Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Wireless is easy. Secure Wireless is the challenge. Peter Johansson There are more breaches than ever around the world and with more and more access to the company network wirelessly hackers have new ways to get in und... 7 years ago | 33 mins Your Thing is Pwned - security challenges for IoT' Paul Fremantle The Internet of Things is creating a virtually infinite attack surface. When you buy a device you don't know what information it is sharing, and it is... 7 years ago | 36 mins Helpful hackers Chris van 't Hof Hospital leaks patient records’, ‘Public transport smartcard has more holes than a sieve’, ‘Mobile banking app unsafe’ – it seems that everything can ... 7 years ago | 38 mins Securing cyber space in Latvia through the public-private partnership Elīna Vīksne - 7 years ago | 22 mins Proactive Insider Threat Management. From theory to reality. Eugene Goncharenko Building an efficient insider threat management system became a vital project for the recently established National Anticorruption Bureau of Ukraine. ... 7 years ago | 23 mins How to find and test our weakest points by using Rapid7 solutions Piotr Czopik Remember that chain is only as strong as its weakest link. For company security it is crucial to be familiar with newest vulnerabilities and to deal w... 7 years ago | 26 mins Security risks and common mistakes in mobile application development. Kristaps Felzenbergs As mobile applications are becoming more popular many organizations are serving their business oriented services on mobile devices to ease daily opera... 7 years ago | 16 mins Understand and Protect Data in the Era of Cloud Computing Asa Kedar Do you know where our data is? Who is accessing it? How sensitive it is? Can you measure your risk? Come and hear how Microsoft approach information p... 7 years ago | 28 mins Top 10 IT admin fails Oskars Zīle Most popular IT admin fails I have saw in my profesional life, that can be fixed in notime, but gives a useful impact to system security. 7 years ago | 31 mins Third line of Defence Karlis Majevskis In his presentation, Karlis will give quick insight about Internal Audit profession, it’s role and importance in organization. 7 years ago | 26 mins Load more