SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, VerSprite Security Resources
Intel Driven Threat Hunting

Slides & Presentations, VerSprite Security Resources
Understanding and Achieving CMMC Compliance

Slides & Presentations, VerSprite Security Resources
VerSprite To Speak at ISSA NC’s Security Summit

Slides & Presentations, VerSprite Security Resources, Webinars
Road to the Executive Seat Panel Discussion: The African American CISO Journey

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain

Slides & Presentations, VerSprite Security Resources, Webinars
Data Management: Best Practices for Security & Privacy

Slides & Presentations, VerSprite Security Resources, Webinars
Statistical Methods for Triaging

Research Advisories, Slides & Presentations, VerSprite Security Resources, Webinars
Abusing Insecure Windows Communication Foundation (WCF) Endpoints

Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age

Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT

Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018

Slides & Presentations, VerSprite Security Resources
XXE – OWASP

Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016

Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016

Subscribe for Our
Updates
Please enter your email address and receive the latest updates