Index of /rsaconference/europe-2012/


../
10-Reasons-Not-to-Virtualize-The-Security-Persp..> 31-Jul-2013 00:40             1310127
7-Highly-Effective-Habits-of-a-Security-Awarene..> 31-Jul-2013 00:42              341921
A-Flexible-and-Comprehensive-Approach-to-a-Clou..> 31-Jul-2013 00:30             2571477
Active-Defence-How-to-Counter-Your-Attackers.pdf   30-Jul-2013 17:47             1327599
Adversary-ROI-Evaluating-Security-from-the-Thre..> 30-Jul-2013 16:02             2020204
Are-We-Getting-Better-Why-We-Do-not-Know-What-W..> 30-Jul-2013 21:08             2169619
Big-Data-Big-Threat-or-Big-Opportunity-for-Secu..> 30-Jul-2013 21:06              682113
Breaking-the-Failure-Cycle-Why-Breaches-from-Kn..> 31-Jul-2013 00:37             6529188
Cases-of-JavaScript-Misuse-and-How-to-Avoid-The..> 30-Jul-2013 02:38             3961655
Cloud-Provider-Assurance.pdf                       30-Jul-2013 16:01             1461239
Cloud-Provisioning-and-Security-Using-Oauth2-an..> 30-Jul-2013 20:40              403376
Conflicting-Visions-of-Cloud-Identity.pdf          30-Jul-2013 20:58             1432846
Cracked-SSL.pdf                                    31-Jul-2013 00:36              248194
Csirt-Cyber-Extortion-Ddos-Attacks-Forensics.pdf   30-Jul-2013 17:45             1101108
Customisable-Security-Leveraging-Big-Data-for-M..> 30-Jul-2013 21:15             1614859
Cyber-Crime-Easy-as-Pie-and-Damn-Ingenious.pdf     30-Jul-2013 16:10             9236944
Cyber-Jihad-vs-Cyberterrorism-Separating-Hype-F..> 30-Jul-2013 17:49             1588094
Dealing-with-Big-Data-in-Cyber-Intelligence.pdf    30-Jul-2013 17:48             1799845
Deceiving-Permissions-Rules-for-Android-Malware..> 30-Jul-2013 21:12             1208973
Defending-Behind-the-Device-Mobile-Application-..> 30-Jul-2013 21:13             3471436
Developing-Secure-Software-in-the-Age-of-Advanc..> 15-Jul-2013 22:52             1584149
Dissecting-Advanced-Targeted-Attacks-Separating..> 31-Jul-2013 00:35             2035360
Duqu-Flame-Gauss-Followers-of-Stuxnet.pdf          30-Jul-2013 14:29             1057511
Encryption-for-Clouds.pdf                          30-Jul-2013 14:35             2847658
Entitlement-And-Why-Identity-Needs-to-be-About-..> 30-Jul-2013 20:51             2683278
Flipit-A-Game-Theory-Handle-on-Password-Reset-a..> 30-Jul-2013 20:44             1094599
Full-Employment-Good-or-Bad-News-for-the-Inform..> 30-Jul-2013 21:37             1997143
Games-of-Keys-and-Clouds-Finding-a-Nash-Equilib..> 31-Jul-2013 00:44             1535488
Good-Guys-vs-the-Bad-Guys-Can-Big-Data-Tools-Co..> 31-Jul-2013 00:33             2306785
Hacking-Senior-Management-Selling-Security-to-t..> 30-Jul-2013 21:39             2540188
Hacking-the-Virtual-World.pdf                      30-Jul-2013 20:32             1447526
How-SCIM-Simplifies-Migration-to-Cloud-Services..> 30-Jul-2013 20:33              640233
How-To-Rob-An-Online-Bank-And-Get-Away-With-It.pdf 30-Jul-2013 16:08              817074
How-to-Build-a-Cyber-Intelligence-Capability.pdf   31-Jul-2013 00:45             4589836
How-to-Grow-and-Transform-Your-Risk-and-Securit..> 31-Jul-2013 00:31             1328596
How-to-Set-Up-Integrated-Security-Governance-Pr..> 30-Jul-2013 15:58              664366
Implementing-an-Intelligent-SOC.pdf                31-Jul-2013 00:32              868569
Intelligence-Driven-Security-In-Action.pdf         30-Jul-2013 21:03             3139887
Intelligence-Driven-Security-The-New-Model.pdf     30-Jul-2013 21:03             1630664
Mastering-Security-in-Agile-Scrum-Case-Study.pdf   30-Jul-2013 02:31              829511
Me-and-My-Digital-Shadow-Protecting-and-Detecti..> 31-Jul-2013 00:41             2342740
Microsoft-Security-Intelligence-Report.pdf         30-Jul-2013 14:34             5448643
No-Followers-No-Botnet-No-Problem-Asymmetric-De..> 30-Jul-2013 16:08              937726
Opening-the-Kimono-Automating-Behavioural-Analy..> 30-Jul-2013 21:09             3426337
Poortego-An-OS-INT-correlation-tool-for-the-99.pdf 30-Jul-2013 14:30             1193392
Practical-Security-Risk-Management-Strategies-i..> 30-Jul-2013 16:03             1679459
Privacy-by-Design-From-Theory-to-Practice.pdf      30-Jul-2013 14:33              286712
Privacy-by-Design-Security-by-Design.pdf           30-Jul-2013 21:32              233522
Protecting-Your-Data-on-Mobile-Devices.pdf         30-Jul-2013 14:31             1151001
README.txt                                         16-Feb-2015 04:13                  80
Risks-and-Rewards-in-Cloud-Adoption.pdf            30-Jul-2013 21:04              952632
SSL-and-Browser-Security-Why-is-it-Such-an-Uphi..> 30-Jul-2013 20:30             1826354
Securing-Big-Data-Learning-and-Differences-from..> 30-Jul-2013 14:32             1277157
Securing-the-Supply-Chain-Guide-to-Risk-Managem..> 30-Jul-2013 15:56              615573
Security-Implications-of-the-Internet-Transitio..> 30-Jul-2013 02:35             1853086
Smartphone-Security-Winners-Losers.pdf             30-Jul-2013 21:14             2992458
Step-into-the-Future-HTML5-and-its-Impact-on-SS..> 31-Jul-2013 00:36              766275
Surviving-as-a-CISO-in-a-World-of-Zombie-Audito..> 30-Jul-2013 16:06             1790140
Testing-Darwinism-The-History-and-Evolution-of-..> 31-Jul-2013 00:34             1396438
The-Future-of-Cloud-Identity-Security.pdf          30-Jul-2013 20:50              788247
The-Growing-Threat-of-Embedded-Hacking.pdf         30-Jul-2013 20:28             1713686
The-Legal-Attack-Vector-How-To-Protect-Yourself..> 30-Jul-2013 21:31              654822
The-Mobile-Criminal-A-Pocket-Full-of-Maliciousn..> 30-Jul-2013 21:08             2864467
The-Mobile-Enterprise-7-Strategies-to-Manage-Ri..> 30-Jul-2013 21:11              372725
The-XX-Factor-Why-Women-are-Key-to-the-Future-o..> 30-Jul-2013 21:38              329438
They-are-Inside-Now-What.pdf                       30-Jul-2013 17:44             2017947
Training-Employees-to-Recognise-and-Avoid-Advan..> 31-Jul-2013 00:43             2528365
Using-Security-Intelligence-to-Stay-Out-of-the-..> 30-Jul-2013 14:37             1974550
Using-Social-Engineering-Tactics-for-Big-Data-E..> 30-Jul-2013 14:36              841750
Ways-To-Interpret-Security-Standards-What-We-Ca..> 30-Jul-2013 15:57             1315573
What-the-Security-Profession-Can-Learn-From-the..> 30-Jul-2013 17:43              322496