ITSEC & Cyberrisks Baltics
ITSEC & Cyberrisks Baltics
  • 450
  • 333 045
DSSITSEC SilvanJongerius - How Blockchain and AI challenge the GDPR
Meeting the requirements of the GDPR is challenging, in particular when using Blockchain or AI. Where most people will cringe when mentioning the GDPR’s right to be forgotten and Blockchain in one sentence, this talk will explore how these particular challenges can be resolved, and how they could even be designed in a way that helps compliance.
zhlédnutí: 160

Video

Bryan Geraldo - Fidelis
zhlédnutí 74Před 4 lety
interview
Kaspars Petersons - Veracomp
zhlédnutí 91Před 4 lety
interview
Pawel Mirkiewicz Samsung Electonics
zhlédnutí 140Před 4 lety
interview
Jeffrey Rijpkema - Lastline
zhlédnutí 111Před 4 lety
interview
Lisa Tallinn - Spectx
zhlédnutí 91Před 4 lety
interview
Ciara Campbell - Tenable
zhlédnutí 82Před 4 lety
interview
Ota Čermák Global Business Development Manager
zhlédnutí 124Před 4 lety
Interview
Chester Wisniewski-Back to the basics: A fresh approach to old problems
zhlédnutí 93Před 4 lety
When we hear about data breaches in the news, all too often we hear experts say, “If they had only gotten the basics right, they would have avoided this terrible event.” It turns out that the basics are really hard and we are often too dismissive, not just of how important they are to get right, but how they fit into modern network defense. This talk will cover those tricky-to-achieve basics, n...
Ota Čermák - Data breach is our daily bread
zhlédnutí 79Před 4 lety
Tales from the underground. Real data leaks that happened to various companies exposed to the audience. Thoughts on how we can protect ourselves and our companies and what to do when „stuff“ happens.
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
zhlédnutí 62Před 4 lety
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
Per Jonsson - ForsePoint
zhlédnutí 21Před 4 lety
Per Jonsson - ForsePoint
Luka Mulej - How to make your remote control secure
zhlédnutí 159Před 4 lety
Luka Mulej - How to make your remote control secure
Jani Haapio - Extending Zero Trust from network to endpoint
zhlédnutí 202Před 4 lety
Jani Haapio - Extending Zero Trust from network to endpoint
Padraigh Conway -Avoiding a Data Breach
zhlédnutí 61Před 4 lety
Padraigh Conway -Avoiding a Data Breach
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
zhlédnutí 226Před 4 lety
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
Midday session Panel Disscussion
zhlédnutí 25Před 4 lety
Midday session Panel Disscussion
Grant Colgan - 4G-5G Good for your health bad for security
zhlédnutí 335Před 4 lety
Grant Colgan - 4G-5G Good for your health bad for security
Lars Hilse - 360 degree Cyber
zhlédnutí 106Před 4 lety
Lars Hilse - 360 degree Cyber
Sheldon Nailer - SECURE US TO SECURE ME
zhlédnutí 101Před 4 lety
Sheldon Nailer - SECURE US TO SECURE ME
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
zhlédnutí 42Před 4 lety
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
zhlédnutí 66Před 4 lety
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
Philipp Kalweit - Deep dive into cybersecurity
zhlédnutí 1,3KPřed 4 lety
Philipp Kalweit - Deep dive into cybersecurity
DSS ITSEC 2019 grand opening with Rick Feds
zhlédnutí 277Před 4 lety
DSS ITSEC 2019 grand opening with Rick Feds
DSS ITSEC 2018 interview with Leif Jensen
zhlédnutí 50Před 5 lety
DSS ITSEC 2018 interview with Leif Jensen

Komentáře

  • @flrn84791
    @flrn84791 Před 2 měsíci

    More like "Jean Pereira", ethical lier and fraudster 🙃 He posts non-sense on LinkedIn, deletes all negative comments and blocks people who did not get fooled by his BS, makes claims about anything and everything... 🤣🤣🤣

  • @Hagop-fg5oe
    @Hagop-fg5oe Před 3 měsíci

    Help me bad people cell simulator can't call out or receive 451 berean ln Apt a also cameras and audio in my tv and house using my car stingray to charge it they follow me mailbox not even saje fake police

  • @DemocracyManifest-vc5jn
    @DemocracyManifest-vc5jn Před 3 měsíci

    This speaker is a god

  • @DemocracyManifest-vc5jn
    @DemocracyManifest-vc5jn Před 3 měsíci

    7yrs old. Mexican drug lords did deploy their own cell network

  • @L5biszz
    @L5biszz Před 4 měsíci

    10:02 the link.

  • @QuantumTachyonrider
    @QuantumTachyonrider Před 9 měsíci

    This was made 7 years ago and the changes are 1) you can detect the ISMI catcher on a map with accuracy. 2) you can see the CID and stats on the ISMI catcher easily including mmc full info. Jammers owned by the ISMI catcher user do not work and are illegal as they mess up nearby homes. But you cannot to this day be able to guard against them. And yes they are used by criminals that are also government contractors to hide illegal activities with dirty cops . Innocent people are being spied upon...especially whistleblowers. Even people who stalk women for sexual gratification who also work for government. I have been a victim for years... and personally I think that people and agencies who use these to stalk innocent people and protect druggies or corporations that harm people are soul trash. In my case, they are even trying to steal from me under the guise of government. These folks belong in jail and we need stricker rules to protect innocent people.

  • @soko45
    @soko45 Před 10 měsíci

    The name SECBIZ should have been a red flag for everyone

  • @Itsscabrust
    @Itsscabrust Před 10 měsíci

    Bro is a liar🤡

  • @vaginalexplorer69
    @vaginalexplorer69 Před 10 měsíci

    bro is a big lier watch the video from live overflow he is a genius in faking a person yes

    • @TheAn0nym0u5
      @TheAn0nym0u5 Před 7 měsíci

      which video? could you give more info please?

  • @BeautifulSouls5
    @BeautifulSouls5 Před rokem

    What about for an iPhone?

  • @iducreyes
    @iducreyes Před rokem

    A1

  • @birutakviese7429
    @birutakviese7429 Před rokem

  • @user-jg6dm7bs7d
    @user-jg6dm7bs7d Před rokem

    优秀

  • @markcoca7456
    @markcoca7456 Před rokem

    Thanks , man those Morhers look like scared , insecured , weak , chickens on a farm , allover the place ! Jan 5 , 2023

  • @theresarenee
    @theresarenee Před rokem

    In these rural areas the land stealing is a nightmare. Forcing elderly in nursing homes or mental health facilities!!! Especially in central Illinois. Yes these ip providers plus cell providers are being criminals by allowing others to abuse this technology and not give the paying population a clue.

  • @rajujadhav264
    @rajujadhav264 Před rokem

    Send here LogRhythm video

  • @kyoyeou5899
    @kyoyeou5899 Před rokem

    Ok Mr "Tom" you definitely got my attention

  • @zhanucong4614
    @zhanucong4614 Před rokem

    Nice

  • @KasparsBarissGames
    @KasparsBarissGames Před rokem

    Andris Bariss is my dad.

  • @bowdash3579
    @bowdash3579 Před 2 lety

    Americans are so gullible. The government spying on you is now the least of your troubles. Criminal networks, including criminalized private investigators and intelligence firms, now freely illegally intercept phone calls and invade their targets' privacy. It's lawless out there, and organized crime is having a field day. THAT is the biggest threat to national security.

  • @momsen78
    @momsen78 Před 2 lety

    for advertisment by sms its nice

  • @armenagaronyan2770
    @armenagaronyan2770 Před 2 lety

    This moderator is not a good moderator. At all

  • @sheilasaintil7127
    @sheilasaintil7127 Před 2 lety

    what if you put your phone on airplane mode

  • @pepper8048
    @pepper8048 Před 2 lety

    Sorry, didn’t make it 5 minutes into this one. The old definition of droning.

  • @Dani-El.
    @Dani-El. Před 2 lety

    Excuse my ignorance on the subject, but can these (or similar devices) be used for intercepting/jamming a home wifi network or an individual computer/laptop? Or do they only work for mobile/cell-phone networks? ie. could something like this be used to trick my laptop into thinking it's connected directly to my home wifi router, but in reality it is actually connecting to a nearby interceptor/man-in-the-middle, (in the same way that wifi extenders do) and then onto my router after that?

    • @QuantumTachyonrider
      @QuantumTachyonrider Před 9 měsíci

      If you are close to your router it is a little hard, but if the signal strength of your neighbor or a roomate is higher than your router...than yes.

  • @keridesireeGerBaldi
    @keridesireeGerBaldi Před 2 lety

    Is he shaking?

  • @dexterdextrow7248
    @dexterdextrow7248 Před 2 lety

    Certainly wouldn't call the Swedish government's security "highly capable"...

  • @fifaham
    @fifaham Před 2 lety

    Informative presentation but very slow and need to be more organized. Thank you

  • @thetruedestroer8816
    @thetruedestroer8816 Před 2 lety

    Hz mne cet ne zaslo

  • @viesturs6321
    @viesturs6321 Před 2 lety

    Labs video!

  • @BadUzbek
    @BadUzbek Před 2 lety

    А можно погромче

  • @willafriyie850
    @willafriyie850 Před 2 lety

    Mr. Tarun I need to know more about DLP how can i reach you.?

  • @DEDEPLDEDE
    @DEDEPLDEDE Před 2 lety

    HD jakosc Panie Andrzeju by sie sprzydala

  • @tacosplease4906
    @tacosplease4906 Před 2 lety

    Can 5g network secure against this ?

  • @bethbloomer5951
    @bethbloomer5951 Před 2 lety

    Adorable attempt at hijacking what honeypots really are, or, rather, WHO.

  • @lindajones49
    @lindajones49 Před 3 lety

    So to crash 💥 software feed it corrupt file. No browser is safe. I am a data storage person best to back up ⬆️ often and keep security patches up to date.

    • @flrn84791
      @flrn84791 Před 2 měsíci

      Yeah this is what happens when people listen to such BS. This guy is just a fraudster...

  • @davidnoiwillnotjohnston9164

    This is a good thing u don't know people I think it's fine and dandy It's a good thing

  • @Ashtree81
    @Ashtree81 Před 3 lety

    9:44 Cute girl and not subtle guy

  • @abdelhamidelmahallawy3620

    Hello. If a mobile device has been subject to an imsi catcher ? Does this device send things to see what the mobile device is writing or watching for example? I read it gets the imei as well. So, if the target mobile moves outside this area that the hacker is using this catcher , will it be safe now from the hacking? Thank u and waiting

    • @kuntri4389
      @kuntri4389 Před 2 lety

      No. It can only operate within the radius of the imsi catcher after it is out of range it won't work

  • @adityaraut9364
    @adityaraut9364 Před 3 lety

    Not gonna lie, They had us on the first half..

  • @malayalam1972
    @malayalam1972 Před 3 lety

    Nice presentation

  • @motivationmusicmm264
    @motivationmusicmm264 Před 3 lety

    anyone know how to hack conflict of nations ww3 game xd???

  • @imrichpalascak3102
    @imrichpalascak3102 Před 3 lety

    Janne, you're inspirational guy ! Glad to hear you. Imrich

  • @aaddirajsharrma4190
    @aaddirajsharrma4190 Před 3 lety

    Genius

  • @davidrobinson7112
    @davidrobinson7112 Před 3 lety

    All of this spying is not implied threat it may be time for the establishment to be arrested, then investigated and followed for many,many penalties...legal....penalties. Any thing else goes without mentioned or advertised. I say this as most of the activity is done from criminal intent. And government support. So I say why then do we need government???

  • @davidrobinson7112
    @davidrobinson7112 Před 3 lety

    If all of this activity is going on. What then do the people who are acting as presented have else to do. Like the above sentence...LOLOLOLOL

  • @DontStopMoveOn
    @DontStopMoveOn Před 3 lety

    LATVIANS! WHERE UR POTATOS

  • @byrondowling195
    @byrondowling195 Před 3 lety

    I use to work for a US Telecom with obviously access to where exactly our towers are and what ID's they produce. This was the only way I was able to detect that my phone was grabbing on to one.

  • @ghostedyoutuber263
    @ghostedyoutuber263 Před 3 lety

    My gawd, get this man some sunlight. He is whiter than micheal jackson.