Video description
Be a fly on the wall at Suits and Spooks, a genuinely unique technology event that helps unmask the cold realities of cyber conflict and espionage. If you missed the latest gathering in New York City in October 2013, you can still catch many of the eyebrow-raising sessions from the event with this complete video compilation.
Table of contents
-
Suits and Spooks New York 2013
- Welcoming Remarks
- The Top 50 Non-state Hacker Groups in the World
- Out of the Mountains: A Future of Feral Cities, Urban Systems Under Stress, and Increasing Overlaps Between the Real and Virtual
- Emerging Bad Actors in the Virtual and Physical Worlds - Part 1
- Emerging Bad Actors in the Virtual and Physical Worlds - Part 2
- Emerging Bad Actors in the Virtual and Physical Worlds - Part 3
- How to Survive a Surveillance-friendly Environment - Part 1 - Mike Janke
- How to Survive a Surveillance-friendly Environment - Part 2 - Mike Janke
- Should Defensive Strategies be Specific to the Threat Actor or Generalized for all Threat Actors? - Part 1
- Should Defensive Strategies be Specific to the Threat Actor or Generalized for all Threat Actors? - Part 2
- Real-time Depiction of the Global Cyber Threat Landscape
- Icefog: Mercenary Hackers Who Focus on Supply Chain Attacks in Asia - Roel Schouwenberg
- Joseph Kony, the LRA and Elephant Poaching in Africa - Jonathan Hutson
Product information
- Title: Suits and Spooks New York 2013: Complete Video Compilation
- Author(s):
- Release date: December 2013
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 978149194642
You might also like
book
Gamestorming
Great things don't happen in a vacuum. But creating an environment for creative thinking and innovation …
book
Tidy First?
Messy code is a nuisance. "Tidying" code, to make it more readable, requires breaking it up …
audiobook
Software Architecture for Busy Developers
A quick start guide to learning essential software architecture tools, frameworks, design patterns, and best practices …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …