Discover
Why Prezi
Products
Create moving, zooming presentations that grab attention and keep it.
Appear right alongside your content while presenting to your audience.
Make stunning interactive charts, reports, maps, infographics, and more.
Supply Chain Security Supply Chain Security WWSupply Chain Security
Building biggish data analytics in Neo4j Building biggish data analytics in Neo4j WWBuilding biggish data analytics in Neo4j
Copy of Cyber Tools and Export ControlCopy of Cyber Tools and Export ControlWWCopy of Cyber Tools and Export Control
Cyber Tools and Export ControlCyber Tools and Export ControlWWCyber Tools and Export Control
T2 Keynote FinalT2 Keynote FinalWWT2 Keynote Final
S4x16: In The WildS4x16: In The WildWWS4x16: In The Wild
Questions to be addressed:Questions to be addressed:WWQuestions to be addressed:
Export Control on "Intrusion Software" is a bad idea.Export Control on "Intrusion Software" is a bad idea.WWExport Control on "Intrusion Software" is a bad idea.
An Offensive View Of The InternetAn Offensive View Of The InternetWWAn Offensive View Of The Internet
Unseen Threat Surfaces and How They Can Hurt YouUnseen Threat Surfaces and How They Can Hurt YouWWUnseen Threat Surfaces and How They Can Hurt You
Copy of PHP Object Injection RevisitedCopy of PHP Object Injection RevisitedWWCopy of PHP Object Injection Revisited
What's at Stake? SyScan 2013 KeynoteWhat's at Stake? SyScan 2013 KeynoteWWWhat's at Stake? SyScan 2013 Keynote
Amateur Hour on the InternetAmateur Hour on the InternetWWAmateur Hour on the Internet
Three Cyberwar Fallacies (ISSA South Florida 2012)Three Cyberwar Fallacies (ISSA South Florida 2012)WWThree Cyberwar Fallacies (ISSA South Florida 2012)
What is a Cyber-weaponWhat is a Cyber-weaponWWWhat is a Cyber-weapon
Secrets in Your Pocket - Mark WuerglerSecrets in Your Pocket - Mark WuerglerWWSecrets in Your Pocket - Mark Wuergler
Three Cyberwar Fallacies (RSA 2012)Three Cyberwar Fallacies (RSA 2012)WWThree Cyberwar Fallacies (RSA 2012)
Three Cyberwar Fallacies (Usenix 2011) (Final 2)Three Cyberwar Fallacies (Usenix 2011) (Final 2)WWThree Cyberwar Fallacies (Usenix 2011) (Final 2)
Three Cyber War Fallacies (Usenix 2011)Three Cyber War Fallacies (Usenix 2011)WWThree Cyber War Fallacies (Usenix 2011)
Copy of Three Cyber-War fallaciesCopy of Three Cyber-War fallaciesWWCopy of Three Cyber-War fallacies
Three Cyber-War fallaciesThree Cyber-War fallaciesWWThree Cyber-War fallacies
El Jefe Versus Windows Task Scheduler 0dayEl Jefe Versus Windows Task Scheduler 0dayWWEl Jefe Versus Windows Task Scheduler 0day
pyREtic redux - Rich SmithpyREtic redux - Rich SmithWWpyREtic redux - Rich Smith
El Jefe - IntroductionEl Jefe - IntroductionWWEl Jefe - Introduction
pyREtic - Rich Smith [BlackHat/Defcon 2010]pyREtic - Rich Smith [BlackHat/Defcon 2010]WWpyREtic - Rich Smith [BlackHat/Defcon 2010]