Introducing a password manager and policy Gallery Introducing a password manager and policy 2025 Talks - 25 Minutes Presented by L
Superposition, not Superstition – Why the foreseeable state of quantum computing is not a nightmare for security practitioners Gallery Superposition, not Superstition – Why the foreseeable state of quantum computing is not a nightmare for security practitioners 2025 Talks - 25 Minutes Presented by Johnny Xmas
Foundations of Resilience: Mastering the Business Impact Analysis Gallery Foundations of Resilience: Mastering the Business Impact Analysis 2025 Talks - 25 Minutes Presented by Jeremy Croghan
Technical Writers: Your Cybersecurity Secret Weapon Gallery Technical Writers: Your Cybersecurity Secret Weapon 2025 Talks - 25 Minutes Presented by Jennifer Miller
Which Witch is Which – Navigating the Complicated World of Threat Actor Taxonomy Gallery Which Witch is Which – Navigating the Complicated World of Threat Actor Taxonomy 2025 Talks - 25 Minutes Presented by Jeffrey Bell
The Death and Rebirth of Vulnerability Management Gallery The Death and Rebirth of Vulnerability Management 2025 Talks - 25 Minutes Presented by HD Moore
Don’t trust Rufus, he’s a mole – introducing KIEMPossible Gallery Don’t trust Rufus, he’s a mole – introducing KIEMPossible 2025 Talks - 25 Minutes Presented by Golan Myers
How Attackers are using AI and how to defend against them, by an incident responder turned AI researcher. Gallery How Attackers are using AI and how to defend against them, by an incident responder turned AI researcher. 2025 Talks - 25 Minutes Presented by Eyal Fisher
How phishing-resistant authentication *actually* stops attacks Gallery How phishing-resistant authentication *actually* stops attacks 2025 Talks - 25 Minutes Presented by Eric Woodruff
Hidden Dangers Of AI In Developer Workflows: Navigating Security Risks with Human Insight Gallery Hidden Dangers Of AI In Developer Workflows: Navigating Security Risks with Human Insight 2025 Talks - 25 Minutes Presented by Dwayne McDaniel