SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources, Videos, Webinars
Effective Cybersecurity Planning Starts and Ends in the Boardroom

Slides & Presentations, VerSprite Security Resources, Webinars
Road to the Executive Seat Panel Discussion: The African American CISO Journey

Threat Modeling, VerSprite Security Resources, Webinars
Leveraging PASTA Threat Modeling for Strategic Security Operations Management & Exploit Testing

Geopolitical Risk, Reports, VerSprite Security Resources, Webinars
Geopolitical Risk Webinar: The Top Geo-Cyber Supply Chain Risks & Opportunities

VerSprite Security Resources, Webinars
Back to Basics: Finding Clarity in General Data Protection Regulation (GDPR) Compliance

Geopolitical Risk, VerSprite Security Resources, Webinars
The Geopolitical Dimensions of Automating Security

Slides & Presentations, VerSprite Security Resources, Webinars
Data Management: Best Practices for Security & Privacy

Slides & Presentations, VerSprite Security Resources, Webinars
Statistical Methods for Triaging

Research Advisories, Slides & Presentations, VerSprite Security Resources, Webinars
Abusing Insecure Windows Communication Foundation (WCF) Endpoints

VerSprite Security Resources, Webinars
Role of Zero Trust in Future Enterprise Security

VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit

Subscribe for Our
Updates
Please enter your email address and receive the latest updates