Slides & Presentations

Global, Diverse Presentations from Our Leading Professionals

Oh the POSsibilities

5 May 2018

Read more

arrow right
avatart

posted by Anthony Sasadeusz

Messaging for a Security Breach

4 May 2018

Security breaches have become more common but many organizations are challenged when it's time to make the announcement. This presentation includes examples and steps that may be taken before the breach to streamline the announcement and notification process.

Read more

arrow right
avatart

posted by Ray Strubinger

Leveraging Risk Centric Threat Models for Integrated Risk Management

1 May 2018

Read more

arrow right
avatart

posted by Tony UV

Infiltrate 2018 – Going Back in Time to Abuse Android’s JIT

27 April 2018

Read more

arrow right
avatart

posted by Benjamin Watson

XXE – OWASP

15 February 2018

Read more

arrow right
avatart

posted by Versprite

Risk Centric Application Threat Modeling Case Studies

9 June 2017

Examples in applying the PASTA (Process for Attack SImulation & Threat Analysis) threat modeling methodology. Presentation delivered in Belfast at two different OWASP.org related events.

Read more

arrow right
avatart

posted by Versprite

Secure icon

Subscribe to our newsletter



Tags

Let us build a tailored engagement for you.

We are an international squad of professionals working as one.

logos