rsa2018byClyde
size: 297.68 MB
|- “The System…Is People!” Designing Effective Security UX.pdf - 2.90 MB
|- “No You May Not Have a Pony”—The Art of the Possible in Secure IAM Design.pdf - 891.00 kB
|- Women in Security: A Progressive Movement.pdf - 1.10 MB
|- Within 10 Years, Autonomous Vehicles Will Change Every CISO’s Job.pdf - 2.30 MB
|- Winning the OS X Malware War: Neurally Finding Outbreaks.pdf - 11.00 MB
|- WiFi Security: The Details Matter.pdf - 2.20 MB
|- Why Did We Make Security So Hard?.pdf - 1.40 MB
|- When in Russia: Hacking Vice Abroad.pdf - 21.70 MB
|- What Time Is It? How Manipulating “Now” Can Crash Our World.pdf - 2.10 MB
|- Value-At-Risk: Decision-Making in Cybersecurity Investments.pdf - 3.20 MB
|- Two Keys Are Better than One but Three Keys Are Better than Two.pdf - 2.20 MB
|- Turning Your Security Strategy Inside Out—Managing Insider Threat.pdf - 1.20 MB
|- Transparency of SW and IoT Components: An Open Approach to Bill of Materials.pdf - 1.60 MB
|- Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense.pdf - 1.50 MB
|- Threat Intelligence Insights—DNS-Based Data Exfiltration in the Wild.pdf - 1.40 MB
|- Threat Intel and Content Curation Organizing the Path to Successful Detection.pdf - 1.60 MB
|- Threat Hunting Strategy: How to Catch Bears and Pandas.pdf - 351.00 kB
|- Think Like a Hacker but Act Like an Engineer.pdf - 402.00 kB
|- They’re In! Now What? Containment—Is It Possible, Worthwhile, Effective?.pdf - 161.00 kB
|- There’s No Such Thing as a Cyber-Risk.pdf - 1.60 MB
|- The Untold Story of 8200: A Launching Point for Women in Cybersecurity.pdf - 711.00 kB
|- The Unexpected Attack Vector: Software Updaters.pdf - 8.00 MB
|- The Trump Administration & Congress: Decrypting the Cybersecurity Agenda.pdf - 348.00 kB
|- The Top Nine Factors for Effective Data Protection Controls.pdf - 2.40 MB
|- The Supply Chain Threat.pdf - 370.00 kB
|- The Sky Is Falling! Responding Rationally to Headline Vulnerabilities.pdf - 1.10 MB
|- The Sad Tale of Etaoin ShrdLu and the Danger of Automated Pen Tests.pdf - 1.00 MB
|- The Rise of Supply Chain Attacks.pdf - 2.30 MB
|- The Rise of Confidential Computing.pdf - 3.50 MB
|- The Realities of Enterprise Blockchain.pdf - 3.60 MB
|- The Promise of IoT Best Practices, Testing and Hazards of Inaction.pdf - 1.60 MB
|- The NIST Cybersecurity Framework: What’s Next!.pdf - 167.00 kB
|- The New Landscape of Airborne Cyberattacks.pdf - 5.50 MB
|- The New Geopolitics of Cybersecurity Research.pdf - 1.50 MB
|- The New Barons of Cyberspace: ICO Creators and Ransomware Authors.pdf - 1.90 MB
|- The Long Road to Identity on the Blockchain.pdf - 16.30 MB
|- The Life and Times of Cybersecurity Professionals.pdf - 466.00 kB
|- The Incident Response Class of 2018: Tactics and Tales from the Frontline.pdf - 207.00 kB
|- The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem.pdf - 1.60 MB
|- The GDPR Is Only for Europe—Right?.pdf - 1.10 MB
|- The Future of Trust in Ecosystems—Global Challenges.pdf - 940.00 kB
|- The Future of Cyberterrorism.pdf - 3.70 MB
|- The Fascination of Connectivity—Rediscovered.pdf - 705.00 kB
|- The EU’s General Data Protection Regulation—Beauty or Beast?.pdf - 348.00 kB
|- The Entrepreneur and the CISO—10 Traits to Drive Success.pdf - 541.00 kB
|- The Emerging Product Security Leader Discipline.pdf - 1.60 MB
|- The Emergent Cloud Security Toolchain for CICD.pdf - 7.60 MB
|- The Dark Web and How It Affects Your Industry.pdf - 741.00 kB
|- The Cybersecurity Job Seekers Report: Results and Implications.pdf - 2.60 MB
|- The Bottom of the Barrel—Scraping Pastebin for Obfuscated Malware.pdf - 8.80 MB
|- Tech Scams: It’s Time to Release the Hounds.pdf - 27.00 kB
|- Taking the Pulse on Cyber-Intelligence.pdf - 6.20 MB
|- Swimming in a Sea of Enemies—The Dilemmas of the Threat Researcher.pdf - 168.00 kB
|- Super Forecasting: Even You Can Perform High-Precision Risk Assessments.pdf - 3.50 MB
|- Strategies to Finding and Building Your Robust Workforce.pdf - 480.00 kB
|- Strategic Cyber-Actions and How They Could Affect Your Company.pdf - 4.70 MB
|- Stop Translating, Start Defending: Common Language for Managing Cyber-Risk.pdf - 2.60 MB
|- STIX Patterning: Viva la Revolución!.pdf - 892.00 kB
|- Spectre Attacks: Exploiting Speculative Execution.pdf - 2.30 MB
|- SOC 2030—SOCs Are Broken. Let’s Fix Them..pdf - 1.30 MB
|- Sneak Your Way to Cloud Persistence—Shadow Admins Are Here to Stay.pdf - 9.20 MB
|- Skate to Where the Puck Is Going: The VC Perspective on the Security Market.pdf - 890.00 kB
|- Side Channels – 1.pdf - 6.60 MB
|- Side Channels - 2.pdf - 992.00 kB
|- Shifting Organizational Culture through Cyber-Awareness.pdf - 1.01 MB
|- Seven Tips for Mentoring Security Newbies.pdf - 2.90 MB
|- Sending a Human to Do a Machine’s Job: Addressing Threats with Analytics.pdf - 857.00 kB
|- Seeing Is Believing: Making the Cyber-Hype Real with Hacking Demos.pdf - 2.60 MB
|- Security Programs. ROI not CYA..pdf - 158.00 kB
|- Security Orchestration and Incident Response.pdf - 812.00 kB
|- Security Foundations.pdf - 11.90 MB
|- Security Debt: What Lurks Beneath.pdf - 4.40 MB
|- Security Culture Hacking: Disrupting the Security Status Quo.pdf - 1.80 MB
|- Security Automation Simplified via NIST OSCAL: We’re Not in Kansas Anymore.pdf - 1.30 MB
|- Security and Privacy of Machine Learning.pdf - 3.30 MB
|- Security 101: The Critical Need to Go Back to the Basics.pdf - 1.01 MB
|- Securing the IoT Connected Car with Digital Identity.pdf - 3.10 MB
|- Securing the Future of Mobility: Is Your Connected Car Unhackable?.pdf - 1.30 MB
|- Securing Innovation: Shifting the Conversation from Fear to Possibility.pdf - 25.20 MB
|- Secure Storage.pdf - 2.40 MB
|- Secrets of the Encrypted Internet—Worldwide Cryptographic Statistics.pdf - 9.60 MB
|- SDN and Security: A Marriage Made in Heaven. Or Not..pdf - 2.00 MB
|- Scaling an Application Security Program at the IMF: A Case Study.pdf - 1.00 MB
|- SCADA 101.pdf - 852.00 kB
|- RSAC CyberSmart Parents Education Seminar - Van Natta.pdf - 157.00 kB
|- RSAC CyberSmart Parents Education Seminar - Schrader.pdf - 486.00 kB
|- RSAC CyberSmart Parents Education Seminar - Pelavin 2.pdf - 2.90 MB
|- RSAC CyberSmart Parents Education Seminar - Pelavin 1.pdf - 1.10 MB
|- RSAC CyberSmart Parents Education Seminar - Herzog.pdf - 234.00 kB
|- RSAC CyberSmart Parents Education Seminar - Brooklyn - Madison.pdf - 909.00 kB
|- Robotic Telepresence—Is Your Enemy Watching You?.pdf - 2.20 MB
|- Risk-Based Approach to Deployment of Omnichannel Biometrics in Sberbank.pdf - 5.80 MB
|- Rise of the Machines: DevOps and the Role of Secrets Management.pdf - 1.10 MB
|- Rethinking Employee Surveillance in a New Digital Era.pdf - 1.70 MB
|- ReproNow—Save Time Reproducing and Triaging Security Bugs.pdf - 2.10 MB
|- Red Team vs. Blue Team on AWS.pdf - 2.60 MB
|- Red Phish, Blue Phish: A New Approach to Phishing Simulations.pdf - 7.40 MB
|- Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow.pdf - 2.80 MB
|- Recognizing and Beating Cyber-Fatigue.pdf - 3.40 MB
|- Realizing Software Security Maturity: The Growing Pains and Gains.pdf - 3.40 MB
How to download