Ultimate Hack! Layers 8 & 9 of the OSI Model
Modern IAM Trends and Themes by Eve Maler, Forrester
CIS13: Identity Trends and Transients
The New Venn of Access Control in the API-Mobile-IOT Era
Open Source Slides - Je-Loon
Vulnex app secusa2013
Real World Defense Strategies for Targeted Endpoint Threats
DEF CON 18 - Getting Social with the Smart Grid
AWS Partner Webcast - Best Practices for AWS security, utilization, and cost optimization using CloudCheckr
Database auditing essentials
Ymens - Cloud Identity Crisis - Dev Talks 2015
Point-Of-Sale Hacking - 2600Thailand#20