Securing your presence at the perimeter
Mobile security blunders and what you can do about them
The Cloud is in the details webinar - Rothke
Rothke rsa 2012 building a security operations center (soc)
E5 rothke - deployment strategies for effective encryption