Logging for Everyone: How and Why Logging is for Everyone at Home and at Business
DECyberSecurity
Logging for Everyone: How and Why Logging is for Everyone at Home and at Business
30:17
Panel Discussion: AI in Cyber Security- The Good, The Bad, and The Legal
DECyberSecurity
Panel Discussion: AI in Cyber Security- The Good, The Bad, and The Legal
50:49
Future Trends
DECyberSecurity
Future Trends
16:46
Securing the State: Protecting your Web Presence
DECyberSecurity
Securing the State: Protecting your Web Presence
22:55
Case Study Delaware: Evolved Social Engineering Scams Targeting the First State
DECyberSecurity
Case Study Delaware: Evolved Social Engineering Scams Targeting the First State
26:17
The Modern Kill Chain: How Attacks have Gone from Months to Minutes
DECyberSecurity
The Modern Kill Chain: How Attacks have Gone from Months to Minutes
30:16
The Anatomy of a Cyber Investigation: For Network Defenders and First Responders
DECyberSecurity
The Anatomy of a Cyber Investigation: For Network Defenders and First Responders
1:02:34
Lessons Learned from a Breach
DECyberSecurity
Lessons Learned from a Breach
53:52
Crash Course in Capture the Flag Workshop
DECyberSecurity
Crash Course in Capture the Flag Workshop
49:15
Stories from the Field - Sean Ebeling
DECyberSecurity
Stories from the Field - Sean Ebeling
54:32
The Art of Deceiving: How Deception Technology Enhances Cybersecurity - Fernando Cruchaga
DECyberSecurity
The Art of Deceiving: How Deception Technology Enhances Cybersecurity - Fernando Cruchaga
42:11
The Threats Cybersecurity Poses to Physical Security - Shreeya Parekh
DECyberSecurity
The Threats Cybersecurity Poses to Physical Security - Shreeya Parekh
47:24
The New Delaware Personal Data Privacy Act & Recent Developments in Regulation of AI-William R Denny
DECyberSecurity
The New Delaware Personal Data Privacy Act & Recent Developments in Regulation of AI-William R Denny
50:02
Purple Teaming 301 – Free Attack Simulation and Alarm/Control Validation - Jason Wright
DECyberSecurity
Purple Teaming 301 – Free Attack Simulation and Alarm/Control Validation - Jason Wright
46:04
Women In Technology Panel - Zakiyyah Ali, Deborah Blyth, and Maria Thompson
DECyberSecurity
Women In Technology Panel - Zakiyyah Ali, Deborah Blyth, and Maria Thompson
32:13
How to Create a Home Lab for Fun and Profit: Security Edition - David Quartarolo
DECyberSecurity
How to Create a Home Lab for Fun and Profit: Security Edition - David Quartarolo
47:49
Driving Cybersecurity Excellence in e-Government: Protecting Delaware’s Critical Systems-Sam Pickles
DECyberSecurity
Driving Cybersecurity Excellence in e-Government: Protecting Delaware’s Critical Systems-Sam Pickles
43:53
How to Use Building Engineering Specs for OT Cyber Supply Chain Security - Timothy P. Mullen
DECyberSecurity
How to Use Building Engineering Specs for OT Cyber Supply Chain Security - Timothy P. Mullen
44:11
Cybersecurity Insurance: What is Involved? - Larry Josefowski
DECyberSecurity
Cybersecurity Insurance: What is Involved? - Larry Josefowski
48:09
Secure Delaware 2023 Closing Keynote - Anatomy of Ransomware, Mark Lance
DECyberSecurity
Secure Delaware 2023 Closing Keynote - Anatomy of Ransomware, Mark Lance
38:00
ChatGPT Cyber Attacks - Dr. James B. Fraley
DECyberSecurity
ChatGPT Cyber Attacks - Dr. James B. Fraley
51:23
"Stop Messing up Vulnerability Management". Presentation by David Quartarolo.
DECyberSecurity
"Stop Messing up Vulnerability Management". Presentation by David Quartarolo.
44:39
"Impacts of Ransomware on Operational Technology". Presentation by Timothy Mullen.
DECyberSecurity
"Impacts of Ransomware on Operational Technology". Presentation by Timothy Mullen.
36:18
"Cryptocurrency Scams Targeting Delaware". Presentation by Jon Bell.
DECyberSecurity
"Cryptocurrency Scams Targeting Delaware". Presentation by Jon Bell.
50:58
"Early Cyber Attacks in the Russia-Ukraine War". Presentation by Shreeya Parekh and Victoria Woehr.
DECyberSecurity
"Early Cyber Attacks in the Russia-Ukraine War". Presentation by Shreeya Parekh and Victoria Woehr.
41:09
Panel: Risk Mitigation and Trends in Cybersecurity". Moderated by Jacob Blacksten.
DECyberSecurity
Panel: Risk Mitigation and Trends in Cybersecurity". Moderated by Jacob Blacksten.
47:52
"Following CISA & NIST Guidelines". Presentation by Jose Padin.
DECyberSecurity
"Following CISA & NIST Guidelines". Presentation by Jose Padin.
46:36
"Mobile Security, Protecting all devices equally!". Presentation by Jacob Blacksten.
DECyberSecurity
"Mobile Security, Protecting all devices equally!". Presentation by Jacob Blacksten.
41:55
"Protecting the House: Evolving From Exposure to Excellence". Presentation by Jack Danahy
DECyberSecurity
"Protecting the House: Evolving From Exposure to Excellence". Presentation by Jack Danahy
39:08
"Threat Modeling: Concepts and Actions". Presentation by Chris Curry.
DECyberSecurity
"Threat Modeling: Concepts and Actions". Presentation by Chris Curry.
56:53
"Privacy and Cyber Risks in the Connected World". Presentation by William R. Denny.
DECyberSecurity
"Privacy and Cyber Risks in the Connected World". Presentation by William R. Denny.
48:28
"DMARC - A Free Control to Protect Brands". Presentation by Jason Wright
DECyberSecurity
"DMARC - A Free Control to Protect Brands". Presentation by Jason Wright
38:47
"Cyber Insurance, When All Else Fails" Zakiyyah Ali, John Koziol, David Reesor, Kevin Violette.
DECyberSecurity
"Cyber Insurance, When All Else Fails" Zakiyyah Ali, John Koziol, David Reesor, Kevin Violette.
47:47
"Implementing Zero Trust". Presentation by Dr. James Fraley
DECyberSecurity
"Implementing Zero Trust". Presentation by Dr. James Fraley
35:24
"Protecting Your Web and Mobile Applications Against the Next Wave". Presentation by H.Lane Williams
DECyberSecurity
"Protecting Your Web and Mobile Applications Against the Next Wave". Presentation by H.Lane Williams
34:20
Delaware Cyber Security Awareness Month
DECyberSecurity
Delaware Cyber Security Awareness Month
0:16
"Privacy in the Pandemic Critical Legal Developments and Practical Guidance" - by William R. Denny
DECyberSecurity
"Privacy in the Pandemic Critical Legal Developments and Practical Guidance" - by William R. Denny
46:24
"Modern APIs for SSO, Authentication and Access Management in the Hybrid Cloud" by Richard Sand
DECyberSecurity
"Modern APIs for SSO, Authentication and Access Management in the Hybrid Cloud" by Richard Sand
47:32
"Blockchain and Federated Learning-Protecting Privacy and Securing Information" by Nii Attoh-Okine
DECyberSecurity
"Blockchain and Federated Learning-Protecting Privacy and Securing Information" by Nii Attoh-Okine
30:33
"How did the Pandemic Change Cybersecurity" presented by Raymond Pompon
DECyberSecurity
"How did the Pandemic Change Cybersecurity" presented by Raymond Pompon
47:15
"Scammers LOVE Covid 19! How can we make them miserable? presented by Joshua Marpet
DECyberSecurity
"Scammers LOVE Covid 19! How can we make them miserable? presented by Joshua Marpet
40:35
"Securing Very Small Businesses" presented by Hidavatullah Ahsan
DECyberSecurity
"Securing Very Small Businesses" presented by Hidavatullah Ahsan
44:39
"Future Proofing Cloud Security Post Pandemic" presented by Nathan Smolenski.
DECyberSecurity
"Future Proofing Cloud Security Post Pandemic" presented by Nathan Smolenski.
38:35
"Employment Scams. What Job Seekers and Job Posters Need to Know." Presented by John Bell.
DECyberSecurity
"Employment Scams. What Job Seekers and Job Posters Need to Know." Presented by John Bell.
35:19
Secure Delaware Opening Remarks and Keynote Presentation
DECyberSecurity
Secure Delaware Opening Remarks and Keynote Presentation
1:17:05
"Don't Get Caught in the Phishing Net".  Presenter Connor Swalm.
DECyberSecurity
"Don't Get Caught in the Phishing Net". Presenter Connor Swalm.
51:01
DigiKnow Cyber Security Depends On You?
DECyberSecurity
DigiKnow Cyber Security Depends On You?
1:32
Delaware DigiGirlz Day 2019
DECyberSecurity
Delaware DigiGirlz Day 2019
8:34
Delaware DigiGirlz Day 2019
DECyberSecurity
Delaware DigiGirlz Day 2019
1:32
David Williams  & Matt Barnett, BtB Security
DECyberSecurity
David Williams & Matt Barnett, BtB Security
42:29
Starnes Walker, University of Delaware Cybersecurity Initiative
DECyberSecurity
Starnes Walker, University of Delaware Cybersecurity Initiative
14:23
Anahi Santiago, Christiana Care Health System
DECyberSecurity
Anahi Santiago, Christiana Care Health System
31:22
James Nettesheim, Mandiant a FireEye Company
DECyberSecurity
James Nettesheim, Mandiant a FireEye Company
34:18
Jenny Menna, U.S. Bancorp
DECyberSecurity
Jenny Menna, U.S. Bancorp
43:29
Chris Lord, Bit 9 + Carbon Black
DECyberSecurity
Chris Lord, Bit 9 + Carbon Black
39:49
US Senator Tom Carper, Delaware, Welcome Announcement, Delaware Cyber Security Workshop, 09/30/15
DECyberSecurity
US Senator Tom Carper, Delaware, Welcome Announcement, Delaware Cyber Security Workshop, 09/30/15
2:52
Delaware Governor Jack Markell Welcome Announcement - Delaware Cyber Security Workshop 2015
DECyberSecurity
Delaware Governor Jack Markell Welcome Announcement - Delaware Cyber Security Workshop 2015
1:36
Delaware US Cyber Challenge 2015 Winners
DECyberSecurity
Delaware US Cyber Challenge 2015 Winners
3:30
Senator Tom Carper, Welcome, US Cyber Challenge 2015 Delaware
DECyberSecurity
Senator Tom Carper, Welcome, US Cyber Challenge 2015 Delaware
2:23
Dr. Mark Brainard; President, DTCC; Delaware US Cyber Challenge 2015
DECyberSecurity
Dr. Mark Brainard; President, DTCC; Delaware US Cyber Challenge 2015
2:21
Karen Evans, National Director, US Cyber Challenge, Delaware - 2015
DECyberSecurity
Karen Evans, National Director, US Cyber Challenge, Delaware - 2015
6:15
Dr. David Bray, CIO, FCC, US Cyber Guard 2015, Delaware
DECyberSecurity
Dr. David Bray, CIO, FCC, US Cyber Guard 2015, Delaware
19:50
US Senator Tom Carper United States Cyber Challenge Delaware Graduation
DECyberSecurity
US Senator Tom Carper United States Cyber Challenge Delaware Graduation
1:06
Delaware Governor Jack Markell at United States Cyber Challenge Delaware Graduation
DECyberSecurity
Delaware Governor Jack Markell at United States Cyber Challenge Delaware Graduation
4:51
Delaware Secretary of Education Mark Murphy at US Cyber Challenge Delaware Graduation
DECyberSecurity
Delaware Secretary of Education Mark Murphy at US Cyber Challenge Delaware Graduation
0:55
Return on Investment
DECyberSecurity
Return on Investment
15:48
Delaware 2014 Cyber Security High School Video Contest
DECyberSecurity
Delaware 2014 Cyber Security High School Video Contest
1:25
2013 Delaware Cyber Security Video Contest Entries
DECyberSecurity
2013 Delaware Cyber Security Video Contest Entries
6:55
2013 Delaware Cyber Security Video Contest WINNER - "Cyber Abduction"
DECyberSecurity
2013 Delaware Cyber Security Video Contest WINNER - "Cyber Abduction"
1:53
Video Contest Rules
DECyberSecurity
Video Contest Rules
2:48
YouTube Winner announcement
DECyberSecurity
YouTube Winner announcement
0:43
DE Cyber Security Video Contest
DECyberSecurity
DE Cyber Security Video Contest
2:13