SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, VerSprite Security Resources
Intel Driven Threat Hunting
Slides & Presentations, VerSprite Security Resources
Understanding and Achieving CMMC Compliance
Slides & Presentations, VerSprite Security Resources
VerSprite To Speak at ISSA NC’s Security Summit
Slides & Presentations, VerSprite Security Resources, Webinars
Road to the Executive Seat Panel Discussion: The African American CISO Journey
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain
Slides & Presentations, VerSprite Security Resources, Webinars
Data Management: Best Practices for Security & Privacy
Slides & Presentations, VerSprite Security Resources, Webinars
Statistical Methods for Triaging
Research Advisories, Slides & Presentations, VerSprite Security Resources, Webinars
Abusing Insecure Windows Communication Foundation (WCF) Endpoints
Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age
Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT
Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018
Slides & Presentations, VerSprite Security Resources
XXE – OWASP
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016
Subscribe for Our
Updates
Please enter your email address and receive the latest updates