21
Apr,
2017
0Christy Long
The Human Exploitation Kill Chain by Ira Wrinkler
This presentation will use kill chain principles to detail how to determine the most effective holistic methods to mitigate attacks against users. Case studies will be presented.
The Internet of Things: Danger! Intrigue! Spies! Corporate Espionage! Blackmail! DDoS! by Kim Green
PreviousPhishing Email or Fraud by Christy Long for the Beginner
Next