Every year at AuditScripts our team gives presentations at various information security events and conferences. Often times people at these events ask for copies of our presentations in order to use them as references or as reminders of the material presented. We decided the right thing to do would be to share many of these presentations here on our website as a tool for anyone interested in the content.
If you find this information intriguing or useful and want more, consider taking a class from us in person. Check out our upcoming events links to see where we will be in the near future and maybe we can get to know you in person as well.
Using an Open Source Threat Model for Prioritized Defense Last Updated December 2015 Click Here to View Presentation |
||
The CIS Critical Security Controls the International Standard for Defense Last Updated October 2015 Click Here to View Presentation |
||
Automating Post Exploitation with PowerShell Last Updated December 2015 Click Here to View Presentation |
||
Enterprise PowerShell for Remote Security Assessments Last Updated November 2014 Click Here to View Presentation |
||
Practical Steps for Assessing Tablet and Mobile Device Security Last Updated September 2013 Click Here to View Presentation |
||
An Introduction to PowerShell for Security Assessments Last Updated November 2014 Click Here to View Presentation |
||
Utilizing the Critical Security Controls to Secure Healthcare Technology Last Updated August 2013 Click Here to View Presentation |
||
Practical, Efficient Unix Auditing Last Updated September 2012 Click Here to View Presentation |
||
Information Assurance Metrics Last Updated September 2012 Click Here to View Presentation |
||
Governance Fail, Security Fail Last Updated March 2012 Click Here to View Presentation |
||
The Intersection of Cool Mobility and Corporate Protection Last Updated October 2011 Click Here to View Presentation |
||
Recent Changes to the 20 Critical Controls Last Updated October 2011 Click Here to View Presentation |
||
A Governance Risk Compliance (GRC) Primer Last Updated June 2011 Click Here to View Presentation |
||
More Practical Insights on the 20 Critical Controls Last Updated October 2010 Click Here to View Presentation |
||
Cyberwar or Business as Usual Last Updated August 2010 Click Here to View Presentation |
||
Prioritizing an Audit Program Using the 20 Critical Controls Last Updated June 2010 Click Here to View Presentation |
||
Overview of the 20 Critical Controls Last Updated May 2010 Click Here to View Presentation |
||
Benefits of Web Application Firewalls Last Updated April 2007 Click Here to View Presentation |