12-13 December, 2013 | SF, CA

AMPHION FORUM 2013: SAN FRANCISCO

Download and view presentations from our previous Amphion Forum in San Francisco, 2013

Security and sharing in the internet of thingsView the Presentation

Making Leaders Successful every dayView the Presentation

Security and the internet of things: evolution, not revolutionView the Presentation

The business of IOT & mobility: fifteen unintended consequencesView the Presentation

Stirring the Pot: The Alphabet Soup of Enterprise MobilityView the Presentation

Before You Deploy, Protect Your Mobile and connected apps from hacking and malware attacksView the Presentation

Weakness of mobile strategies and options for mitigating risksView the Presentation

Graphs and analysis: bigger, faster, strongerView the Presentation

Securing the internet of thingsView the Presentation

Internet of things security from the grounds upView the Presentation

Security Testing Arsenal for mobile platformsView the Presentation

Android application reverse engineering & defensesView the Presentation

Computer search engine for the internet of thingsView the Presentation

The multi Billion-Dollar medical apps & devices market VS the FDAView the Presentation

The evolution of mobile securityView the Presentation

MAP App WrappingView the Presentation

Standards for a simpler stronger authenticationView the Presentation

Using the cloud to secure the internet of thingsView the Presentation

Security of the mobile cloud ecosystemView the Presentation

Rise Of The Machines: Terminating Inherent Android Insecurity?View the Presentation

U.S. Government Mobility Standards For Security – What They Mean For Your DeviceView the Presentation

Keeping mobile security simpleView the Presentation

Finding Undesirable Or Policy Breaking Behaviors In Popular Mobile Apps Using Advanced Analysis Techniques Such As Dynamic AnalysisView the Presentation

App Developer Community-Building Around SecurityView the Presentation

AMPHION FORUM 2012: SAN FRANCISCO

Download and view presentations from our previous Amphion Forum in San Francisco, 2012

Preventing zero day attacks on mobile devicesView the Presentation

Android Mobile Application HackingView the Presentation

Embedded exploitation & defenseView the Presentation

Self-Defending softwareView the Presentation

Mobile Security and the Collision of Federal Compliance StandardsView the Presentation

Defense-grade mobile security, risk management, and compliance.View the Presentation

Too many degrees of separation: looking at the data as a sensor to protect it wherever it isView the Presentation

Advanced software exploitation on ARM microprocessorsView the Presentation

Mobile network forensicsView the Presentation

SmartMeter security and common attack pointsView the Presentation

The security cathedral and the bazaarView the Presentation

Testing for security with runtime code instrumentationView the Presentation

Tying obfuscated cryptography to hardware using physically unclonable functionsView the Presentation

Mesh all the things: why we need secure mobile AdHoc networks and how to get there quicklyView the Presentation

Android: The next operating environment frontierView the Presentation

Apps under attack - protect the integrity of your appsView the Presentation

Security standards for the ip based internet of thingsView the Presentation

Securing the endpoints: innovations in the ID and securityView the Presentation

AMPHION FORUM 2012: Washington, D.C.

Download and view presentations from our previous Amphion Forum in Washington DC, 2012

Leveraging Big Data for Mobile SecurityView the Presentation

Testing for Security with Runtime Code InstrumentationView the Presentation

The dark side of the internet of thingsView the Presentation

An "Energy-Star" ratings system for comparative device securityView the Presentation

Meeting NSA’s mobile capability requirements: secure VoIP on COTS smartphonesView the Presentation

Cyberwar 4G A.K.A. the coming smart phone warsView the Presentation

Enterprise data center security with software defined networking and OpenFlowView the Presentation

Extracting keys from mobile devices with differential power analysisView the Presentation

Mobile security and risk management in a BYOD worldView the Presentation

Hacking the smart grid: myths, nightmares and professionalismView the Presentation

Interactive networked system defense: cyber-counterintelligenceView the Presentation

Mobile Security: innovation enabler or inhibiter?View the Presentation

Next generation DCS and SCADA device securityView the Presentation

Novel reconfigurable TPM Architecture as the security anchors of future embedded IT systemsView the Presentation

New security considerations in mobile commerceView the Presentation

Understanding Android SecurityView the Presentation

Securing the transmission and distribution system - risks and gap analysisView the Presentation

Securing the smart grid: current practices and future directionsView the Presentation

The app is the new endpointView the Presentation

Embedded device [fuzz] testing [against [A]PT]]View the Presentation

Industrial control systems (ICS) cyber security - selected case historiesView the Presentation

The road to securing the internet of things: evolution of a market segmentView the Presentation

Zen and the Art of CybersecurityView the Presentation

AMPHION FORUM 2012: Munich

Download and view presentations from our previous Amphion Forum in Munich, 2012

Amphion Forum KeynoteView the Presentation

Fuzzing for penetration testing and fuzzing maturity modelView the Presentation

The dark side of the internet of thingsView the Presentation

Deeper dive: securing the european energy gridView the Presentation

Novel reconfigurable TPM architectures as the security anchors of future embedded IT systemsView the Presentation

Enterprise data center security with software defined networking and OpenFlowView the Presentation

Next generations DCS and SCADA device securityView the Presentation

Smart (Grid) security: What is really "Smart" in our connected world?View the Presentation

Testing for Security with runtime code instrumentationView the Presentation

The app is the new EndpointView the Presentation

Zen and the art of cybersecurityView the Presentation