2022-05-03 | Rob VandenBrink | Finding the Real "Last Patched" Day (Interim Version) |
2019-10-19 | Russell Eubanks | What Assumptions Are You Making? |
2019-07-25 | Rob VandenBrink | When Users Attack! Users (and Admins) Thwarting Security Controls |
2019-07-18 | Rob VandenBrink | The Other Side of Critical Control 1: 802.1x Wired Network Access Controls |
2017-07-24 | Russell Eubanks | Trends Over Time |
2017-06-10 | Russell Eubanks | An Occasional Look in the Rear View Mirror |
2016-11-23 | Tom Webb | Mapping Attack Methodology to Controls |
2015-12-21 | Daniel Wesemann | Critical Security Controls: Getting to know the unknown |
2015-11-04 | Richard Porter | Application Aware and Critical Control 2 |
2015-05-29 | Russell Eubanks | Trust But Verify |
2013-03-13 | Mark Baggett | Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1 |
2011-10-28 | Daniel Wesemann | Critical Control 20: Security Skills Assessment and Training to fill Gaps |
2011-10-27 | Mark Baggett | Critical Control 18: Incident Response Capabilities |
2011-10-26 | Rick Wanner | Critical Control 17:Penetration Tests and Red Team Exercises |
2010-08-22 | Rick Wanner | Failure of controls...Spanair crash caused by a Trojan |
2010-08-05 | Rob VandenBrink | Access Controls for Network Infrastructure |
2010-06-07 | Manuel Humberto Santander Pelaez | Software Restriction Policy to keep malware away |