56:18 Is SDLC a Whim, a Vagary of Fashion, or Regulatory Bodies Requirement Round table All Hacking Cons
6:12 Information Security in Italy According to the Authority for the Communications All Hacking Cons
2:15:42 The Role of the Young of Today on the Information Security Market of Russia Round table All Hacking Cons
59:22 Attacks Modeling, Security Metrics Calculation and Visualization in Perspective SIEM Systems All Hacking Cons
52:57 Protecting Organizations from Security Breaches by Persistent Threats, with Examples from RSA All Hacking Cons