Search for tag: "turing test"

Rob Krug - Defending Organizations in a Fast-Moving Cyber Arms Race

This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than…

From  Kathryn Gentilello 4 Days ago 8 views 0  

Karun Rajasekharan and Emil Man - Developing Secure Products

Karun Rajasekharan: Honeywell Building Technologies develops and releases hundreds of products across the globe with over 100 Scrum teams. Product security has been identified as a key product…

From  Kathryn Gentilello A week ago 17 views 0  

Sam King - Stopping Fraudsters by Changing Products

Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but…

From  Kathryn Gentilello 2 Weeks ago 18 views 0  

Nir Valtman - Protect Your Unicorn From Hunters

Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a…

From  Kathryn Gentilello 3 Weeks ago 69 views 0  

Maliheh Shirvanian - Device Enhanced Authentication: Passwords and Second Factors

Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification…

From  Kathryn Gentilello A month ago 32 views 0  

Down Here There Are No Shooting Stars - Basim Magdy

A screening and conversation with Basim Magdy, an artist who will present and discuss some of his short films exploring spaces and places—both real and imagined—from different parts of…

From  Kathryn Gentilello 9 Months ago 5 views 0  

Bolivian Indigenous Media and the Protection of the Forest - Iván Sanjinés

Screening of The Cry of the Forest (2008), Bolivia’s first indigenous feature film is based on true events that led to the indigenous demonstrations of 1990 and 1996, two events related to the…

From  Kathryn Gentilello 9 Months ago 7 views 0  

Joshua C. Sorenson - Solving the Biggest Problems

In his lecture, titled "Solving the Biggest Problems", Sorenson will describe kinetic threats and how they are shifting the nature of information security -- both assurance and deterrence…

From  Kathryn Gentilello 10 Months ago 97 views 0  

Ted Claypoole - Clash of Cultures: Privacy and the Internet

U.S./EU fights over new customer privacy regulations (General Data Protection Regulation, or “GDPR”) will headline a multi-front culture war between openness and control, individual…

From  Kathryn Gentilello 10 Months ago 63 views 0  

Kyle Koza - Enterprise Security at Georgia Tech

This discussion will explore the operational security employed for students, faculty, staff and researchers at Georgia Tech as well as strategies and challenges faced by operational security teams…

From  Kathryn Gentilello 11 Months ago 39 views 0