Seeing the Forest Through the Trees
Ryan Berg (No show?)Mining Data from the Windows Registry
Jason HaleIdentity Theft: Who's in YOUR Wallet?
Richard Starnes & Rick NordMobile Telephony for InfoSec Practitioners
Daniel HeltonBuilding an Enterprise DDoS Mitigation Strategy
Mitchell GreenfieldPractical interception of mobile device traffic
Jeremy DruinChanging What Game- One Future for Information Security
Michael LosavioTrash Talkin - IT Audit Guide to Dumpster Diving
John LiestmanLinking Users to Social Media Usage on Android Mobile Devices
Ryan FerreiraOrigin of CyberSecurity Laws - An Insider's Story
Steve RiggsA Place at the Table
Kristen SullivanWhat your Web Vulnerability Scanners Aren't Telling You
Greg PattonCreating the Department of How: Security Awareness that makes your company like you.
Ira WinklerAre You Really PCI DSS Compliant? Case Studies of PCI DSS Failure!
Jeff ForesmanWhere does Data Security fit into the Data Quality strategy?
Michael Vincent
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek