ITSEC & Cyberrisks Baltics
ITSEC & Cyberrisks Baltics
  • Видео 450
  • Просмотров 329 962
DSSITSEC SilvanJongerius - How Blockchain and AI challenge the GDPR
Meeting the requirements of the GDPR is challenging, in particular when using Blockchain or AI. Where most people will cringe when mentioning the GDPR’s right to be forgotten and Blockchain in one sentence, this talk will explore how these particular challenges can be resolved, and how they could even be designed in a way that helps compliance.
Просмотров: 159

Видео

Bryan Geraldo - Fidelis
Просмотров 724 года назад
interview
Kaspars Petersons - Veracomp
Просмотров 904 года назад
interview
Marcin Maciejewski - CLICO business Development Manager
Просмотров 4104 года назад
interview
Chester Wisniewski -Principal Research Scientist -Sophos
Просмотров 1354 года назад
interview
Pawel Mirkiewicz Samsung Electonics
Просмотров 1384 года назад
interview
Kārlis Bergmanis NOD Baltic tehnoloģiju konsultants
Просмотров 774 года назад
interview
Jeffrey Rijpkema - Lastline
Просмотров 1114 года назад
interview
Lisa Tallinn - Spectx
Просмотров 914 года назад
interview
Ciara Campbell - Tenable
Просмотров 804 года назад
interview
Arūts Filatovs - TET Cybersecurity Awareness expert
Просмотров 914 года назад
interview
Ota Čermák Global Business Development Manager
Просмотров 1244 года назад
Interview
Geoffrey Petit - Kingston Technology Field application Engineer
Просмотров 1184 года назад
Interview
Chester Wisniewski-Back to the basics: A fresh approach to old problems
Просмотров 924 года назад
When we hear about data breaches in the news, all too often we hear experts say, “If they had only gotten the basics right, they would have avoided this terrible event.” It turns out that the basics are really hard and we are often too dismissive, not just of how important they are to get right, but how they fit into modern network defense. This talk will cover those tricky-to-achieve basics, n...
Ota Čermák - Data breach is our daily bread
Просмотров 794 года назад
Tales from the underground. Real data leaks that happened to various companies exposed to the audience. Thoughts on how we can protect ourselves and our companies and what to do when „stuff“ happens.
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
Просмотров 604 года назад
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
Per Jonsson - ForsePoint
Просмотров 214 года назад
Per Jonsson - ForsePoint
Luka Mulej - How to make your remote control secure
Просмотров 1574 года назад
Luka Mulej - How to make your remote control secure
Jani Haapio - Extending Zero Trust from network to endpoint
Просмотров 2024 года назад
Jani Haapio - Extending Zero Trust from network to endpoint
Padraigh Conway -Avoiding a Data Breach
Просмотров 594 года назад
Padraigh Conway -Avoiding a Data Breach
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
Просмотров 2064 года назад
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
Midday session Panel Disscussion
Просмотров 254 года назад
Midday session Panel Disscussion
Grant Colgan - 4G-5G Good for your health bad for security
Просмотров 3314 года назад
Grant Colgan - 4G-5G Good for your health bad for security
Lars Hilse - 360 degree Cyber
Просмотров 1024 года назад
Lars Hilse - 360 degree Cyber
Sheldon Nailer - SECURE US TO SECURE ME
Просмотров 1014 года назад
Sheldon Nailer - SECURE US TO SECURE ME
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
Просмотров 424 года назад
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
Просмотров 654 года назад
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
Philipp Kalweit - Deep dive into cybersecurity
Просмотров 1,3 тыс.4 года назад
Philipp Kalweit - Deep dive into cybersecurity
DSS ITSEC 2019 grand opening with Rick Feds
Просмотров 2754 года назад
DSS ITSEC 2019 grand opening with Rick Feds
DSS ITSEC 2018 interview with Leif Jensen
Просмотров 505 лет назад
DSS ITSEC 2018 interview with Leif Jensen

Комментарии

  • @flrn84791
    @flrn84791 12 дней назад

    More like "Jean Pereira", ethical lier and fraudster 🙃 He posts non-sense on LinkedIn, deletes all negative comments and blocks people who did not get fooled by his BS, makes claims about anything and everything... 🤣🤣🤣

  • @Hagop-fg5oe
    @Hagop-fg5oe Месяц назад

    Help me bad people cell simulator can't call out or receive 451 berean ln Apt a also cameras and audio in my tv and house using my car stingray to charge it they follow me mailbox not even saje fake police

  • @DemocracyManifest-vc5jn
    @DemocracyManifest-vc5jn 2 месяца назад

    This speaker is a god

  • @DemocracyManifest-vc5jn
    @DemocracyManifest-vc5jn 2 месяца назад

    7yrs old. Mexican drug lords did deploy their own cell network

  • @L5biszz
    @L5biszz 2 месяца назад

    10:02 the link.

  • @QuantumTachyonrider
    @QuantumTachyonrider 7 месяцев назад

    This was made 7 years ago and the changes are 1) you can detect the ISMI catcher on a map with accuracy. 2) you can see the CID and stats on the ISMI catcher easily including mmc full info. Jammers owned by the ISMI catcher user do not work and are illegal as they mess up nearby homes. But you cannot to this day be able to guard against them. And yes they are used by criminals that are also government contractors to hide illegal activities with dirty cops . Innocent people are being spied upon...especially whistleblowers. Even people who stalk women for sexual gratification who also work for government. I have been a victim for years... and personally I think that people and agencies who use these to stalk innocent people and protect druggies or corporations that harm people are soul trash. In my case, they are even trying to steal from me under the guise of government. These folks belong in jail and we need stricker rules to protect innocent people.

  • @george_anak_lihi
    @george_anak_lihi 7 месяцев назад

    0:19 😮😮😮*$#@+™✓

  • @soko45
    @soko45 8 месяцев назад

    The name SECBIZ should have been a red flag for everyone

  • @theripper4688
    @theripper4688 8 месяцев назад

    Bro is a liar🤡

  • @vaginalexplorer69
    @vaginalexplorer69 8 месяцев назад

    bro is a big lier watch the video from live overflow he is a genius in faking a person yes

    • @TheAn0nym0u5
      @TheAn0nym0u5 5 месяцев назад

      which video? could you give more info please?

    • @vaginalexplorer69
      @vaginalexplorer69 5 месяцев назад

      @@TheAn0nym0u5 bro watch the video lmao

    • @vaginalexplorer69
      @vaginalexplorer69 5 месяцев назад

      @@TheAn0nym0u5 even for this question i know u arent even deep into anything of computers lmao

    • @TheAn0nym0u5
      @TheAn0nym0u5 5 месяцев назад

      @@vaginalexplorer69 bro im not competing for the person which has the longest dick as you are trying to do... i just asked a question. if your life is so bored to give answers like that, i am sorry for you! really! enjoy

  • @BeautifulSouls5
    @BeautifulSouls5 10 месяцев назад

    What about for an iPhone?

  • @iducreyes
    @iducreyes Год назад

    A1

  • @birutakviese7429
    @birutakviese7429 Год назад

  • @user-jg6dm7bs7d
    @user-jg6dm7bs7d Год назад

    优秀

  • @markcoca7456
    @markcoca7456 Год назад

    Thanks , man those Morhers look like scared , insecured , weak , chickens on a farm , allover the place ! Jan 5 , 2023

  • @theresarenee
    @theresarenee Год назад

    In these rural areas the land stealing is a nightmare. Forcing elderly in nursing homes or mental health facilities!!! Especially in central Illinois. Yes these ip providers plus cell providers are being criminals by allowing others to abuse this technology and not give the paying population a clue.

  • @rajujadhav264
    @rajujadhav264 Год назад

    Send here LogRhythm video

  • @kyoyeou5899
    @kyoyeou5899 Год назад

    Ok Mr "Tom" you definitely got my attention

  • @zhanucong4614
    @zhanucong4614 Год назад

    Nice

  • @KasparsBarissGames
    @KasparsBarissGames Год назад

    Andris Bariss is my dad.

  • @bowdash3579
    @bowdash3579 Год назад

    Americans are so gullible. The government spying on you is now the least of your troubles. Criminal networks, including criminalized private investigators and intelligence firms, now freely illegally intercept phone calls and invade their targets' privacy. It's lawless out there, and organized crime is having a field day. THAT is the biggest threat to national security.

  • @momsen78
    @momsen78 2 года назад

    for advertisment by sms its nice

  • @armenagaronyan2770
    @armenagaronyan2770 2 года назад

    This moderator is not a good moderator. At all

  • @sheilasaintil7127
    @sheilasaintil7127 2 года назад

    what if you put your phone on airplane mode

  • @pepper8048
    @pepper8048 2 года назад

    Sorry, didn’t make it 5 minutes into this one. The old definition of droning.

  • @Dani-El.
    @Dani-El. 2 года назад

    Excuse my ignorance on the subject, but can these (or similar devices) be used for intercepting/jamming a home wifi network or an individual computer/laptop? Or do they only work for mobile/cell-phone networks? ie. could something like this be used to trick my laptop into thinking it's connected directly to my home wifi router, but in reality it is actually connecting to a nearby interceptor/man-in-the-middle, (in the same way that wifi extenders do) and then onto my router after that?

    • @QuantumTachyonrider
      @QuantumTachyonrider 7 месяцев назад

      If you are close to your router it is a little hard, but if the signal strength of your neighbor or a roomate is higher than your router...than yes.

  • @keridesireeGerBaldi
    @keridesireeGerBaldi 2 года назад

    Is he shaking?

  • @dexterdextrow7248
    @dexterdextrow7248 2 года назад

    Certainly wouldn't call the Swedish government's security "highly capable"...

  • @fifaham
    @fifaham 2 года назад

    Informative presentation but very slow and need to be more organized. Thank you

  • @thetruedestroer8816
    @thetruedestroer8816 2 года назад

    Hz mne cet ne zaslo

  • @viesturs6321
    @viesturs6321 2 года назад

    Labs video!

  • @BadUzbek
    @BadUzbek 2 года назад

    А можно погромче

  • @willafriyie850
    @willafriyie850 2 года назад

    Mr. Tarun I need to know more about DLP how can i reach you.?

  • @DEDEPLDEDE
    @DEDEPLDEDE 2 года назад

    HD jakosc Panie Andrzeju by sie sprzydala

  • @tacosplease4906
    @tacosplease4906 2 года назад

    Can 5g network secure against this ?

  • @bethbloomer5951
    @bethbloomer5951 2 года назад

    Adorable attempt at hijacking what honeypots really are, or, rather, WHO.

  • @lindajones49
    @lindajones49 2 года назад

    So to crash 💥 software feed it corrupt file. No browser is safe. I am a data storage person best to back up ⬆️ often and keep security patches up to date.

    • @flrn84791
      @flrn84791 12 дней назад

      Yeah this is what happens when people listen to such BS. This guy is just a fraudster...

  • @davidnoiwillnotjohnston9164
    @davidnoiwillnotjohnston9164 2 года назад

    This is a good thing u don't know people I think it's fine and dandy It's a good thing

  • @Ashtree81
    @Ashtree81 2 года назад

    9:44 Cute girl and not subtle guy

  • @abdelhamidelmahallawy3620
    @abdelhamidelmahallawy3620 3 года назад

    Hello. If a mobile device has been subject to an imsi catcher ? Does this device send things to see what the mobile device is writing or watching for example? I read it gets the imei as well. So, if the target mobile moves outside this area that the hacker is using this catcher , will it be safe now from the hacking? Thank u and waiting

    • @kuntri4389
      @kuntri4389 2 года назад

      No. It can only operate within the radius of the imsi catcher after it is out of range it won't work

  • @adityaraut9364
    @adityaraut9364 3 года назад

    Not gonna lie, They had us on the first half..

  • @malayalam1972
    @malayalam1972 3 года назад

    Nice presentation

  • @motivationmusicmm264
    @motivationmusicmm264 3 года назад

    anyone know how to hack conflict of nations ww3 game xd???

  • @imrichpalascak3102
    @imrichpalascak3102 3 года назад

    Janne, you're inspirational guy ! Glad to hear you. Imrich

  • @aaddirajsharrma4190
    @aaddirajsharrma4190 3 года назад

    Genius

  • @davidrobinson7112
    @davidrobinson7112 3 года назад

    All of this spying is not implied threat it may be time for the establishment to be arrested, then investigated and followed for many,many penalties...legal....penalties. Any thing else goes without mentioned or advertised. I say this as most of the activity is done from criminal intent. And government support. So I say why then do we need government???

  • @davidrobinson7112
    @davidrobinson7112 3 года назад

    If all of this activity is going on. What then do the people who are acting as presented have else to do. Like the above sentence...LOLOLOLOL

  • @DontStopMoveOn
    @DontStopMoveOn 3 года назад

    LATVIANS! WHERE UR POTATOS

  • @byrondowling195
    @byrondowling195 3 года назад

    I use to work for a US Telecom with obviously access to where exactly our towers are and what ID's they produce. This was the only way I was able to detect that my phone was grabbing on to one.

  • @ghostedyoutuber263
    @ghostedyoutuber263 3 года назад

    My gawd, get this man some sunlight. He is whiter than micheal jackson.