centralohioissa

Sort by
Mike Spaulding - Building an Application Security Program
Jake Williams - Navigating the FDA Recommendations on Medical Device Security - and how they will shape the future of all IoT
Bob West - Educating the Board of Directors
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk
Tre Smith - From Decision to Implementation: Who's On First?
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Sean Whalen - How to Hack a Hospital
Robert Hurlbut - Threat Modeling for Secure Software Design
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad that it can't get worse"
Rafeeq Rehman - Breaking the Phishing Attack Chain
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN