38:23 Emerging Trends and Ideas About the Business of Security From a Silicon Valley VC Perspective All Hacking Cons
22:53 Development of a Service for Access to and Management of the Integrated Vulnerability All Hacking Cons
16:21 Firmalice Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware All Hacking Cons
49:38 Detecting Network Intrusions With Machine Learning Based Anomaly Detection Techniques All Hacking Cons
1:05:28 Expert Community s Role in Generation of Information Security Threat Databases All Hacking Cons
1:04:12 Calculation, Visualization, and Analysis of Security Metrics in SIEM Systems All Hacking Cons
38:18 How to Get the Common Criteria Certificate in Germany and Live to Tell the Tale All Hacking Cons
57:40 Non Invasive Elimination of Logical Access Control Vulnerabilities in Web Applications All Hacking Cons