Personal Information
Entreprise/Lieu de travail
Shenzhen, Guangdong China
- Présentations
- Documents
- Infographies
Social Media Security Risk Slide Share Version
famudal
•
il y a 12 ans
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
•
il y a 12 ans
Top 8 global megatrends
Anders Lindgren
•
il y a 13 ans
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincent Van Mieghem, Deloitte
MITRE - ATT&CKcon
•
il y a 5 ans
Wavemaker Cryptocurrency Overview Dec 2017
David Siemer
•
il y a 6 ans
SXSW 2019 - Top Trends
Matteo Sarzana
•
il y a 4 ans
The A to Z Guide to Business Continuity and Disaster Recovery
Sirius
•
il y a 9 ans
6 TIPS to SURVIVE the 2nd MACHINE AGE
Floown
•
il y a 8 ans
How to Survive Doomsday
Empowered Presentations
•
il y a 11 ans
Philosophy of Technology
Melanie Swan
•
il y a 7 ans
AI and ML in Cybersecurity
Forcepoint LLC
•
il y a 5 ans
Understanding the "Intelligence" in AI
Forcepoint LLC
•
il y a 4 ans
The essential future topics and memes from my 2015 presentations (Futurist Keynote Speaker Gerd Leonhard)
Gerd Leonhard
•
il y a 8 ans
How to Test High-Performance Next-Generation Firewalls
Ixia
•
il y a 12 ans
Firewall Testing Methodology
Ixia
•
il y a 13 ans
Practical Applications of Block Chain Technologies
Priyanka Aash
•
il y a 7 ans
Capture the Flag Exercise Using Active Deception Defense
Fidelis Cybersecurity
•
il y a 5 ans
How to Plan Purple Team Exercises
Haydn Johnson
•
il y a 6 ans
Building a Cyber Range for training Cyber Defense Situation Awareness
Thibault Debatty
•
il y a 4 ans
Cyber Range - An Open-Source Offensive / Defensive Learning Environment on AWS
Tom Cappetta
•
il y a 4 ans