Ziedonis Hall presentations
-
Chester Wysniewski
Evolution of risk: From endpoint ransomware to supply chain compromise
-
Christian Damsgaard Jensen
Hackers & Pirates Cybersecurity at the High Seas
-
Grant Colgan
4G-5G. Good For Your Health Bad For Your Security
-
Lars Hilse
LUCKY BREAKS vs. COMPREHENSIVE INFOSEC STRATEGY
-
Sheldon Nailer
SECURE US TO SECURE ME. Enterprises are not victims, they’re vectors
-
Dennis-Kenji Kipker
International Regulation of Cybersecurity
-
Vytautas Butrimas
The cybersecurity dimension of critical [energy] infrastructure
-
Bryan Geraldo
Why Visibility Matters for Hunting for both OT and IT
Business and Industry
-
Aleksandrs Bereznojs
Bridging the gaps of GDPR guidance for “data protection by design and by default” with PCI Software Security Framework
-
Martin Jarrold
A “Network of Networks” for Sustainability: A Cyber-Secure Satellite-5G World
Security vendors – data & network
-
Gabriel Mazarache
WHAT IT MEANS TO BE VULNERABLE. The complexity of the human-technology blend
-
Luka Mulej
How to make your remote control secure
-
Padraigh Conway
Avoiding a Data Breach
SOC – myth or reality?
-
Jacek Stańczyk
Cyber Threat Hunting with IBM i2 Enterprise Insight Analysis.
-
Jonas Poenicke
Modern Risk Awareness – Taking the Attacker Perspective into Account
Women In Cybersecurity
-
Anna Vladimirova-Kryukova
Is it possible to program data protection and privacy in if we do not know what it means?
-
Maija Katkovska
Safety online – statistics, case studies and examples from Latvian Safer Internet Centre.
-
Svetlana Amberga
A Cyber Story: the Writer`s side
-
Thea Sogenbits
Beyond the illusion – how to design safer business