Data Protection Courses
Black Hat via YouTube Protecting Data In-Use from Firmware and Physical Attacks
Black Hat via YouTube Oracle Data Redaction is Broken
Black Hat via YouTube Catching Insider Data Theft With Stochastic Forensics
Black Hat via YouTube The Non-Cryptographic Ways of Losing Information
Black Hat via YouTube Can You Trust Your Computer?
Black Hat via YouTube Information Security in Mergers & Acquisitions
Black Hat via YouTube Least Authority File System
BSidesLV via YouTube Allow Myself to Encrypt Myself
BSidesLV via YouTube Towards Standardizing Comparisons of Password Guessability
BSidesLV via YouTube