How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Investigate Threat Alerts in Spiceworks!
Security Attack Analysis for Finding and Stopping Network Attacks
CRTI-06-187TD Portable biological agent detection system J-F Gravel & coll. Public Security S&T Symposium 2009.
The Looming Privacy Rights Debacle How EU Data Protection Law Will Shape Future Incident Response Team Activities Around The World Thomas Daemen FIRST.
Don't Be The Next Atlanta Public Schools - Caveon Webinar
Caveon Webinar - "Preventing & Detecting Cheating On High Stakes Tests"
Download Securing the Healthcare Environment Presentation.ppt
Being an everyday hero
© 2006 Federal Computer Week with AIA, AFCEA, AGC, AOC, CSA, ITAA, INSA, NDIA and PSC Survey on the Effects of the Security Clearance Moratorium on Industry.
American Society for Industrial Security North Texas Chapter CPP Study Group September 7, 2015.
Kaiser - The Atomic Secret in Red Hands (Nd)