Feel free to include my content in your page via my RSS feed Follow @irongeek_adc
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment:
Louisville Infosec 2013 Videos Louisville Infosec 2013 Videos Below are the videos from Louisville Infosec 2013 conference. Mobile Security and the Changing Workforce - Matthew Witten Burn it Down! Rebuilding an Information Security Program - Dave Kennedy Weaponized Security - Kellman Meghu Information Security in University Campus and Open Environments - Adrian Crenshaw Past Due: Practical Web Service Vulnerability Assessment for Pen-Testers, Developers, and QA - Jeremy Druin STRC: The Security Training and Research Cloud - Jimmy Murphy Assessing Mobile Applications with the MobiSec Live Environment - Nathan Sweeney Attacking iOS Applications - Karl Fosaaen Can cloud and security be used in the same sentence? - Joshua Bartley Breaking SCADA Communications - Mehdi Sabraoui FBI – InfraGard - Current Cyber Trends How Do I Get There from Here? Security-to-Privacy Career Migration - Michael Carr Assessing the Risk of Unmanaged Devices (BYOD) - Pete Lindstrom Acquisitions…your latest zero day - Mitch Greenfield/Scott MacArthur NIST and your risky application - Conrad Reynolds Convergence: Configurations, Vulnerabilities and Unexpected Changes - Brian Cusack What Healthcare Can Learn from the Banking Industry - Jim Czerwonka Eliminating Data Security Threats And BYOS - David Braun Awards
Louisville Infosec 2013 Videos
Below are the videos from Louisville Infosec 2013 conference.
Mobile Security and the Changing Workforce - Matthew Witten
Burn it Down! Rebuilding an Information Security Program - Dave Kennedy
Weaponized Security - Kellman Meghu
Information Security in University Campus and Open Environments - Adrian Crenshaw
Past Due: Practical Web Service Vulnerability Assessment for Pen-Testers, Developers, and QA - Jeremy Druin
STRC: The Security Training and Research Cloud - Jimmy Murphy
Assessing Mobile Applications with the MobiSec Live Environment - Nathan Sweeney
Attacking iOS Applications - Karl Fosaaen
Can cloud and security be used in the same sentence? - Joshua Bartley
Breaking SCADA Communications - Mehdi Sabraoui
FBI – InfraGard - Current Cyber Trends
How Do I Get There from Here? Security-to-Privacy Career Migration - Michael Carr
Assessing the Risk of Unmanaged Devices (BYOD) - Pete Lindstrom
Acquisitions…your latest zero day - Mitch Greenfield/Scott MacArthur
NIST and your risky application - Conrad Reynolds
Convergence: Configurations, Vulnerabilities and Unexpected Changes - Brian Cusack
What Healthcare Can Learn from the Banking Industry - Jim Czerwonka
Eliminating Data Security Threats And BYOS - David Braun
Awards
Printable version of this article
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek Louisville / Kentuckiana Information Security Enthusiast