Ziedonis Hall presentations
Evolution of risk: From endpoint ransomware to supply chain compromise
Christian Damsgaard Jensen
Hackers & Pirates Cybersecurity at the High Seas
4G-5G. Good For Your Health Bad For Your Security
LUCKY BREAKS vs. COMPREHENSIVE INFOSEC STRATEGY
SECURE US TO SECURE ME. Enterprises are not victims, they’re vectors
International Regulation of Cybersecurity
The cybersecurity dimension of critical [energy] infrastructure
Why Visibility Matters for Hunting for both OT and IT
Business and Industry
Security vendors – data & network
SOC – myth or reality?
Women In Cybersecurity
Is it possible to program data protection and privacy in if we do not know what it means?
Safety online – statistics, case studies and examples from Latvian Safer Internet Centre.
A Cyber Story: the Writer`s side
Beyond the illusion – how to design safer business