SECURITY RESOURCES
Offensive minded security exploit development![Intel Driven Threat Hunting](https://versprite.com/wp-content/uploads/2020/07/Threat-Hunting-1-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Intel Driven Threat Hunting
![Understanding and Achieving CMMC Compliance](https://versprite.com/wp-content/uploads/2020/07/Security-maturity-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Understanding and Achieving CMMC Compliance
![VerSprite To Speak at ISSA NC’s Security Summit](https://versprite.com/wp-content/uploads/2020/07/app-security-1024x576.png)
Slides & Presentations, VerSprite Security Resources
VerSprite To Speak at ISSA NC’s Security Summit
![Road to the Executive Seat Panel Discussion: The African American CISO Journey](https://versprite.com/wp-content/uploads/2020/07/businessman-black-1024x576.png)
Slides & Presentations, VerSprite Security Resources, Webinars
Road to the Executive Seat Panel Discussion: The African American CISO Journey
![Offensive Threat Models Against the Supply Chain](https://versprite.com/wp-content/uploads/2020/02/supply-chain-network-1024x576.png)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain
![Data Management: Best Practices for Security & Privacy](https://versprite.com/wp-content/uploads/2018/11/Cybersecurity-Data-Privacy-1024x576.png)
Slides & Presentations, VerSprite Security Resources, Webinars
Data Management: Best Practices for Security & Privacy
![Statistical Methods for Triaging](https://versprite.com/wp-content/uploads/2018/09/Statistical-Sampling-1024x576.png)
Slides & Presentations, VerSprite Security Resources, Webinars
Statistical Methods for Triaging
![Abusing Insecure Windows Communication Foundation (WCF) Endpoints](https://versprite.com/wp-content/uploads/2018/09/insecure-windows-communication-1024x576.png)
Research Advisories, Slides & Presentations, VerSprite Security Resources, Webinars
Abusing Insecure Windows Communication Foundation (WCF) Endpoints
![Understanding Data Privacy in a Digital Age](https://versprite.com/wp-content/uploads/2018/05/Understanding-Data-Privacy-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Understanding Data Privacy in a Digital Age
![Going Back in Time to Abuse Android’s JIT](https://versprite.com/wp-content/uploads/2018/04/Androids-JIT-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Going Back in Time to Abuse Android’s JIT
![Oh the POSsibilities – BSides ATL 2018](https://versprite.com/wp-content/uploads/2018/04/Point-of-Sale-Security-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Oh the POSsibilities – BSides ATL 2018
![XXE – OWASP](https://versprite.com/wp-content/uploads/2018/02/XML-External-Entity-1024x576.png)
Slides & Presentations, VerSprite Security Resources
XXE – OWASP
![Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016](https://versprite.com/wp-content/uploads/2016/07/Attack-Trees-Vignettes-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
![Attack Trees for Containers as a Service (CaaS)](https://versprite.com/wp-content/uploads/2016/05/attack-trees-for-containers-1024x576.png)
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
![Organizational Threat Models – Atlanta Cyber Security Summit 2016](https://versprite.com/wp-content/uploads/2016/04/Organizational-Threat-Models-1-1024x576.png)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016
![ci cd security, devsecops ci/cd](https://versprite.com/wp-content/uploads/2022/11/hero-img-02.jpg)
Subscribe for Our
Updates
Please enter your email address and receive the latest updates