How we breach small and medium enterprises (SMEs)
Pki 201 Key Management
Current & Emerging Cyber Security Threats
Pki 202 Architechture Models and CRLs
The Mobile Internet of Things and Cyber Security
2013 04-04 --ncc_group_-_voice_biometrics_conference_-_mobile_security
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 12-04 --ncc_group_-_mobile_threat_war_room
2013 05-21 --ncc_group_-_mobile security_-_the_impending_apocalypse…_or_maybe_not
Practical SME Security on a Shoestring
Real World Application Threat Modelling By Example
USB: Undermining Security Barriers
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
Docking stations andy_davis_ncc_group_slides
Cryptography101
NCC Group 44Con Workshop: How to assess and secure ios apps
Exploiting appliances presentation v1.1-vids-removed
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints