Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Your Money or Your File! Highway Robbery with Blackhole and Ransomware
2 factor authentication beyond password : enforce advanced security with authentication model
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Trend Micro Virtualization Security Jerome Law EMEA Solutions Architect.
Security for Web 2.0 and Externally Hosted Technologies Simon Szykman Chief Information Officer