2010 PRESENTATIONS
The following presentations are available from the GFIRST 2010 Conference.
- A Look Inside the PDF Attack Vector
- Cyber Exercise – Achieving Value through Innovative Design Best-Practices
- Emerging Trends in 2010
- Federal CIO Council ISIMC Guidelines for the Secure Use of Cloud Computing
- Government-Industry Cyber Information Sharing
- Incident Management: Anatomy of a Security Operations Center
- Information Systems Security Line of Business (ISSLOB) Overview
- Law Enforcement Security Technology Risks, Opportunities and Challenges
- Libraries, Embedded Web Servers, and the Kitchen Sink: CRDb
- Loose Lips Sink Networks – Is Social Networking Making Your Network Insecure?
- Minimizing Losses from Zero Days – A New Layer of Defense
- Monitoring Strategies for Detection of Insider Attacks
- National Cyber Response Strategy: Bridging the dot-gov Domain
- Software Assurance: Mitigating Risks to Improve Incident Management
- Towards a Consolidated Cyber Incident Handling Ontology and Process
- Understanding the Insider Threat