DECODE PH
Past, Present, and Future of Cybercrime Infrastructure by Vladimir Kropotov
25:48
DECODE PH
Deserialization Vulnerabilities: From Theory to Practice by Dusan Stevanovic
29:14
DECODE PH
Cyber Threat Intelligence Toward Cybercrime Investigation by Paul Pajares
30:12
DECODE PH
The Risks of Open Banking by Feike Hacquebord
29:37
DECODE PH
From Use-After-Free To Remote Code Execution by Andy Niu
31:16
DECODE PH
PNP ACG: Serving and Protecting the Netizen by PCol Zuniga
24:49
DECODE PH
Getting Started in Hardware Reversing with ZDI by Vincent Lee
26:59
DECODE PH
Shedding Light on Security Considerations in Serverless Cloud Architectures by Alfredo Oliveira
33:17
DECODE PH
The Role of Machine Learning in Cybersecurity by Jon Oliver
19:09
DECODE PH
How Cybercriminals Misuse, Abuse AI and ML by Vincenzo Ciancaglini
29:12
DECODE PH
Scalable Malware Clustering by Muqueet Ali
28:29
DECODE PH
A Survey of Similarity for Security by Josiah Hagen
34:05
DECODE PH
Fileless Control: Removing the Backdoor in Backdoor Shell by Gilbert Sison and Abraham Camba
28:46
DECODE PH
Threats to Critical ICS/SCADA Endpoints by Matsukawa Bakuei
29:53
DECODE PH
The State of Ransomware in 2020 by Marvin Cruz
27:51
DECODE PH
Web of Threats: How Machine Learning weave over the Web Threat Landscape-Karla Agregado &Joy Avelino
32:37
DECODE PH
Honeypots Honeyports & Trollports: An Ecosystem-Wide Sol'n to Firewall Spotlight Problem by JV Roig
27:15
DECODE PH
Hidden Risks of Industrial Automation Programming &Repercussions for SmartFactories - Federico Maggi
28:37
DECODE PH
On the Radar: Exploring the Current Threat Hunting Process by Monte De Jesus
26:25
DECODE PH
Building and Running a Realistic Factory Honeypot by Lord Remorin
29:09
DECODE PH
Kubernetes Security 101: Best Practices for Securing Your Cluster by Magno Logan Oliveira
38:29
DECODE PH
A Look at USBee Malware by Shin Li and Ta Lun Yen
26:12
DECODE PH
Cyberattack Trends in the Cloud by Joey Costoya
22:12
DECODE PH
Asking the Right Business Question - Most Important Phase of the Data Science Process by Isaac Reyes
28:39
DECODE PH
Insider Threat - The Enemy from Within by Joseph Pacamarra
37:46
DECODE PH
Pitfalls of OSS in IoT by Ricky Lawshae
26:39
DECODE PH
Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services by Jaromir Horejsi
26:14
DECODE PH
Edge Computing by Philippe Lin and Roel Reyes
29:34
DECODE PH
Keynote by Melissa Hathaway -Attack Surfaces Widen as the World Increasingly Relies on Digital Infra
32:02
DECODE PH
Keynote by Martin Roesler - The Game Changer – How the Pandemic is Changing Your World
36:39
DECODE PH
Track Session by Joseph Pacamarra - Insider Threat The Enemy from Within
37:46
DECODE PH
Keynote by Philip Casanova - Principles to Live by for Cybersecurity Leaders
45:35
DECODE PH
Keynote by Myla Pilao - Innovation or Disruption Examining Scenarios at the Intersection of Tech Dev
22:59
DECODE PH
Keynote by Robert McArdle - Cybercrime in 2020 and Beyond: Not Everything Changes in a Pandemic
29:43
DECODE PH
DECODE 2020 Event Opener
1:09