Day 2 - THREAT CON 2021 | Virtual Edition
* This session focuses on National Security Landscape of Nepal and is in local language.
Starts at- 5:35
"Cyber Crimes and Legal Issues happening in Nepal" by Prabin Subedi - 13:10
"The role of private sector in cybersecurity" by Narayan Koirala - 1:18:25
"Automating my day as a SOC analyst" by Suraj DC - 2:29:17
"Security in Telecommunication Industry in Nepal" by Yasmine Bhattarai - 3:22:17
"Present context of Information Technology in Nepal" by Indra Prashad Mainali - 4:14:57
Panel Discussion on National Cybersecurity Landscape Nepal / Q&A - 4:36:10
Slack: https://threatcon.io/slack
Website : https://threatcon.io
Twitter : https://twitter.com/threat_con
Facebook : https://www.facebook.com/threatcon
Видео Day 2 - THREAT CON 2021 | Virtual Edition канала THREAT CON
Starts at- 5:35
"Cyber Crimes and Legal Issues happening in Nepal" by Prabin Subedi - 13:10
"The role of private sector in cybersecurity" by Narayan Koirala - 1:18:25
"Automating my day as a SOC analyst" by Suraj DC - 2:29:17
"Security in Telecommunication Industry in Nepal" by Yasmine Bhattarai - 3:22:17
"Present context of Information Technology in Nepal" by Indra Prashad Mainali - 4:14:57
Panel Discussion on National Cybersecurity Landscape Nepal / Q&A - 4:36:10
Slack: https://threatcon.io/slack
Website : https://threatcon.io
Twitter : https://twitter.com/threat_con
Facebook : https://www.facebook.com/threatcon
Видео Day 2 - THREAT CON 2021 | Virtual Edition канала THREAT CON
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![THREAT CON 2019 - Hacking Human Lives via Body Area Network by Vignesh C](https://i.ytimg.com/vi/9OU8LiNyTAs/default.jpg)
![THREAT CON 2022- Attacking Access Control Models in Modern Web Applications By Imran Parray](https://i.ytimg.com/vi/ROySlONiZzM/default.jpg)
![THREAT CON 2019 - Securing the SDLC in the real world by Jim Manico](https://i.ytimg.com/vi/Y4y9SjLXwrg/default.jpg)
![THREAT CON 2019 - Depth of effective macro campaign by Aniruddha Dolas and Prashant Tilekar](https://i.ytimg.com/vi/zxBpqzAYYyE/default.jpg)
![Threat CON 2018 - Exploiting Cloud Synchronisation to Mass Hack IoTs](https://i.ytimg.com/vi/oc40vThlXNM/default.jpg)
![THREAT CON 2022- Automation for Manual Bug Bounty Hunters By Eugene Lim (spaceraccoonsec)](https://i.ytimg.com/vi/DlTWet7JcKk/default.jpg)
![THREAT CON 2019 - Nepal’s level of preparedness to deal with cyberwarfare attacks by Yogesh Ojha](https://i.ytimg.com/vi/6cKWEfqij5Y/default.jpg)
![THREAT CON 2022- XSS Curioxssity by Ahmad Ashraff](https://i.ytimg.com/vi/XMew1t8VIcY/default.jpg)
![Threat CON 2018 - Building and Developing Communities (keynote) by Matt Suiche](https://i.ytimg.com/vi/kdtFl3XQv2Y/default.jpg)
![THREAT CON 2022 - Gajabaar, An InfoSecurity Mentorship – Design To Deployment by Prasant Adhikari](https://i.ytimg.com/vi/LF10yA3GPJ0/default.jpg)
![Threat CON 2018 - License managers: The Phantom Menace](https://i.ytimg.com/vi/F7N3ZGvpRFI/default.jpg)
![THREAT CON 2019 - Bypassing iOS Security by Georgia Weidman](https://i.ytimg.com/vi/1pxZj-Zyzbg/default.jpg)
![THREAT CON 2019 - XSS is dead?(Keynote) by Mario Heiderich](https://i.ytimg.com/vi/qEzBnzhluHY/default.jpg)
![Threat CON 2018 - How To Effectively Manage Your Org's Cloud Security Posture](https://i.ytimg.com/vi/w0d1qXWUXvA/default.jpg)
![THREAT CON 2022 - Attacking Java For Fun and Profit By Vladimir Dashchenko](https://i.ytimg.com/vi/svB4M94L3B4/default.jpg)
![Threat CON 2018 - The OWASP Top Ten Proactive Controls 2018 by Jim Manico](https://i.ytimg.com/vi/GzCxp-8RK5s/default.jpg)
![Day 1 - THREAT CON 2021 | Virtual Edition](https://i.ytimg.com/vi/2tOM_ubTOBg/default.jpg)
![THREAT CON 2022 - Frida Unleashed By Bharath Kumar & Akshay Jain (Bounty Track)](https://i.ytimg.com/vi/WzJMPy_fho0/default.jpg)
![THREAT CON 2022 - Operation Earth Berberoka by Jaromir Horejsi](https://i.ytimg.com/vi/blwOZAsDrno/default.jpg)