Displaying 1 - 20 of 82 speakers
Celeste_huang-menders_01

Celeste Huang-Menders

Global Refugee Crisis: It's Our Time for Action | TEDxFarmingdale

Princeton, NJ, USA
James-benham-headshot

James Benham

Texas, USA
864x576x2

Daniel Farber Huang

Theresa Menders & Daniel Farber Huang | TEDxWilmington

Princeton, NJ, USA
Shira-rubinoff2-500x500

Shira Rubinoff

Cyber Minds

New York, NY, USA
Wilson_rachel_042021

Rachel Wilson

Rachel Wilson - Neural Mechanisms of Navigation Behavior ...

New York, NY, USA / 2 reviews
021622_dave_kennedy_aae_headshot

Dave Kennedy

Exploits, Research, Tools, and the Impact to Security | Dave Kennedy

Strongsville, OH, USA / 1 reviews
Gfovjhnd_400x400

FC (Freaky Clown)

Breaking Into Secure Buildings | Malicious Life podcast

Gloucester, UK
E3xv4pen

Rachel Tobac

Redwood City, CA, USA / 4 reviews
1616116635665

Tanmay Bakshi

AskTanmay! — Michael Francis asks Tanmay Bakshi

Toronto, Canada / 1 reviews
4neowwwppmjwzznsdidhxbvxlscm7y

Larry Whiteside Jr.

Diversity & Inclusion Seminar Series with Larry Whiteside, Jr ...

Tampa, FL, USA / 1 reviews
110714-f-jz020-597

Suzanne M. Vautrinot

San Antonio, TX, USA
20150326canon_0015__1_

Paul C Dwyer

Keynote Speech Paul C Dwyer, CEO, Cyber Risk International

Ireland
050322_tyler_cohen_wood_aae_headshot

Tyler Cohen Wood

Catching The Catfishers: Disarm The Online Pretenders, Predators, And Perpetrators Who ...

Washington, DC, USA
V3ilvuun_400x400

Allison Cerra

The Cybersecurity Playbook | Allison Cerra | Greatest Book

Plano, TX, USA
Timthumb

Misha Glenny

Misha Glenny in conversation with Mark Shaw about how South

London, UK
Gregory-evans-photo

Gregory D. Evans

Georgia, USA
Why-user-adoption-in-enterprise-security-is-low-juliet-okafor-esw-222-1024x576

Juliet U. Okafor, JD

Columbus, OH, USA
Edfc23a21701b4d3169f6b85e9193a40

Danielle Citron

College Park, MD, USA
411151983_hr

Garrett Graff

Washington, DC, USA
102921_robert_siciliano_aae_headshot

Robert Siciliano CSP

Massachusetts, USA
Per Page: